copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2012.0538 - [Win] Microsoft Windows: Increased privileges - Existing account

Date: 13 June 2012
References: ESB-2012.0333.2  ESB-2012.0554.2  ESB-2012.0694  ASB-2012.0143  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0538
        Vulnerabilities in Windows Kernel Could Allow Elevation of
                            Privilege (2711167)
                               13 June 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Increased Privileges -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-1515 CVE-2012-0217 

Reference:         ESB-2012.0333.2

Original Bulletin: 
   http://technet.microsoft.com/en-us/security/bulletin/MS12-042

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS12-042 - Important

Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege
(2711167)

Published Date: June 12, 2012 | Updated Date: Unspecified

Version: 1.0

General Information

Executive Summary

This security update resolves one privately reported vulnerability
and one publicly disclosed vulnerability in Microsoft Windows. The
vulnerabilities could allow elevation of privilege if an attacker
logs on to an affected system and runs a specially crafted application
that exploits the vulnerability. An attacker must have valid logon
credentials and be able to log on locally to exploit this vulnerability.
The vulnerability could not be exploited remotely or by anonymous
users.

This security update is rated Important for all 32-bit editions of
Windows XP and Windows Server 2003; Windows 7 for x64-based Systems;
and Windows Server 2008 R2 for x64-based Systems.

The security update addresses the vulnerabilities by correcting the
way that the Windows User Mode Scheduler handles a particular system
request and the way that Windows manages BIOS ROM.

Affected Software

Windows XP Service Pack 3
Windows Server 2003 Service Pack 2
Windows 7 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1

Vulnerability Information

User Mode Scheduler Memory Corruption Vulnerability - CVE-2012-0217

An elevation of privilege vulnerability exists in the way that the
Windows User Mode Scheduler handles system requests. An attacker
who successfully exploited this vulnerability could run arbitrary
code in kernel mode. An attacker could then install programs; view,
change, or delete data; or create new accounts with full administrative
rights.

To view this vulnerability as a standard entry in the Common
Vulnerabilities and Exposures list, see CVE-2012-0217.


BIOS ROM Corruption Vulnerability - CVE-2012-1515

An elevation of privilege vulnerability exists in the way that
Windows handles BIOS memory. An attacker who successfully exploited
this vulnerability could run arbitrary code in kernel mode. An
attacker could then install programs; view, change, or delete data;
or create new accounts with full administrative rights.

To view this vulnerability as a standard entry in the Common
Vulnerabilities and Exposures list, see CVE-2012-1515.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ULDt
-----END PGP SIGNATURE-----