Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (MS15-010)

ITS Advisory Number: 
2015-011
Date(s) Issued: 
Tuesday, February 10, 2015
Subject: 
Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (MS15-010)
Overview: 

Vulnerabilities have been discovered in Microsoft Windows Kernel-Mode Drivers that could allow for remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts.

Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining elevated user credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user or administrative rights.

Systems Affected: 
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows 8 and 8.1
  • Windows Server 2012
  • Windows RT
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Vulnerabilities have been discovered in Microsoft Windows Kernel-Mode Drivers that could allow for remote code execution.  The Windows kernel is the core of the operating system. It provides system-level services such as device management and memory management, allocates processor time to processes, and manages error handling. The details of the vulnerabilities are as follows:

  • An elevation of privilege vulnerability exists in the Windows kernel-mode driver (Win32k.sys) that is caused when it improperly handles objects in memory. [CVE-2015-0003] [CVE-2015-0057]
  • A security feature bypass vulnerability exists in the Cryptography Next Generation (CNG) kernel-mode driver (cng.sys) when it fails to properly validate and enforce impersonation levels. [CVE-2015-0010]
  • An elevation of privilege vulnerability exists in the Windows kernel-mode driver (win32k.sys) due to a double-free condition.[CVE-2015-0058]
  • A remote code execution vulnerability exists in the Windows kernel-mode driver (Win32k.sys) that is caused when it improperly handles TrueType fonts.[CVE-2015-0059]
  • A denial of service vulnerability exists in the Windows kernel-mode driver (Win32k.sys) that is caused when the Windows font mapper attempts to scale a font.[CVE-2015-0060]

Successful exploitation of these vulnerabilities could result in either an attacker gaining the same privileges as the logged on user, or gaining elevated user credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user or administrative rights.

 

Actions: 

We recommend the following actions be taken:

  • Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. 
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to open email attachments from unknown users or suspicious emails from trusted sources.
  • Apply Microsoft workaround if production allows, Set up a Registry entry to disable NULL page mapping (Windows 7 only); https://technet.microsoft.com/en-us/library/security/MS15-010