Operating System:

[WIN]

Published:

28 August 2014

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2014.1372.3
       Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation
                          of Privilege (2984615)
                              28 August 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Increased Privileges   -- Existing Account
                   Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4064 CVE-2014-1819 CVE-2014-0318

Original Bulletin: 
   https://technet.microsoft.com/library/security/ms14-045

Revision History:  August 28 2014: Bulletin rereleased to announce the 
                   replacement of the 2982791 update with the 2993651 update 
                   for all supported releases of Microsoft Windows. See the 
                   Update FAQ for details.
                   August 18 2014: Microsoft recommends that customers 
                   uninstall this update. See the Update FAQ for details.
                   August 18 2014: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS14-045 - Important Vulnerabilities in 
Kernel-Mode Drivers Could Allow Elevation of Privilege (2984615)

Published: August 12, 2014

Version: 1.0

General Information

Executive Summary

This security update resolves three privately reported vulnerabilities in 
Microsoft Windows. The most severe of these vulnerabilities could allow 
elevation of privilege if an attacker logs on to the system and runs a 
specially crafted application. An attacker must have valid logon credentials 
and be able to log on locally to exploit these vulnerabilities.

This security update is rated Important for all supported editions of 
Microsoft Windows

Affected Software

Windows Server 2003

Windows Vista

Windows Server 2008

Windows 7

Windows 8 & 8.1

Windows Server 2012 and Windows Server 2012 R2

Windows RT and Windows RT 8.1

Update FAQ

Why was this bulletin revised on August 27, 2014? What happened to the 
original 2982791 security update?

To address known issues with security update 2982791, Microsoft rereleased 
MS14-045 to replace the 2982791 update with the 2993651 update for all 
supported releases of Microsoft Windows. Microsoft expired update 2982791 on 
August 15, 2014. All customers should apply the 2993651 update, which replaces
the expired 2982791 update. Microsoft strongly recommends that customers who 
have not uninstalled the 2982791 update do so prior to applying the 2993651 
update.

I already successfully installed the original 2982791 security update and am 
not experiencing any difficulties. Should I apply the replacement update 
(2993651) released on August 27, 2014?

Yes. All customers should apply the 2993651 update, which replaces the expired
2982791 update. Customers do not need to uninstall the expired 2982791 update
before applying the 2993651 update; however, Microsoft strongly recommends it.
Customers who do not remove the expired update will retain a listing for 
2982791 under installed updates in Control Panel.

I uninstalled the original 2982791 security update. Should I apply the August
27, 2014 rereleased update (2993651)?

Yes. To be protected from CVE-2014-0318 and CVE-2014-1819, all customers 
should apply the rereleased update (2993651), which replaces the expired 
2982791 update.

What if I experienced difficulties restarting my system after installing 
security update 2982791?

Customers who are experiencing difficulties restarting their systems after the
  installation of security update 2982791 should refer to the Known Issues 
section of Microsoft Knowledge Base Article 2982791.

Why was this bulletin revised on August 15, 2014?

Microsoft revised this bulletin to address known issues associated with 
installation of security update 2982791. Microsoft is investigating behavior 
associated with the installation of this update, and will update this bulletin
  when more information becomes available. Microsoft recommends that customers
uninstall this update. As an added precaution, Microsoft has removed the 
download links to the 2982791 security update. For instructions on how to 
uninstall this update, see Microsoft Knowledge Base Article 2982791.

I am running Windows 8.1, Windows Server 2012 R2, or Windows RT 8.1. Why am I
not being offered the 2982791 or the 2976897 updates?

To be offered any security updates on Windows RT 8.1, Windows 8.1, and Windows
Server 2012 R2, the 2919355 update must be installed on the system. For more 
information, see Microsoft Knowledge Base Article 2919355.

For Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 are there any 
prerequisites for the 2982791 or the 2976897 updates?

Yes. Customers running Windows 8.1, Windows Server 2012 R2, or Windows RT 8.1
must first install the 2919355 update released in April, 2014 before 
installing the 2982791 or the 2976897 updates. For more information about the
prerequisite update, see Microsoft Knowledge Base Article 2919355.

There are multiple update packages available for Windows Vista, Windows Server
  2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, 
Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. Do I need
  to install all the updates listed in the Affected Software table for the 
software?

Yes. Customers should apply all updates offered for the software installed on
their systems.

Do I need to install these security updates in a particular sequence?

No. Multiple updates for one version of Microsoft Windows software can be 
applied in any sequence.

I am using an older release of the software discussed in this security 
bulletin. What should I do?

The affected software listed in this bulletin has been tested to determine 
which releases are affected. Other releases are past their support life cycle.
For more information about the product lifecycle, see the Microsoft Support 
Lifecycle website.

It should be a priority for customers who have older releases of the software
to migrate to supported releases to prevent potential exposure to 
vulnerabilities. To determine the support lifecycle for your software release,
  see Select a Product for Lifecycle Information. For more information about 
service packs for these software releases, see Service Pack Lifecycle Support
Policy.

Customers who require custom support for older software must contact their 
Microsoft account team representative, their Technical Account Manager, or the
appropriate Microsoft partner representative for custom support options. 
Customers without an Alliance, Premier, or Authorized Contract can contact 
their local Microsoft sales office. For contact information, see the Microsoft
Worldwide Information website, select the country in the Contact Information 
list, and then click Go to see a list of telephone numbers. When you call, ask
to speak with the local Premier Support sales manager. For more information, 
see the Microsoft Support Lifecycle Policy FAQ.

Vulnerability Information

Win32k Elevation of Privilege Vulnerability - CVE-2014-0318

An elevation of privilege vulnerability exists when the Windows kernel-mode 
driver improperly handles window handle thread-owned objects. An attacker who
successfully exploited this vulnerability could run arbitrary code in kernel 
mode. An attacker could then install programs; view, change, or delete data; 
or create new accounts with full administrative rights.

To view this vulnerability as a standard entry in the Common Vulnerabilities 
and Exposures list, see CVE-2014-0318.

Font Double-Fetch Vulnerability - CVE-2014-1819

An elevation of privilege vulnerability exists in the way that the affected 
component handles objects from specially crafted font files. An attacker who 
successfully exploited this vulnerability could execute arbitrary code with 
elevated privileges.

To view this vulnerability as a standard entry in the Common Vulnerabilities 
and Exposures list, see CVE-2014-1819.

Windows Kernel Pool Allocation Vulnerability - CVE-2014-4064

An information disclosure vulnerability exists in the way Windows kernel 
memory is managed. An attacker who successfully exploited this vulnerability 
could use it to disclose memory addresses or other sensitive kernel 
information.

To view this vulnerability as a standard entry in the Common Vulnerabilities 
and Exposures list, see CVE-2014-4064.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Nee+
-----END PGP SIGNATURE-----