SB2019100916 - Multiple vulnerabilities in Microsoft Windows Error Reporting Manager
Published: October 9, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-1342)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Error Reporting manager handles a process crash. A local user can create a malicious application, launch it on the system, delete a targeted file leading to an elevated status and take control of the target system.
To exploit this vulnerability, an attacker would first have to log on to the system.
2) Windows hard link (CVE-ID: CVE-2019-1315)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Error Reporting manager handles hard links. A local user can create a malicious application, launch it on the system, overwrite a targeted file leading to an elevated status and take control of an affected system.
To exploit this vulnerability, an attacker would first have to log on to the system.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-1339)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Error Reporting manager handles hard links. A local user can create a malicious application, launch it on the system, overwrite a targeted file leading to an elevated status and take control of an affected system.
To exploit this vulnerability, an attacker would first have to log on to the system.
Remediation
Install update from vendor's website.