CERT/CC Details Critical Flaws in Microsoft Windows, Server

The vulnerabilities could be remotely exploited and give attackers control over affected systems.

Dark Reading Staff, Dark Reading

January 5, 2019

1 Min Read
Dark Reading logo in a gray background | Dark Reading

The CERT Coordination Center (CERT/CC) today published data on vulnerabilities affecting versions of Microsoft Windows and Windows Server.

Microsoft had issued an advisory for CVE-2018-8611, a Windows kernel elevation of privilege bug that exists when the Windows kernel fails to properly handle objects in memory. An attacker who exploited this flaw could run arbitrary code in kernel mode. They could then install programs and view, change, or delete data, or create new accounts with full user rights.

The company also issued CVE-2018-8626 for a Windows DNS server heap overflow vulnerability. A remote code execution flaw exists in Windows DNS servers when they don't properly handle requests, Microsoft explains. Unauthorized actors who exploit this bug could run arbitrary code in the context of the Local System Account. Windows servers configured as DNS servers are at risk.

US-CERT, meanwhile, today advised users and system administrators to review CERT's vulnerability notes VU#289907 and VU#531281

Read more details here.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights