Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause a denial of service and obtain sensitive information. Below is a complete list of vulnerabilities:
- An improper provision of kernel information in the win32k component can be exploited via a specially designed application to obtain sensitive information;
- An incorrect handling of objects in memory in the Microsoft Graphics Component can be exploited via a specially designed application to gain privileges;
- An incorrect treating of requests coming from Extranet clients in ADFS can be exploited remotely via a specially designed application and brute-forcing an account password to bypass security restrictions;
- A vulnerability in Active Directory can be exploited remotely by sending malicious search queries to cause a denial of service;
- An improper sanitization of handles in memory in Microsoft Windows can be exploited to gain privileges;
- An improper calculation of request buffer lengths in LDAP can be exploited remotely via a specially designed application to gain privileges;
- An incorrect handling of objects in memory in the Windows kernel can be exploited via a specially designed application to obtain sensitive information;
- An incorrect handling of objects in memory in the Windows kernel-mode driver can be exploited via a specially designed application to gain privileges;
- An improper handling of objects in memory in the Windows an be exploited via a specially designed application to cause a denial of service;
- An incorrect handling of objects in memory in ATMFD.dll can be exploited by convincing a user to open a specially designed document or visit an untrusted webpage to obtain sensitive information;
- A fail of integrity-level check in Microsoft Windows OLE can be exploited to gain privileges;
- An improper handling of objects in memory in the VBScript scripting engine can be exploited remotely by convincing a user to view a specially designed website in Internet Exploreror by embedding and ActiveX control marked „safe for initialization“ in an application or Microsoft Office document which hosts the IE rendering engine to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2017-0167
- CVE-2017-0164
- CVE-2017-0165
- CVE-2017-0156
- CVE-2017-0155
- CVE-2017-0191
- CVE-2017-0159
- CVE-2017-0158
- CVE-2017-0188
- CVE-2017-0189
- CVE-2017-0058
- CVE-2017-0211
- CVE-2017-0192
- CVE-2017-0199
- CVE-2017-0058
- CVE-2017-0159
- CVE-2017-0164
- CVE-2017-0166
- CVE-2017-0167
- CVE-2017-0188
- CVE-2017-0191
- CVE-2017-0192
- CVE-2017-0211
- CVE-2017-0158
Ausnutzung
This vulnerability can be exploited by the following malware:
Exploit.MSOffice.CVE-2017-0199
CVE Liste
- CVE-2017-0199 critical
- CVE-2017-0058 critical
- CVE-2017-0155 critical
- CVE-2017-0156 critical
- CVE-2017-0159 critical
- CVE-2017-0164 critical
- CVE-2017-0165 critical
- CVE-2017-0166 critical
- CVE-2017-0167 critical
- CVE-2017-0188 critical
- CVE-2017-0189 critical
- CVE-2017-0191 critical
- CVE-2017-0192 critical
- CVE-2017-0211 critical
- CVE-2017-0158 critical
KB Liste
- 4015549
- 4015550
- 4015221
- 4015551
- 4015219
- 4022719
- 4015548
- 4015546
- 4014793
- 4022722
- 4022887
- 4015217
- 4015583
- 4015068
- 4015195
- 4015380
- 4015547
- 4015067
- 4020535
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!