SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Microsoft Windows Crypto Driver and Windows Installer Bugs Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges
SecurityTracker Alert ID:  1037450
SecurityTracker URL:  http://securitytracker.com/id/1037450
CVE Reference:   CVE-2016-7219, CVE-2016-7292   (Links to External Site)
Date:  Dec 13 2016
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 2008 R2 SP1, 7 SP1, 8.1, RT 8.1, 2012, 2012 R2, 10, 10 Version 1511, 10 Version 1607, 2016
Description:   Two vulnerabilities were reported in Microsoft Windows. A local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system.

A local user can run a specially crafted application to trigger an object memory handling error in the Windows Crypto driver and obtain potentially sensitive information on the target system [CVE-2016-7219].

A local user can exploit a flaw in the Windows Installer to load an arbitrary library and execute arbitrary code on the target system with elevated privileges [CVE-2016-7292].

Byoungyoung Lee of SSLab, Georgia Institue of Technology, Sangho Lee of SSLab, Georgia Institue of Technology, Su Yong Kim of SSLab, Georgia Institue of Technology, Taesoo Kim of SSLab, Georgia Institue of Technology, and Thomas Vanhoutte (@SandboxEscaper) reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   The vendor has issued a fix.

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-149

Vendor URL:  technet.microsoft.com/library/security/ms16-149 (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC