Rewterz
Rewterz Threat Advisory – CVE-2018-18559 – Linux Kernel “packet_do_bind()” Privilege Escalation Vulnerability
November 16, 2018
Rewterz
Rewterz Threat Advisory – Microsoft Windows Server 2012, multiple vulnerabilities
November 19, 2018

Rewterz Threat Advisory – Microsoft Windows 8.1 Multiple Vulnerabilities

Multiple vulnerabilities in Microsoft Windows 8.1 are addressed in a recent update, fixing privilege escalation, information disclosure, DoS and security bypass.

 

 

IMPACT:  NORMAL

 

 

PUBLISH DATE:  11-19-2018

 

 

OVERVIEW

 

 

Multiple vulnerabilities have been reported in Microsoft Windows 8.1, which can be exploited by malicious, local users to cause information disclosure, security bypass, privilege escalation and DoS (Denial of Service). Updates are available.

 

 

ANALYSIS

 

 

A number of CVE references are associated with the updates.

 

CVE-2018-0751

The Windows Kernel API in Windows 8.1 and RT 8.1 allows a privilege escalation vulnerability due to the way the Kernel API enforces permissions, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0788

The Windows Adobe Type Manager Font Driver (Atmfd.dll) allows a privilege escalation vulnerability due to the way objects are handled in memory, aka “OpenType Font Driver Elevation of Privilege Vulnerability”.

 

CVE-2018-0752

The Windows Kernel API allows an elevation of privilege vulnerability due to the way the Kernel API enforces permissions, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0749

The Microsoft Server Message Block (SMB) Server allows an elevation of privilege vulnerability due to the way SMB Server handles specially crafted files, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0747

The Windows kernel allows an information disclosure vulnerability due to the way memory addresses are handled, aka “Windows Information Disclosure Vulnerability”.

 

CVE-2018-0754

The Windows Adobe Type Manager Font Driver (Atmfd.dll) allows an information disclosure vulnerability due to the way objects are handled in memory, aka “OpenType Font Driver Information Disclosure Vulnerability”.

 

CVE-2018-0753

A denial of service vulnerability exists in Windows 8.1 due to the way objects are handled in memory, aka “Windows IPSec Denial of Service Vulnerability”.

 

CVE-2018-0748

The Windows kernel allows an elevation of privilege vulnerability due to the way memory addresses are handled, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0744

The Windows kernel allows a privilege escalation vulnerability due to the way objects are handled in memory, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2017-5753

Systems with microprocessors utilizing speculative execution and branch prediction may allow a malicious local user to cause unauthorized information disclosure via a side-channel analysis.

 

CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

 

CVE-2017-5754

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

 

CVE-2018-0746

The Windows kernel contains an information disclosure vulnerability due to the way memory addresses are handled, aka “Windows Information Disclosure Vulnerability”.

 

Multiple vulnerabilities may appear to be similar flaws but are inherently different from one another and may have different modes of exploitation.

 

 

AFFECTED PRODUCTS

 

 

Microsoft Windows 8.1

 

 

UPDATES

 

 

Update the following versions as suggested:

  • Windows 8.1 for 32-bit systems (KB4338815):
  • Windows 8.1 for x64-based systems (KB4338815):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB44338815

 

  • Windows 8.1 for 32-bit systems (KB4338824):
  • Windows 8.1 for x64-based systems (KB4338824):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4338824

Note: New fixes have been released for Microsoft Windows 8.1 for the vulnerability

with the CVE identifier CVE 2017-5715 due to a regression in the previous update.

 

  • Windows 8.1 (KB4078130):

https://www.catalog.update.microsoft.com/Search.aspx?q=KB4078130

 

  • Windows 8.1 for 32-bit systems (KB4088879):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4088879

 

  • Windows 8.1 for 32-bit systems (KB4088876):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4088876

 

It is recommended to update the products you’re using, if any, as soon as possible.

 

If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.