SB2021101215 - Multiple vulnerabilities in Microsoft Storage Spaces Controller
Published: October 12, 2021 Updated: October 14, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2021-26441)
The vulnerability allows a local user to escalate privileges on the system.The vulnerability exists due to integer overflow within the Storage Spaces Controller storport.sys driver. A local user can run a specially crafted program to trigger integer overflow and execute arbitrary code with SYSTEM privileges.
2) Integer overflow (CVE-ID: CVE-2021-40478)
The vulnerability allows a local user to escalate privileges on the system.The vulnerability exists due to integer overflow within the Storage Spaces Controller storport.sys driver. A local user can run a specially crafted program to trigger integer overflow and execute arbitrary code with SYSTEM privileges.
3) Integer overflow (CVE-ID: CVE-2021-41345)
The vulnerability allows a local user to escalate privileges on the system.The vulnerability exists due to integer overflow within the Storage Spaces Controller storport.sys driver. A local user can run a specially crafted program to trigger integer overflow and execute arbitrary code with SYSTEM privileges.
4) Integer overflow (CVE-ID: CVE-2021-40488)
The vulnerability allows a local user to escalate privileges on the system.The vulnerability exists due to integer overflow within the Storage Spaces Controller storport.sys driver. A local user can run a specially crafted program to trigger integer overflow and execute arbitrary code with SYSTEM privileges.
5) Integer overflow (CVE-ID: CVE-2021-40489)
The vulnerability allows a local user to escalate privileges on the system.The vulnerability exists due to integer overflow within the Storage Spaces Controller storport.sys driver. A local user can run a specially crafted program to trigger integer overflow and execute arbitrary code with SYSTEM privileges.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26441
- https://www.zerodayinitiative.com/advisories/ZDI-21-1157/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478
- https://www.zerodayinitiative.com/advisories/ZDI-21-1155/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41345
- https://www.zerodayinitiative.com/advisories/ZDI-21-1154/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488
- https://www.zerodayinitiative.com/advisories/ZDI-21-1153/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489
- https://www.zerodayinitiative.com/advisories/ZDI-21-1156/