Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.0561.2 MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege 17 March 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Windows Publisher: Microsoft Operating System: Windows Impact/Access: Administrator Compromise -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-0075 CVE-2015-0073 Original Bulletin: https://technet.microsoft.com/en-us/library/security/MS15-025 Comment: To address a packaging issue for customers who are repeatedly reoffered security update 3033395 when installed on systems running supported editions of Windows Server 2003, Microsoft released update 3033395-v2 for all supported editions of Windows Server 2003. Customers who have not already installed the 3033395 update should install update 3033395-v2 to be fully protected from this vulnerability. To avoid the possibility of future detection logic problems, Microsoft recommends that customers running Windows Server 2003 who have already successfully installed the 3033395 update also apply update 3033395-v2 even though they are already protected from this vulnerability. Customers running other Microsoft operating systems are not affected by this rerelease and do not need to take any action. See Microsoft Knowledge Base Article 3033395 for more information. Revision History: March 17 2015: See comment March 11 2015: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Bulletin Number: MS15-025 Bulletin Title: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege Severity: None KB Article: 3038680 Version: 1.0 Published Date: March 10, 2015 Description: This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Executive Summary This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. This security update is rated Important for all supported releases of Microsoft Windows. Affected Software The following software versions or editions are affected. Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems Service Pack 1 [1] Windows 7 for x64-based Systems Service Pack 1 [1] Windows Server 2008 R2 for x64-based Systems Service Pack 1 [1] Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 [1] Windows 8 for 32-bit Systems Windows 8 for x64-based Systems Windows 8.1 for 32-bit Systems Windows 8.1 for x64-based Systems Windows Server 2012 Windows Server 2012 R2 Windows RT[2] Windows RT 8.1[2] Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) [1] Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) [1]The 3035131 update for Windows 7 and Windows Server 2008 R2 has affected binaries in common with the update being released simultaneously via Security Advisory 3033929. See the Update FAQ entry in this bulletin to learn how this could impact customers who download and install updates manually. [2]This update is available via Windows Update only. Vulnerability Information Registry Virtualization Elevation of Privilege Vulnerability - CVE-2015-0073 An elevation of privilege vulnerability exists in the way that Windows Registry Virtualization improperly allows a user to modify the virtual store of another user. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over the account of another user who is logged on to the affected system. The update addresses the vulnerability by correcting how Windows Registry Virtualization handles the virtual store of other users. Microsoft received information about this vulnerability through coordinated vulnerability disclosure. When this security bulletin was originally issued Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers. Impersonation Level Check Elevation of Privilege Vulnerability - CVE-2015-0075 An elevation of privilege vulnerability exists when Windows fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability could bypass user account checks to gain elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application designed to increase privileges. The update addresses the vulnerability by correcting how Windows validates impersonation levels. Microsoft received information about this vulnerability through coordinated vulnerability disclosure. When this security bulletin was originally issued Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVQd3IRLndAQH1ShLAQIXhw/+Jcx0+HjuMeLprBAON0hWsStMUeeWwnbt sbFgUzvXEEYhJc7REKf49Smx3UNt5JQJpqETFfn57Q71lK8uwrVcuqKdFzdk70PW Yrzp0ntUJh4pCU3YXCQpXqAVB537//1aGMJFbJs+lAuKUoqQSgseMVtQfcruL9Rd cn2LKJziLbswAqfsH1gptMtC8WxUMguXj3f6qFf8mhFOyYWU3GOFAaxOA6ThHX/h TKgAfQWFxh0Q0iXR+seuUk7Fr8/BHXmB6PvUUIvoFuhqNBCso9m6nixltqKpg6yQ tbTvDjOiUOLkoJMkuKR69Qw6a0vZxX++nvm0t1fdMIrGmWcTDeIGdpvX4FdNONFE SXOtrgxuvHJLYDKHstklToXf4mLsAaj7b2B0177UxrBm6tcwX9Zjeoudx9tliOOb vtQaE/9eCynhbDilfrG0kCWGdyhBnBtLqIjMtk2o6BO5e0z8IioGJUVn/mPKU2ut qm0ai0WAdelIwYaOYPFBJ+DVhorFWX0H8BGbBIKGtwBr2MdZWO5hWelYXrFKnhUX hubks8kTHFL8FH1pO9RJtVuUEKIHzZ3yScIqLAjOFt8I0NAKW7sJ4E7qT7Li/BRh +4EEM47brZefwThehWFYaVCeXE6qXkXn6H0zBgEQ3U7okD1oSr/6sB5JTSuf0rx9 QA9WQPEbayo= =UyAO -----END PGP SIGNATURE-----