SB2019031316 - Privilege escalation in Windows Subsystem for Linux
Published: March 13, 2019 Updated: March 17, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2019-0689)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in Windows Subsystem for Linux. A local user can use a specially specially crafted application to trigger integer overflow and execute arbitrary code on the target system with elevated privileges.
2) Integer overflow (CVE-ID: CVE-2019-0694)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in Windows Subsystem for Linux. A local user can use a specially specially crafted application to trigger integer overflow and execute arbitrary code on the target system with elevated privileges.
3) Integer overflow (CVE-ID: CVE-2019-0682)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in Windows Subsystem for Linux. A local user can use a specially specially crafted application to trigger integer overflow and execute arbitrary code on the target system with elevated privileges.
4) Integer overflow (CVE-ID: CVE-2019-0692)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in Windows Subsystem for Linux. A local user can use a specially specially crafted application to trigger integer overflow and execute arbitrary code on the target system with elevated privileges.
5) Integer overflow (CVE-ID: CVE-2019-0693)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in Windows Subsystem for Linux. A local user can use a specially specially crafted application to trigger integer overflow and execute arbitrary code on the target system with elevated privileges.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0689
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0694
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0682
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0692
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0693