US-CERT (from the United States Computer Emergency Readiness Team) issued warnings about some vulnerabilities affecting Windows and Windows Server operating systems.
The organization he says that “a remote attacker could exploit these vulnerabilities to take control of a system”.
The vulnerabilities reported by US-CERT have reportedly already been patched by the Microsoft in 2018, and the company gives more information in the reports CVE-2018-8611 and CVE-2018-8626 .
Let's look at what Microsoft says:
CVE-2018-8611 affects all supported client and server versions Windows 10 and Windows Server 2019.
"There is an elevation of privilege when the Windows kernel does not properly handle "objects" in memory. An attacker who can exploit the vulnerability could execute arbitrary code in kernel mode. The attacker could then install programs. to change, view and even delete data, or even create new accounts with administrator rights,” explains Microsoft.
In the case of CVE-2018-8626, Microsoft reports that there is a Windows DNS server heap overflow vulnerability that exists only in Windows 10, Windows Server 2012 R2, Windows Server 2016 and Windows Server 2019.
“A vulnerability exists that could allow remote code execution on DNS servers (Windows Domain Name System), when requests cannot be handled properly. An attacker who could exploit the vulnerability could execute arbitrary code under the Local System Account. Windows servers configured as DNS servers are at risk from this vulnerability,” Microsoft says.
Updates for both vulnerabilities can be installed immediately from Windows Update on all supported versions of Windows.
______________________