Vulnerabilities > CVE-2015-1722 - Use After Free vulnerability in Microsoft products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability." CWE-416: Use After Free
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description Window Kernel - Bitmap Handling Use-After-Free (MS15-061) #2. CVE-2015-1722. Dos exploit for win32 platform file exploits/windows_x86/dos/38265.txt id EDB-ID:38265 last seen 2016-02-04 modified 2015-09-22 platform windows_x86 port published 2015-09-22 reporter Nils Sommer source https://www.exploit-db.com/download/38265/ title Windows Kernel - Bitmap Handling Use-After-Free MS15-061 #2 type dos description Windows Kernel - Bitmap Handling Use-After-Free (MS15-061). CVE-2015-1722. Dos exploit for win32 platform file exploits/windows_x86/dos/38275.txt id EDB-ID:38275 last seen 2016-02-04 modified 2015-09-22 platform windows_x86 port published 2015-09-22 reporter Nils Sommer source https://www.exploit-db.com/download/38275/ title Windows Kernel - Bitmap Handling Use-After-Free MS15-061 type dos
Msbulletin
bulletin_id | MS15-061 |
bulletin_url | |
date | 2015-06-09T00:00:00 |
impact | Elevation of Privilege |
knowledgebase_id | 3057839 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS15-061.NASL |
description | The remote Windows host is affected by multiple vulnerabilities : - An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling of buffer elements. A local attacker can exploit this vulnerability to request the contents of specific memory addresses. (CVE-2015-1719) - An elevation of privilege vulnerability exists in the Windows kernel-mode driver due to a user-after-free error. A remote attacker can exploit this vulnerability by convincing a user to run a specially crafted application, resulting in the execution of arbitrary code in kernel mode. (CVE-2015-1720) - A elevation of privilege vulnerability exists in the Windows kernel-mode driver due to a NULL pointer dereference flaw. A remote attacker can exploit this vulnerability by convincing a user to run a specially crafted application, resulting in the execution of arbitrary code in kernel mode. (CVE-2015-1721) - Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling of objects in memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to escalate privileges to full administrative rights. (CVE-2015-1722, CVE-2015-1723, CVE-2015-1724, CVE-2015-1726) - Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improperly validated user-supplied input. A local attacker can exploit these vulnerabilities, with a specially crafted application, to escalate privileges to full administrative rights. (CVE-2015-1725, CVE-2015-1727) - Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due a failure to properly free memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to execute arbitrary code in the context of another user. (CVE-2015-1725, CVE-2015-1727) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 84059 |
published | 2015-06-09 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/84059 |
title | MS15-061: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057839) |
code |
|