Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Windows . Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, cause denial of service and possibly to bypass security restrictions.
Below is a complete list of vulnerabilities:
- An incorrect applying of network isolation settings in Active Directory can be exploited remotely via a specially designed application to bypass security restrictions;
- Multiple improper memory address initialization vulnerabilities in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information;
- An improper HTTP 2.0 requests parsing in HTTP.sys can be exploited remotely via a specially designed request to cause denial of service;
- Multiple improper input validation vulnerabilities in Windows Hyper-V can be exploited locally via a specially designed application to obtain sensitive information;
- An incorrect handling of objects in memory in Windows Kernel can be exploited locally via a specially designed application to gain privileges;
- An incorrect untrusted files validation in Device Guard can be exploited locally via a specially designed application to bypass security restrictions;
- An improper handling of malformed SNMP traps in Windows SNMP can be exploited remotely via unknown vectors to cause denial of service and possibly to gain privileges;
- An incorrect requests handling in Remote Desktop Protocol (RDP) can be exploited remotely via a specially crafted requests to cause denial of service;
- Memory corruption vulnerability in Microsoft Malware Protection Engine can be exploited locally via a specially designed application to execute arbitrary code;
- Buffer overflow vulnerability in Microsoft JET Database Engine can be exploited remotely via a specially designed Excel file to execute arbitrary code;
- An incorrect handling of objects in memory in VBScript engine can be exploited remotely via a specially crafted website to execute arbitrary code and possible to gain privileges;
- An improper handling of objects in memory in Windows Adobe Type Manager Font Driver can be exploited locally via a specially crafted application to gain privileges;
- An incorrect kernel memory mapping in DirectX Graphics Kernel Subsystem can be exploited locally via a specially designed application to gain privileges;
- Multiple vulnerabilities in Windows font library can be exploited locally via a specially designed document file or remotely via a specially designed website to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2018-0890
- CVE-2018-0956
- CVE-2018-0957
- CVE-2018-0960
- CVE-2018-0963
- CVE-2018-0964
- CVE-2018-0966
- CVE-2018-0967
- CVE-2018-0968
- CVE-2018-0969
- CVE-2018-0970
- CVE-2018-0971
- CVE-2018-0972
- CVE-2018-0973
- CVE-2018-0974
- CVE-2018-0975
- CVE-2018-0976
- CVE-2018-1003
- CVE-2018-1004
- CVE-2018-1008
- CVE-2018-1009
- CVE-2018-1010
- CVE-2018-1012
- CVE-2018-1013
- CVE-2018-1015
- CVE-2018-1016
- CVE-2018-8116
CVE Liste
- CVE-2018-0887 critical
- CVE-2018-0890 critical
- CVE-2018-0956 critical
- CVE-2018-0957 critical
- CVE-2018-0960 critical
- CVE-2018-0963 critical
- CVE-2018-0964 critical
- CVE-2018-0966 critical
- CVE-2018-0967 critical
- CVE-2018-0968 critical
- CVE-2018-0969 critical
- CVE-2018-0970 critical
- CVE-2018-0971 critical
- CVE-2018-0972 critical
- CVE-2018-0973 critical
- CVE-2018-0974 critical
- CVE-2018-0975 critical
- CVE-2018-0976 critical
- CVE-2018-1003 critical
- CVE-2018-1004 critical
- CVE-2018-1008 critical
- CVE-2018-1009 critical
- CVE-2018-1010 critical
- CVE-2018-1012 critical
- CVE-2018-1013 critical
- CVE-2018-1015 critical
- CVE-2018-1016 critical
- CVE-2018-8116 critical
KB Liste
- 4093112
- 4103727
- 4093114
- 4093478
- 4093224
- 4093111
- 4093107
- 4093227
- 4093223
- 4093108
- 4093109
- 4093119
- 4093118
- 4093115
- 4093122
- 4093123
- 4093257
- 4091756
- 4284835
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!