SB2017101013 - Information disclosure in Microsoft Windows Kernel



SB2017101013 - Information disclosure in Microsoft Windows Kernel

Published: October 10, 2017

Security Bulletin ID SB2017101013
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2017-11765)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application and gain access to arbitrary data.

Successful exploitation of the vulnerability may result in further attack.

2) Information disclosure (CVE-ID: CVE-2017-11814)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application and gain access to arbitrary data.

Successful exploitation of the vulnerability may result in further attack.

3) Information disclosure (CVE-ID: CVE-2017-11785)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application, retrieve the memory address of a kernel object and bypass Kernel Address Space Layout Randomization (ASLR).

Successful exploitation of the vulnerability may result in further attack.

4) Information disclosure (CVE-ID: CVE-2017-11784)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to an error when the Windows kernel handles objects in memory. A local attacker can run a specially crafted application, retrieve the memory address of a kernel object and bypass Kernel Address Space Layout Randomization (ASLR).

Successful exploitation of the vulnerability may result in further attack.

Remediation

Install update from vendor's website.