Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, execute arbitrary code, bypass security restrictions and gain privileges.
Below is a complete list of vulnerabilities:
- Multiple memory corruption vulnerabilities in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information or gain privileges;
- An incorrect handling of objects in memory in Windows Graphics Device Interface (GDI) can be exploited locally via running a specially crafted application to gain privileges;
- An incorrect input data processing in Windows Installer can be exploited locally via a specially designed input data;
- An unspecified vulnerability in Desktop Bridge VFS can be exploited locally via a specially crafted application to gain privileges;
- An improper XML validation in XML External Entities (XXE) can be exploited locally to obtain sensitive information;
- An incorrect handling of objects in memory in Microsoft Video Control can be exploited locally via running a specially crafted application to gain privileges;
- An improper processing of file destination path in copy function of Windows Shell can be exploited locally to execute arbitrary code;
- An unspecified vulnerability in Windows Scripting Host can be exploited locally to bypass security restrictions;
- An improper input validation in Microsoft Hyper-V Network Switch can be exploited locally via a specially designed application to cause denial of service;
- An unspecified vulnerability in Credential Security Support Provider protocol (CredSSP) can be exploited locally via running a specially designed application and performing a man-in-the-middle attack against a Remote Desktop Protocol session to execute arbitrary code;
- An improper validation and enforcing impersonation levels vulnerability in Cryptography Next Generation (CNG) kernel-mode driver can be exploited locally via running a specially designed application to bypass security restrictions;
- An incorrect handling of objects in memory in Storage Services can be exploited via a specially designed application to gain privileges.
Ursprüngliche Informationshinweise
- CVE-2018-0813
- CVE-2018-0814
- CVE-2018-0815
- CVE-2018-0816
- CVE-2018-0817
- CVE-2018-0868
- CVE-2018-0877
- CVE-2018-0878
- CVE-2018-0880
- CVE-2018-0881
- CVE-2018-0882
- CVE-2018-0883
- CVE-2018-0884
- CVE-2018-0885
- CVE-2018-0886
- CVE-2018-0888
- CVE-2018-0894
- CVE-2018-0895
- CVE-2018-0896
- CVE-2018-0897
- CVE-2018-0898
- CVE-2018-0899
- CVE-2018-0900
- CVE-2018-0901
- CVE-2018-0902
- CVE-2018-0904
- CVE-2018-0926
- CVE-2018-0977
- CVE-2018-0983
CVE Liste
- CVE-2018-0811 critical
- CVE-2018-0813 critical
- CVE-2018-0814 critical
- CVE-2018-0815 critical
- CVE-2018-0816 critical
- CVE-2018-0817 critical
- CVE-2018-0868 critical
- CVE-2018-0877 critical
- CVE-2018-0878 critical
- CVE-2018-0880 critical
- CVE-2018-0881 critical
- CVE-2018-0882 critical
- CVE-2018-0883 critical
- CVE-2018-0884 critical
- CVE-2018-0885 critical
- CVE-2018-0886 critical
- CVE-2018-0888 critical
- CVE-2018-0894 critical
- CVE-2018-0895 critical
- CVE-2018-0896 critical
- CVE-2018-0897 critical
- CVE-2018-0898 critical
- CVE-2018-0899 critical
- CVE-2018-0900 critical
- CVE-2018-0901 critical
- CVE-2018-0902 critical
- CVE-2018-0904 critical
- CVE-2018-0926 critical
- CVE-2018-0977 critical
- CVE-2018-0983 critical
KB Liste
- 4103723
- 4088782
- 4088787
- 4088786
- 4088779
- 4088878
- 4088877
- 4088875
- 4088776
- 4088876
- 4056564
- 4073011
- 4087398
- 4088827
- 4088879
- 4088880
- 4089175
- 4089229
- 4089344
- 4089453
- 4103716
- 4103731
- 4103715
- 4103721
- 4103712
- 4103730
- 4103726
- 4103718
- 4103727
- 4103725
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!