
====================================================================

                             CERT-Renater

                 Note d'Information No. 2015/VULN179
_____________________________________________________________________

DATE                : 09/09/2015

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Windows version Vista, 7, 8, 8.1, 10, RT, Server
                                   2008, Server 2012.

======================================================================
KB3089657
https://technet.microsoft.com/en-us/library/security/MS15-102
______________________________________________________________________

Microsoft Security Bulletin MS15-102: Important Vulnerabilities in 
Windows Task Management Could Allow Elevation of Privilege (3089657)

Bulletin Number: MS15-102

Bulletin Title: Vulnerabilities in Windows Task Management Could Allow
Elevation of Privilege

Severity: Important

KB Article: 3089657

Version: 1.0

Published Date: September 8, 2015


Executive Summary

This security update resolves vulnerabilities in Microsoft Windows. The
vulnerabilities could allow elevation of privilege if an attacker logs
on to a system and runs a specially crafted application.

This security update is rated Important for all supported releases of
Microsoft Windows. For more information, see the Affected Software
section.

Affected Software

Windows Vista

Windows Vista Service Pack 2

Windows Vista x64 Edition Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for Itanium-based Systems Service Pack 2

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

Windows 8 for 32-bit Systems

Windows 8 for x64-based Systems

Windows 8.1 for 32-bit Systems

Windows 8.1 for x64-based Systems

Windows Server 2012

Windows Server 2012 R2

Windows RT[1]

Windows RT 8.1[1]

Windows 10 for 32-bit Systems[2]

Windows 10 for x64-based Systems[2]

Server Core installation option

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation)

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
installation)

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2 (Server Core installation)

[1]The security updates for Windows RT operating systems are available 
via Windows Update only.

[2]The Windows 10 update is cumulative. In addition to containing
non-security updates, it also contains all of the security fixes for
all of the Windows 10-affected vulnerabilities shipping with this
months security release. See Microsoft Knowledge Base Article 3081455
for more information and download links.


Vulnerability Information


Windows Task Management Elevation of Privilege Vulnerability - CVE-2015-2524

An elevation of privilege vulnerability exists when Microsoft Windows
fails to properly validate and enforce impersonation levels. An
attacker who successfully exploited this vulnerability could bypass
impersonation-level security checks and gain elevated privileges on a
targeted system.

To exploit the vulnerability, an attacker would first have to log on to
the system. An attacker could then run a specially crafted application
designed to increase privileges. The security update addresses the
vulnerability by correcting how Windows validates impersonation events.

Microsoft received information about this vulnerability through
coordinated vulnerability disclosure. When this security bulletin was
originally issued, Microsoft had not received any information to
indicate that this vulnerability had been publicly used to attack
customers.


Windows Task File Deletion Elevation of Privilege Vulnerability -
CVE-2015-2525

An elevation of privilege vulnerability exists in Windows Task
Scheduler when it improperly verifies certain file system interactions.
An attacker who successfully exploited this vulnerability could run
arbitrary code in the security context of the local system. An attacker
could then install programs; view, change, or delete data; or create
new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on
to the system. An attacker could then run a specially crafted
application that could exploit the vulnerability and take complete
control over an affected system. The security update addresses the
vulnerability by correcting how Task Scheduler verifies file system
interactions.

Microsoft received information about this vulnerability through
coordinated vulnerability disclosure. When this security bulletin was
originally issued, Microsoft had not received any information to
indicate that this vulnerability had been publicly used to attack
customers.


Windows Task Management Elevation of Privilege Vulnerability - CVE-2015-2528

An elevation of privilege vulnerability exists when Microsoft Windows
fails to properly validate and enforce impersonation levels. An
attacker who successfully exploited this vulnerability could bypass
impersonation-level security checks and gain elevated privileges on a
targeted system.

To exploit the vulnerability, an attacker would first have to log on to
the system. An attacker could then run a specially crafted application
designed to increase privileges. The security update addresses the
vulnerability by correcting how Windows validates impersonation events.

Microsoft received information about this vulnerability through
coordinated vulnerability disclosure. When this security bulletin was
originally issued, Microsoft had not received any information to
indicate that this vulnerability had been publicly used to attack
customers.


=========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================
