Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Microsoft Windows Two Privilege Escalation Vulnerabilities

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Microsoft Windows Two Privilege Escalation Vulnerabilities

This thread has been marked as locked.
Secunia Microsoft Windows Two Privilege Escalation Vulnerabilities
Secunia Official 16th Feb, 2010 13:07
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

1) An error exists within the #GP trap handler (nt!KiTrap0D), which can be exploited to execute arbitrary code with kernel privileges.

NOTE: 64-bit Microsoft Windows operating systems and Windows Server 2008 R2 for x64- and Itanium-based systems are not affected.

2) An error exists due to the Windows kernel not correctly resetting a pointer when freeing memory, which can be exploited to trigger a double-free condition.

Successful exploitation of this vulnerability allows arbitrary code execution with system level privileges.

pc.tech1 RE: Microsoft Windows Two Privilege Escalation Vulnerabilities
Member 16th Feb, 2010 13:07
Score: 5
Posts: 17
User Since: 13th Feb 2010
System Score: N/A
Location: US
Last edited on 16th Feb, 2010 13:07
MS010-015 - latest from MS:
- - http://blogs.technet.com/msrc/archive/2010/02/12/u...
February 12, 2010

No resolution yet. Some get BSOD after install of this patch and reboot.

--
This machine has no brain.
Use your own.
.
Was this reply relevant?
+2
-0
pc.tech1 RE: Microsoft Windows Two Privilege Escalation Vulnerabilities
Member 3rd Mar, 2010 21:06
Score: 5
Posts: 17
User Since: 13th Feb 2010
System Score: N/A
Location: US
Last edited on 3rd Mar, 2010 21:06
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CV...
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CV...
____

MS10-015 re-released with new detection logic
- http://blogs.technet.com/msrc/archive/2010/03/02/u...
March 02, 2010
- http://support.microsoft.com/kb/980966
.

--
This machine has no brain.
Use your own.
.
Was this reply relevant?
+2
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability