CERT/CC Details Critical Flaws in Microsoft Windows, Server
The vulnerabilities could be remotely exploited and give attackers control over affected systems.
The CERT Coordination Center (CERT/CC) today published data on vulnerabilities affecting versions of Microsoft Windows and Windows Server.
Microsoft had issued an advisory for CVE-2018-8611, a Windows kernel elevation of privilege bug that exists when the Windows kernel fails to properly handle objects in memory. An attacker who exploited this flaw could run arbitrary code in kernel mode. They could then install programs and view, change, or delete data, or create new accounts with full user rights.
The company also issued CVE-2018-8626 for a Windows DNS server heap overflow vulnerability. A remote code execution flaw exists in Windows DNS servers when they don't properly handle requests, Microsoft explains. Unauthorized actors who exploit this bug could run arbitrary code in the context of the Local System Account. Windows servers configured as DNS servers are at risk.
US-CERT, meanwhile, today advised users and system administrators to review CERT's vulnerability notes VU#289907 and VU#531281.
Read more details here.
About the Author
You May Also Like