Vulnerabilities > CVE-2015-0095 - NULL Pointer Dereference vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to cause a denial of service (NULL pointer dereference and blue screen), or obtain sensitive information from kernel memory and possibly bypass the ASLR protection mechanism, via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability."
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS15-023 |
bulletin_url | |
date | 2015-03-10T00:00:00 |
impact | Elevation of Privilege |
knowledgebase_id | 3034344 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS15-023.NASL |
description | The version of Windows running on the remote host is affected by the following vulnerabilities : - Information disclosure vulnerabilities exist in the kernel-mode driver that can reveal portions of kernel memory. An attacker can exploit these and gain information about the system, which can then be used to launch further attacks. (CVE-2015-0077, CVE-2015-0094, CVE-2015-0095) - A privilege escalation vulnerability exists in the kernel-mode driver due to improper validation of thread tokens. An authenticated attacker, using a specially crafted application, can exploit this issue to gain administrative credentials in order to elevate privileges. (CVE-2015-0078) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 81737 |
published | 2015-03-10 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/81737 |
title | MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege (3034344) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/144927/cve_2017_8464_lnk_lpe.rb.txt |
id | PACKETSTORM:144927 |
last seen | 2017-11-09 |
published | 2017-11-08 |
reporter | Yorick Koster |
source | https://packetstormsecurity.com/files/144927/Microsoft-Windows-LNK-File-Code-Execution.html |
title | Microsoft Windows LNK File Code Execution |
References
- http://www.securityfocus.com/bid/72936
- http://www.securityfocus.com/bid/72936
- http://www.securitytracker.com/id/1031897
- http://www.securitytracker.com/id/1031897
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-023
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-023