Vulnerabilities > CVE-2015-1724 - Use After Free vulnerability in Microsoft products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Object Use After Free Vulnerability." CWE-416: Use After Free
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | Windows Kernel - Brush Object Use-After-Free Vulnerability (MS15-061). CVE-2015-1724. Dos exploit for windows platform |
file | exploits/windows/dos/38272.txt |
id | EDB-ID:38272 |
last seen | 2016-02-04 |
modified | 2015-09-22 |
platform | windows |
port | |
published | 2015-09-22 |
reporter | Google Security Research |
source | https://www.exploit-db.com/download/38272/ |
title | Windows Kernel - Brush Object Use-After-Free Vulnerability MS15-061 |
type | dos |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS15-061.NASL |
description | The remote Windows host is affected by multiple vulnerabilities : - An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling of buffer elements. A local attacker can exploit this vulnerability to request the contents of specific memory addresses. (CVE-2015-1719) - An elevation of privilege vulnerability exists in the Windows kernel-mode driver due to a user-after-free error. A remote attacker can exploit this vulnerability by convincing a user to run a specially crafted application, resulting in the execution of arbitrary code in kernel mode. (CVE-2015-1720) - A elevation of privilege vulnerability exists in the Windows kernel-mode driver due to a NULL pointer dereference flaw. A remote attacker can exploit this vulnerability by convincing a user to run a specially crafted application, resulting in the execution of arbitrary code in kernel mode. (CVE-2015-1721) - Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling of objects in memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to escalate privileges to full administrative rights. (CVE-2015-1722, CVE-2015-1723, CVE-2015-1724, CVE-2015-1726) - Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improperly validated user-supplied input. A local attacker can exploit these vulnerabilities, with a specially crafted application, to escalate privileges to full administrative rights. (CVE-2015-1725, CVE-2015-1727) - Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due a failure to properly free memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to execute arbitrary code in the context of another user. (CVE-2015-1725, CVE-2015-1727) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 84059 |
published | 2015-06-09 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/84059 |
title | MS15-061: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057839) |
code |
|