Vigil@nce - Windows: six vulnerabilities of Kernel-Mode Drivers
July 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Kernel-Mode Drivers
of Windows.
Impacted products: Windows 2003, Windows 2008 R0, Windows 2008 R2,
Microsoft Windows 2012, Windows 7, Windows 8, Windows RT, Windows
Vista
Severity: 2/4
Creation date: 12/05/2015
Revision date: 08/06/2015
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Windows.
An attacker can read a memory fragment, in order to obtain
sensitive information. [severity:1/4; CVE-2015-1676, ZDI-15-190]
An attacker can read a memory fragment, in order to obtain
sensitive information. [severity:1/4; CVE-2015-1677, ZDI-15-185]
An attacker can read a memory fragment, in order to obtain
sensitive information. [severity:1/4; CVE-2015-1678, ZDI-15-186]
An attacker can read a memory fragment, in order to obtain
sensitive information. [severity:1/4; CVE-2015-1679, ZDI-15-187]
An attacker can read a memory fragment, in order to obtain
sensitive information. [severity:1/4; CVE-2015-1680, ZDI-15-188]
An attacker can bypass security features of Win32k.sys, in order
to escalate his privileges. [severity:2/4; CVE-2015-1701]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-six-vulnerabilities-of-Kernel-Mode-Drivers-16892