CVE-2015-2517 – Microsoft Windows Kernel - Use-After-Free with Cursor Object (MS15-097)
https://notcve.org/view.php?id=CVE-2015-2517
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2518, and CVE-2015-2546. Vulnerabilidad en el controlador kernel-mode en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Memory Corruption Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2511, CVE-2015-2518 y CVE-2015-2546. The Microsoft Windows kernel suffers from a use-after-free vulnerability in the cursor object. • https://www.exploit-db.com/exploits/38278 http://www.securityfocus.com/bid/76606 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-2518 – Microsoft Windows Kernel - 'bGetRealizedBrush' Use-After-Free (MS15-097)
https://notcve.org/view.php?id=CVE-2015-2518
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2546. Vulnerabilidad en el controlador kernel-mode en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Memory Corruption Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2511, CVE-2015-2517 y CVE-2015-2546. The Microsoft Windows kernel suffers from a use-after-free vulnerability in BGetRealizedBrush. • https://www.exploit-db.com/exploits/38277 http://www.securityfocus.com/bid/76607 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-2546 – Microsoft Win32k Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2015-2546
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518. Vulnerabilidad en el controlador kernel-mode en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Memory Corruption Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2511, CVE-2015-2517 y CVE-2015-2518. The kernel-mode driver in Microsoft Windows OS and Server allows local users to gain privileges via a crafted application. • https://github.com/k0keoyo/CVE-2015-2546-Exploit http://www.securityfocus.com/bid/76608 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-5466 – XGI Windows VGA Display Manager 6.14.10.1090 - Arbitrary Write (PoC)
https://notcve.org/view.php?id=CVE-2015-5466
Silicon Integrated Systems XGI WindowsXP Display Manager (aka XGI VGA Driver Manager and VGA Display Manager) 6.14.10.1090 allows local users to gain privileges via a crafted 0x96002404 IOCTL call. Silicon Integrated Systems XGI WindowsXP Display Manager (también se conoce como XGI VGA Driver Manager y VGA Display Manager) versión 6.14.10.1090, permite a usuarios locales alcanzar privilegios por medio de una llamada IOCTL 0x96002404 diseñada. • https://www.exploit-db.com/exploits/38055 http://packetstormsecurity.com/files/133400/XGI-Windows-VGA-Display-Manager-Privilege-Escalation.html http://seclists.org/fulldisclosure/2015/Sep/2 http://www.securityfocus.com/archive/1/archive/1/536373/100/0/threaded https://www.korelogic.com/Resources/Advisories/KL-001-2015-004.txt • CWE-269: Improper Privilege Management •
CVE-2015-5465 – SiS Windows VGA Display Manager 6.14.10.3930 - Write-What-Where (PoC)
https://notcve.org/view.php?id=CVE-2015-5465
Silicon Integrated Systems WindowsXP Display Manager (aka VGA Driver Manager and VGA Display Manager) 6.14.10.3930 allows local users to gain privileges via a crafted (1) 0x96002400 or (2) 0x96002404 IOCTL call. Vulnerabilidad en Silicon Integrated Systems WindowsXP Display Manager (también conocido como VGA Driver Manager y VGA Display Manager) 6.14.10.3930, permite a usuarios locales obtener privilegios a través de una llamada IOCTL (1) 0x96002400 o (2) 0x96002404 manipulada. • https://www.exploit-db.com/exploits/38054 http://packetstormsecurity.com/files/133399/SiS-Windows-VGA-Display-Manager-Privilege-Escalation.html http://seclists.org/fulldisclosure/2015/Sep/1 http://www.securityfocus.com/archive/1/536370/100/0/threaded https://www.korelogic.com/Resources/Advisories/KL-001-2015-003.txt •