Forum Thread: Microsoft Windows Two Privilege Escalation Vulnerabilities

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Microsoft Windows Two Privilege Escalation Vulnerabilities

This thread has been marked as locked.
Secunia Microsoft Windows Two Privilege Escalation Vulnerabilities
Secunia Official 16th Feb, 2010 13:07
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

1) An error exists within the #GP trap handler (nt!KiTrap0D), which can be exploited to execute arbitrary code with kernel privileges.

NOTE: 64-bit Microsoft Windows operating systems and Windows Server 2008 R2 for x64- and Itanium-based systems are not affected.

2) An error exists due to the Windows kernel not correctly resetting a pointer when freeing memory, which can be exploited to trigger a double-free condition.

Successful exploitation of this vulnerability allows arbitrary code execution with system level privileges.

pc.tech1 RE: Microsoft Windows Two Privilege Escalation Vulnerabilities
Member 16th Feb, 2010 13:07
Score: 8
Posts: 22
User Since: 13th Feb 2010
System Score: N/A
Location: US
Last edited on 16th Feb, 2010 13:07
MS010-015 - latest from MS:
- - http://blogs.technet.com/msrc/archive/2010/02/12/u...
February 12, 2010

No resolution yet. Some get BSOD after install of this patch and reboot.

--
This machine has no brain.
Use your own.
.
Was this reply relevant?
+2
-0
pc.tech1 RE: Microsoft Windows Two Privilege Escalation Vulnerabilities
Member 3rd Mar, 2010 21:06
Score: 8
Posts: 22
User Since: 13th Feb 2010
System Score: N/A
Location: US
Last edited on 3rd Mar, 2010 21:06
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CV...
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CV...
____

MS10-015 re-released with new detection logic
- http://blogs.technet.com/msrc/archive/2010/03/02/u...
March 02, 2010
- http://support.microsoft.com/kb/980966
.

--
This machine has no brain.
Use your own.
.
Was this reply relevant?
+2
-0

This thread has been marked as locked.