Microsoft has updates to handle vulnerabilities affecting versions of Microsoft Windows and Windows Server, said officials at the CERT Coordination Center (CERT/CC).
A remote attacker could exploit these vulnerabilities to take control of an affected system.
In one vulnerability, the Microsoft Windows Kernel Transaction Manager (KTM) is vulnerable to a race condition because it fails to properly handle objects in memory, which can result in local privilege escalation.
The Windows kernel fails “to properly handle objects in memory,” according to Microsoft. A successful attacker could run arbitrary code in kernel mode, and then “install programs; view, change, or delete data; or create new accounts with full user rights.”
After logging into the system, an attacker could run a maliciously crafted application to exploit the race condition. They could then elevate their local privileges, create user accounts, install new programs, or change, view, or delete data.
“The exploit can also be used to escape the sandbox in modern Web browsers, including Chrome and Edge,” said researchers at Kaspersky Lab.
In the other vulnerability, Microsoft Windows DNS servers are vulnerable to heap overflow attacks, enabling unauthenticated attackers to send malicious requests to affected servers.
Microsoft Windows Domain Name System (DNS) servers are vulnerable to heap overflow attacks. Microsoft acknowledges “an attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account.” This remote code execution vulnerability exists in Windows DNS servers when they fail to properly handle requests.
Windows servers that are configured as DNS servers are at risk from this vulnerability. A successful attack could allow the execution of arbitrary code. Researchers at Symantec said an unsuccessful attack results in a denial-of-service.