SB2017031412 - Multiple vulnerabilities in Microsoft Windows



SB2017031412 - Multiple vulnerabilities in Microsoft Windows

Published: March 14, 2017 Updated: March 14, 2017

Security Bulletin ID SB2017031412
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2017-0050)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper enforcing of permissions by Windows Kernel API. A local attacker can run a specially crafted application and gain elevated privileges on the affected system.

Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.

2) Privilege escalation (CVE-ID: CVE-2017-0101)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper handling of objects in memory by Windows Transaction Manager. A local attacker can run a specially crafted application and gain elevated privileges on the affected system.

Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.

3) Privilege escalation (CVE-ID: CVE-2017-0102)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper checking of the length of a buffer when copying memory to it. A local attacker can copy a file to a shared folder or drive, trigger boundary error and gain elevated privileges on the affected system.

Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.

4) Privilege escalation (CVE-ID: CVE-2017-0103)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper handling of registry objects in memory by Windows Kernel API. A local attacker can run a specially crafted application and gain elevated privileges on the affected system.

Successful exploitation of the vulnerability may result in privilege escalation on the vulnerable system.

Remediation

Install update from vendor's website.