Windows TDX elevation of privilege vulnerability: June 13, 2017

Applies to: Windows Server 2008 Service Pack 2Windows Server 2008 FoundationWindows Server 2008 Standard

Summary


An elevation of privilege vulnerability exists when tdx.sys fails to check the length of a buffer prior to copying memory to the buffer. To exploit the vulnerability, in a local attack scenario, an attacker could run a specially crafted application to elevate the attacker's privilege level. An attacker who successfully exploited this vulnerability could run processes in an elevated context. However, an attacker must first gain access to the local system with the ability to execute a malicious application in order to exploit this vulnerability.

The security update addresses the vulnerability by changing how tdx.sys validates buffer length.

To learn more about the vulnerability, go to CVE-2017-0296.

More Information


Important
 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update


Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information


For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

More Information


File information



File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 file information