CERT/CC Details Critical Flaws in Microsoft Windows, Server
The vulnerabilities could be remotely exploited and give attackers control over affected systems.
The CERT Coordination Center (CERT/CC) today published data on vulnerabilities affecting versions of Microsoft Windows and Windows Server.
Microsoft had issued an advisory for CVE-2018-8611, a Windows kernel elevation of privilege bug that exists when the Windows kernel fails to properly handle objects in memory. An attacker who exploited this flaw could run arbitrary code in kernel mode. They could then install programs and view, change, or delete data, or create new accounts with full user rights.
The company also issued CVE-2018-8626 for a Windows DNS server heap overflow vulnerability. A remote code execution flaw exists in Windows DNS servers when they don't properly handle requests, Microsoft explains. Unauthorized actors who exploit this bug could run arbitrary code in the context of the Local System Account. Windows servers configured as DNS servers are at risk.
US-CERT, meanwhile, today advised users and system administrators to review CERT's vulnerability notes VU#289907 and VU#531281.
Read more details here.
About the Author
You May Also Like
The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024