Описание
Windows Kernel Information Disclosure Vulnerability
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.
The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
FAQ
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Why is Microsoft documenting a CVE that was issued by Intel?
On November 12, 2019, Intel published a technical advisory around Intel® Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort vulnerability that is assigned CVE-2019-11135. Microsoft has released security updates to help mitigate this vulnerability. Please note the following:
- The operating systems protections are enabled by default for some Windows Server OS Editions. See Microsoft Knowledge Base Article 4072698 for more information.
- The operating systems protections are enabled by default for all Windows Client OS Editions. See Microsoft Knowledge Base Article 4073119 for more information.
- Customers who have elected not to enable this mitigation can alternatively choose to disable Intel's TSX feature on processors that support this action. Please see KB Microsoft Knowledge Base Article 4531006 for guidance on disabling TSX completely.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for Itanium-Based Systems Service Pack 2 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows 7 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
4.7 Medium
CVSS3
Связанные уязвимости
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
TSX Asynchronous Abort condition on some CPUs utilizing speculative ex ...
EPSS
4.7 Medium
CVSS3