==================================================================== CERT-Renater Note d'Information No. 2016/VULN347 _____________________________________________________________________ DATE : 14/10/2016 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Windows versions Vista, 7, 8.1, RT 8.1, 10 running Kernel-Mode Drivers. ===================================================================== KB3192892 https://technet.microsoft.com/en-us/library/security/MS16-123 ____________________________________________________________________ Microsoft Security Bulletin MS16-123 - Important Security Update for Windows Kernel-Mode Drivers (3192892) Published: October 11, 2016 Version: 1.0 Executive Summary This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system. This security update is rated Important for all supported releases of Windows. Affected Software Windows Vista Windows Server 2008 Windows 7 Windows Server 2008 R2 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows RT 8.1 Windows 10 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) Vulnerability Information Multiple Win32k Elevation of Privilege Vulnerabilities Elevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit these vulnerabilities, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerabilities and take control of an affected system. The update addresses these vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory. The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Win32k Elevation of Privilege Vulnerability CVE-2016-3266 No No Win32k Elevation of Privilege Vulnerability CVE-2016-3376 No No Win32k Elevation of Privilege Vulnerability CVE-2016-7185 No No Win32k Elevation of Privilege Vulnerability CVE-2016-7211 No No Windows Transaction Manager Elevation of Privilege Vulnerability An elevation of privilege vulnerability exists when the Windows Transaction Manager improperly handles objects in memory. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. An attacker who successfully exploited this vulnerability could run processes in an elevated context. The update addresses the vulnerability by correcting how the Transaction Manager handles objects in memory. The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Windows Transaction Manager Elevation of Privilege Vulnerability CVE-2016-3341 No No ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================