Lucene search

K
kasperskyKaspersky LabKLA11051
HistoryJun 13, 2017 - 12:00 a.m.

KLA11051 Multiple vulnerabilities in Microsoft Windows

2017-06-1300:00:00
Kaspersky Lab
threats.kaspersky.com
39

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.5%

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause a denial of service, obtain sensitive information and possibly to write local files.

Below is a complete list of vulnerabilities:

  1. Incorrectly set permissions on folders inside the DEFAULT folder structure can be exploited locally by logging on and tampering wiht the DEFAULT folder contents possible to write local files;
  2. An improper client authentication in Helppane.exe can be exploited locally by using a specially designed application to gain privileges;
  3. An incorrect security feature behaviour while enforcing case sensitivity for certain variable checks can be exploited locally via a specially designed application to bypass security restrictions;
  4. An improper handling of kernel mode requests of some specific types can be exploited via a specially designed request to cause a denial of service;
  5. An improper handling of objects in memory in Windows Search can be exploited via specially designed SMB messages to obtain sensitive information;
  6. An incorrect handling of objects in memory in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information.

Technical details

Exploiting vulnerability (3) can lead to bypassing UEFI (Unified Extensible Firmware Interface) variable security.

NB: Not every vulnerability already have CVSS rating so cumulative CVSS rating can be not representative.

Original advisories

CVE-2017-0298

CVE-2017-0295

CVE-2017-8493

CVE-2017-8515

CVE-2017-8544

CVE-2017-8554

CVE-2017-8553

Related products

Microsoft-Windows-Server-2012

Microsoft-Windows-7

Microsoft-Windows-Server-2008

Windows-RT

Microsoft-Windows-10

CVE list

CVE-2017-0295 warning

CVE-2017-0298 warning

CVE-2017-8493 warning

CVE-2017-8515 warning

CVE-2017-8544 warning

CVE-2017-8553 warning

CVE-2017-8554 warning

KB list

4022719

4022726

4022714

4022724

4022727

4022715

4022725

4022722

4022717

4024402

4022718

4022887

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • WLF

Write Local Files. Exploitation of vulnerabilities with this impact can lead to writing into some inaccessible files. Files that can be read depends on concrete program errors.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Windows 7 Service Pack 1Microsoft Windows 8.1Microsoft Windows RT 8.1Microsoft Windows 10Microsoft Windows Server 2008 R2 Service Pack 1Β Microsoft Windows Server 2012Microsoft Windows Server 2012 R2Microsoft Windows Server 2016

References

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.5%