Vigil@nce - Windows: multiple vulnerabilities of Kernel/Graphics
January 2016 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Kernel/Graphics of
Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2,
Microsoft Windows 2012, Windows 7, Windows 8, Windows RT, Windows
Vista.
Severity: 2/4.
Creation date: 10/11/2015.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Windows.
An attacker can generate a memory corruption in Kernel, in order
to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2015-6100]
An attacker can generate a memory corruption in Kernel, in order
to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2015-6101]
An attacker can guess the memory layout of a process, to bypass
ASLR, in order to ease the next step of an attack. [severity:2/4;
CVE-2015-6102]
An attacker can generate a memory corruption in Graphics, in order
to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2015-6109]
An attacker can generate a memory corruption in Graphics, in order
to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2015-6103]
An attacker can generate a memory corruption in Graphics, in order
to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2015-6104]
An attacker can bypass security features in Kernel, in order to
escalate his privileges. [severity:2/4; CVE-2015-6113]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-multiple-vulnerabilities-of-Kernel-Graphics-18280