SB2019100916 - Multiple vulnerabilities in Microsoft Windows Error Reporting Manager



SB2019100916 - Multiple vulnerabilities in Microsoft Windows Error Reporting Manager

Published: October 9, 2019

Security Bulletin ID SB2019100916
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-1342)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Error Reporting manager handles a process crash. A local user can create a malicious application, launch it on the system, delete a targeted file leading to an elevated status and take control of the target system.

To exploit this vulnerability, an attacker would first have to log on to the system.


2) Windows hard link (CVE-ID: CVE-2019-1315)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Error Reporting manager handles hard links. A local user can create a malicious application, launch it on the system, overwrite a targeted file leading to an elevated status and take control of an affected system.

To exploit this vulnerability, an attacker would first have to log on to the system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-1339)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Error Reporting manager handles hard links. A local user can create a malicious application, launch it on the system, overwrite a targeted file leading to an elevated status and take control of an affected system.

To exploit this vulnerability, an attacker would first have to log on to the system.


Remediation

Install update from vendor's website.