![]() ![]() The information disclosure vulnerabilities by themselves do not allow arbitrary code execution. Vulnerabilities addressed in this bulletin: Microsoft Windows Kernel Memory Disclosure Vulnerability Information disclosure vulnerabilities exist when the Windows kernel-mode driver leaks private address information during a function call, which could allow the disclosure of kernel memory contents revealing information about the system to an attacker. The vulnerability cannot be exploited remotely or by anonymous users. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. An attacker could then install programs view, change, or delete data or create new accounts with full user rights. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on locally and runs arbitrary code in kernel mode. This security update resolves vulnerabilities in Microsoft Windows.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |