Vigil@nce - Windows: five vulnerabilities
April 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2,
Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Creation date: 09/02/2016.
Revision date: 15/02/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Windows.
An attacker can bypass security features of the Windows Kernel, in
order to escalate his privileges. [severity:2/4; CVE-2016-0040]
An attacker can put a malicious DLL on the system, in order to run
code. [severity:2/4; CVE-2016-0041]
An attacker can put a malicious DLL on the system, in order to run
code. [severity:2/4; CVE-2016-0042]
An attacker can trigger a fatal error in Microsoft Sync Framework
Change Batch, in order to trigger a denial of service.
[severity:2/4; CVE-2016-0044]
An attacker can bypass the Kerberos authentication, related to a
changed password, in order to obtain sensitive information.
[severity:2/4; CVE-2016-0049]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Windows-five-vulnerabilities-18904