![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.805582 |
Kategorie: | Windows : Microsoft Bulletins |
Titel: | Microsoft Windows Kernel-Mode Driver Privilege Elevation Vulnerabilities (3057839) |
Zusammenfassung: | This host is missing an important security; update according to Microsoft Bulletin MS15-061. |
Beschreibung: | Summary: This host is missing an important security update according to Microsoft Bulletin MS15-061. Vulnerability Insight: Multiple flaws exist due to: - Improper handling of buffer elements by windows kernel-mode driver under certain conditions. - Improper freeing of an object in memory by windows kernel-mode driver. - Insufficient validation of certain data passed from user mode by the windows kernel-mode driver. - Windows kernel-mode driver when it accesses an object in memory that has either not been correctly initialized or deleted. - Windows kernel-mode driver when it improperly validates user input. - Windows kernel-mode driver 'Win32k.sys' fails to properly free memory. Vulnerability Impact: Successful exploitation will allow remote attackers to bypass security, gain elevated privileges and execute arbitrary code on affected system. Affected Software/OS: - Microsoft Windows 8 x32/x64 - Microsoft Windows Server 2012/R2 - Microsoft Windows 8.1 x32/x64 - Microsoft Windows 2003 x32/x64 Service Pack 2 and prior - Microsoft Windows Vista x32/x64 Service Pack 2 and prior - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior - Microsoft Windows 7 x32/x64 Service Pack 1 and prior - Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior Solution: The vendor has released updates. Please see the references for more information. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-1719 Microsoft Security Bulletin: MS15-061 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-061 http://www.securitytracker.com/id/1032525 Common Vulnerability Exposure (CVE) ID: CVE-2015-1720 Common Vulnerability Exposure (CVE) ID: CVE-2015-1721 https://www.exploit-db.com/exploits/38274/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1722 https://www.exploit-db.com/exploits/38265/ https://www.exploit-db.com/exploits/38275/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1723 https://www.exploit-db.com/exploits/38273/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1724 https://www.exploit-db.com/exploits/38272/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1725 https://www.exploit-db.com/exploits/38270/ https://www.exploit-db.com/exploits/38271/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1726 https://www.exploit-db.com/exploits/38269/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1727 https://www.exploit-db.com/exploits/38268/ Common Vulnerability Exposure (CVE) ID: CVE-2015-1768 BugTraq ID: 75024 http://www.securityfocus.com/bid/75024 Common Vulnerability Exposure (CVE) ID: CVE-2015-2360 BugTraq ID: 75025 http://www.securityfocus.com/bid/75025 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |