漏洞类别:Windows
漏洞等级:
漏洞信息
This security update resolves vulnerabilities in Microsoft Windows. The security update addresses the vulnerabilities by:
Updating Windows NTLM to harden the password change cache. This security update corrects a local elevation of privilege that exists when Windows fails to properly handle NTLM password change requests. (CVE-2016-7238)
Changing the way that LSASS handles specially crafted requests. This security update corrects a denial of service vulnerability in the Local Security Authority Subsystem Service (LSASS) caused when an attacker sends a specially crafted request. (CVE-2016-7237)
Correcting how Windows Virtual Secure Mode handles objects in memory. An information disclosure vulnerability exists when Windows Virtual Secure Mode improperly handles objects in memory. (CVE-2016-7220)
This security update is rated Important for all supported releases of Microsoft Windows.
漏洞危害
The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first need to authenticate to the target, domain-joined system using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator. The attacker could then install programs; view, change or delete data; or create new accounts. The attacker could subsequently attempt to elevate by locally executing a specially crafted application designed to manipulate NTLM password change requests.
解决方案
Refer to Microsoft Security Bulletin MS16-137 for further details.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
0day
文章评论