|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Windows: privilege escalation via WebDAV
Synthesis of the vulnerability
A local attacker can use the WebDAV client of Windows, in order to escalate his privileges.
Vulnerable products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity of this weakness: 2/4.
Consequences of a hack: administrator access/rights, privileged access/rights.
Hacker's origin: user shell.
Creation date: 09/02/2016.
Revision date: 11/07/2016.
Références of this bulletin: 3136041, CERTFR-2016-AVI-060, CVE-2016-0051, MS16-016, VIGILANCE-VUL-18906.
Description of the vulnerability
The Windows product implements a WebDAV (Web Distributed Authoring and Versioning) client.
However, an attacker can inject commands in the WebDAV client.
A local attacker can therefore use the WebDAV client of Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a software vulnerabilities workaround. The technology watch team tracks security threats targeting the computer system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.