KLA11165
Multiple vulnerabilities in Microsoft Windows
Updated: 01/22/2018
CVSS
?
6.5
Detect date
?
01/03/2018
Severity
?
High
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious user can exploit these vulnerabilities to cause denial of service, privilege escalation and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Improper handling objects in memory in Windows Adobe Type Manager Font Driver (ATMFD.dll) can be exploited locally to gain privileges;
  2. Improper handling objects in memory in Windows Adobe Type Manager Font Driver (ATMFD.dll) can be exploited locally to obtain sensitive information;
  3. Windows IPSec vulnerability can be exploited remotely to cause denial of service;
  4. Multiple elevation of privilege vulnerabilities in the way that the Windows Kernel API enforces permissions can be exploited locally to gain privileges;
  5. A Win32k information disclosure vulnerability in the Windows GDI component can be exploited locally to obtain sensitive information;
  6. A vulnerability in the Microsoft Server Message Block can be exploited locally to gain privileges;
  7. Multiple information disclosure vulnerabilities in the Windows kernel can be exploited locally to obtain sensitive information;
  8. Improper handling objects in memory in the Windows kernel can be exploited locally to gain privileges;
  9. An integer overflow in Windows Subsystem for Linux can be exploited locally to gain privileges;
  10. Improper handling objects in memory in the Color Management Module (ICM32.dll) can be exploited locally to obtain sensitive information;

 

All Kaspersky Lab business and consumer products are compatible with the update. Our database update on 28th December enables the compatibility flag, recommended by Microsoft, to allow devices to apply the update from 3rd January.

Further details of Kaspersky Lab compatibility with Microsoft security updates are on our Support page.

Our recommendation remains that for optimum protection against vulnerabilities, software and operating system updates should be installed as soon as possible.

More about the CPU vulnerabilities can be found on the Kaspersky Lab blog here and on the announcement website here.

Affected products

Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1511 for 32-bit Systems
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 7 for x64-based Systems Service Pack 1
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 R2
Windows 10 for 32-bit Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for 64-based Systems
Windows Server, version 1709 (Server Core Installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel). In addition, you may also need to install firmware updates from manufacturer of your device for increased protection. Check for relevant updates with manufacturer of your device.

Original advisories

ADV180002
CVE-2018-0741
CVE-2018-0743
CVE-2018-0744
CVE-2018-0745
CVE-2018-0746
CVE-2018-0747
CVE-2018-0748
CVE-2018-0749
CVE-2018-0750
CVE-2018-0751
CVE-2018-0752
CVE-2018-0753
CVE-2018-0754
CVE-2018-0788

Impacts
?
OSI 
[?]

PE 
[?]

DoS 
[?]
Related products
Microsoft Windows
Microsoft official advisories
ADV180002
CVE-2018-0741
CVE-2018-0743
CVE-2018-0744
CVE-2018-0745
CVE-2018-0746
CVE-2018-0747
CVE-2018-0748
CVE-2018-0749
CVE-2018-0750
CVE-2018-0751
CVE-2018-0752
CVE-2018-0753
CVE-2018-0754
CVE-2018-0788
KB list

4056894
4056897
4056898
4056888
4056890
4056893
4056891
4056892
4056942
4056896
4056899
4056613
4056615
4056759
4056944
405694
4057114
4058559
4057113
4058560
4057120
4057117
4023489
4023490
4073291