MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege (3034344)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The version of Windows running on the remote host is affected by the
following vulnerabilities :

- Information disclosure vulnerabilities exist in the
kernel-mode driver that can reveal portions of kernel
memory. An attacker can exploit these and gain
information about the system, which can then be used
to launch further attacks. (CVE-2015-0077,
CVE-2015-0094, CVE-2015-0095)

- A privilege escalation vulnerability exists in the
kernel-mode driver due to improper validation of thread
tokens. An authenticated attacker, using a specially
crafted application, can exploit this issue to gain
administrative credentials in order to elevate
privileges. (CVE-2015-0078)

See also :

https://technet.microsoft.com/library/security/MS15-023

Solution :

Microsoft has released a set of patches for Windows 2003, Vista, 2008,
7, 2008 R2, 8, 2012, 8.1, and 2012 R2.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 81737 ()

Bugtraq ID: 72897
72902
72935
72936

CVE ID: CVE-2015-0077
CVE-2015-0078
CVE-2015-0094
CVE-2015-0095

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now