Vigil@nce - Windows: four vulnerabilities via Kernel-Mode Drivers
January 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities via Kernel-Mode
Drivers of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2,
Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT,
Windows Vista.
Severity: 2/4.
Creation date: 09/11/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Windows.
An attacker can bypass security features, in order to obtain
sensitive information on ASLR. [severity:2/4; CVE-2016-7214]
An attacker can bypass security features via Win32k, in order to
escalate his privileges. [severity:2/4; CVE-2016-7215, ZDI-16-592]
An attacker can bypass security features via Win32k, in order to
escalate his privileges. [severity:2/4; CVE-2016-7246, ZDI-16-594]
An attacker can bypass security features via Bowser.sys, in order
to obtain sensitive information. [severity:2/4; CVE-2016-7218]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Windows-four-vulnerabilities-via-Kernel-Mode-Drivers-21075