KB4100480: Windows Kernel Elevation of Privilege Vulnerability

high Nessus Plugin ID 108757

Synopsis

The remote Windows host is affected by elevation of privilege vulnerability.

Description

The remote Windows host is missing security update 4100480. It is, therefore, affected by an elevation of privilege vulnerability that exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system.

Solution

Apply KB4100480.

See Also

http://www.nessus.org/u?0a34a061

https://blog.frizk.net/2018/03/total-meltdown.html

https://github.com/ufrisk/pcileech

Plugin Details

Severity: High

ID: 108757

File Name: smb_nt_ms18_mar_4100480.nasl

Version: 1.7

Type: local

Agent: windows

Published: 3/30/2018

Updated: 11/22/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-1038

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/30/2018

Vulnerability Publication Date: 3/30/2018

Reference Information

CVE: CVE-2018-1038

MSFT: MS18-4100480

MSKB: 4100480