-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2015.0561.2
          MS15-025: Vulnerabilities in Windows Kernel Could Allow
                          Elevation of Privilege
                               17 March 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Administrator Compromise -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0075 CVE-2015-0073 

Original Bulletin: 
   https://technet.microsoft.com/en-us/library/security/MS15-025

Comment: To address a packaging issue for customers who are repeatedly 
         reoffered security update 3033395 when installed on systems running
         supported editions of Windows Server 2003, Microsoft released update
         3033395-v2 for all supported editions of Windows Server 2003. 
         Customers who have not already installed the 3033395 update should 
         install update 3033395-v2 to be fully protected from this 
         vulnerability. To avoid the possibility of future detection logic 
         problems, Microsoft recommends that customers running Windows Server
         2003 who have already successfully installed the 3033395 update also
         apply update 3033395-v2 even though they are already protected from
         this vulnerability. Customers running other Microsoft operating 
         systems are not affected by this rerelease and do not need to take 
         any action. See Microsoft Knowledge Base Article 3033395 for more 
         information.

Revision History:  March 17 2015: See comment
                   March 11 2015: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Bulletin Number: MS15-025

Bulletin Title: Vulnerabilities in Windows Kernel Could Allow Elevation of 
Privilege

Severity: None

KB Article: 3038680

Version: 1.0

Published Date: March 10, 2015

Description: This security update resolves two privately reported 
vulnerabilities in Microsoft Windows. The vulnerabilities could allow 
elevation of privilege if an attacker logs on to an affected system and runs a
specially crafted application. An attacker who successfully exploited this 
vulnerability could run arbitrary code in the security context of the local 
system. An attacker could then install programs; view, change, or delete data;
or create new accounts with full user rights.

Executive Summary

This security update resolves vulnerabilities in Microsoft Windows. The most 
severe of the vulnerabilities could allow elevation of privilege if an 
attacker logs on to an affected system and runs a specially crafted 
application. An attacker who successfully exploited the vulnerability could 
run arbitrary code in the security context of the account of another user who
is logged on to the affected system. An attacker could then install programs;
view, change, or delete data; or create new accounts potentially with full 
user rights.

This security update is rated Important for all supported releases of 
Microsoft Windows.

Affected Software

The following software versions or editions are affected.

Windows Server 2003 Service Pack 2

Windows Server 2003 x64 Edition Service Pack 2

Windows Server 2003 with SP2 for Itanium-based Systems

Windows Vista Service Pack 2

Windows Vista x64 Edition Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for Itanium-based Systems Service Pack 2

Windows 7 for 32-bit Systems Service Pack 1 [1]

Windows 7 for x64-based Systems Service Pack 1 [1]

Windows Server 2008 R2 for x64-based Systems Service Pack 1 [1]

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 [1]

Windows 8 for 32-bit Systems

Windows 8 for x64-based Systems

Windows 8.1 for 32-bit Systems

Windows 8.1 for x64-based Systems

Windows Server 2012

Windows Server 2012 R2

Windows RT[2]

Windows RT 8.1[2]

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core 
installation)

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core 
installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core 
installation) [1]

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2 (Server Core installation)

[1]The 3035131 update for Windows 7 and Windows Server 2008 R2 has affected 
binaries in common with the update being released simultaneously via Security
Advisory 3033929. See the Update FAQ entry in this bulletin to learn how this
could impact customers who download and install updates manually.

[2]This update is available via Windows Update only.

Vulnerability Information

Registry Virtualization Elevation of Privilege Vulnerability - CVE-2015-0073

An elevation of privilege vulnerability exists in the way that Windows 
Registry Virtualization improperly allows a user to modify the virtual store 
of another user. An attacker who successfully exploited this vulnerability 
could run arbitrary code in the security context of the account of another 
user who is logged on to the affected system. An attacker could then install 
programs; view, change, or delete data; or create new accounts potentially 
with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the 
system. An attacker could then run a specially crafted application that could
exploit the vulnerability and take control over the account of another user 
who is logged on to the affected system. The update addresses the 
vulnerability by correcting how Windows Registry Virtualization handles the 
virtual store of other users.

Microsoft received information about this vulnerability through coordinated 
vulnerability disclosure. When this security bulletin was originally issued 
Microsoft had not received any information to indicate that this vulnerability
had been publicly used to attack customers.

Impersonation Level Check Elevation of Privilege Vulnerability - CVE-2015-0075

An elevation of privilege vulnerability exists when Windows fails to properly
validate and enforce impersonation levels. An attacker who successfully 
exploited this vulnerability could bypass user account checks to gain elevated
privileges.

To exploit this vulnerability, an attacker would first have to log on to the 
system. An attacker could then run a specially crafted application designed to
increase privileges. The update addresses the vulnerability by correcting how
Windows validates impersonation levels.

Microsoft received information about this vulnerability through coordinated 
vulnerability disclosure. When this security bulletin was originally issued 
Microsoft had not received any information to indicate that this vulnerability
had been publicly used to attack customers.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=UyAO
-----END PGP SIGNATURE-----