Beschreibung
Multiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, write local files, gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Incorrect input validation in Windows Hyper-V on a host server can be exploited locally via specially designed application to execute arbitrary code;
- Unspecified vulnerability related to improper file information disclosure in Windows Media Player can be exploited remotely via specially designed website to obtain sensitive information;
- Incorrect handling objects in memory in DirectX Graphics Kernel (DXGKRNL) driver can be exploited locally via specially designed application to gain privileges;
- Incorrect handling objects in memory in DirectX can be exploited locally via specially designed application to obtain sensitive information;
- Unspecified vulnerability in DNS Global Blocklist can be exploited via unspecified vector to bypass security restrictions;
- Improper handling objects in memory in Windows Subsystem for Linux can be exploited locally via specially designed application to gain privileges;
- Vulnerability related to improper decompressing in Windows Theme API can be exploited remotely via specially designed file to execute arbitrary code;
- Improper access checking in NTFS can be exploited locally via specially designed application to gain privileges;
- Improper handling objects in memory in Microsoft Graphics Components can be exploited locally via specially designed file to execute arbitrary code;
- Improper handling objects in memory in Windows can be exploited locally via specially designed application to gain privileges;
- Incorrect handling objects in memory, allowing an attacker to retrieve information from a targeted system in the Windows Graphics Device Interface (GDI) can be exploited locally via specially designed application to obtain sensitive information;
- Incorrect handling objects in memory in the Windows Kernel can be exploited locally via specially designed application to gain privileges;
- Unspecified vulnerability in Windows Shell can be exploited remotely via specially designed website to execute arbitrary code;
- Incorrect input validation in Microsoft XML Core Services MSXML can be exploited remotely via specially designed website to execute arbitrary code;
- Unspecified vulnerability in Windows TCP/IP stack can be exploited remotely via specially designed fragmented IP packets to obtain sensitive information;
- Unspecified vulnerability in Device Guard can be exploited via unspecified vector to bypass security restrictions;
- Incorrect input validation in Windows Hyper-V on a host server can be exploited locally via specially designed application to execute arbitrary code;
- Incorrect handling objects in memory in Filter Manager can be exploited locally via specially designed file to gain privileges;
- Incorrect handling objects in memory in Windows kernel can be exploited locally via specially designed application to obtain sensitive information;
- Incorrect handling objects in memory in Microsoft JET Database Engine can be exploited locally via specially designed file to execute arbitrary code;
- Improper handling objects in memory in Microsoft Graphics Components can be exploited locally via specially designed file to obtain sensitive information;
- Incorrect handling objects in memory in Microsoft Windows Codecs Library can be exploited remotely via specially designed image to obtain sensitive information.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2018-8320 critical
- CVE-2018-8333 critical
- CVE-2018-8423 critical
- CVE-2018-8432 critical
- CVE-2018-8486 critical
- CVE-2018-8330 critical
- CVE-2018-8493 critical
- CVE-2018-8472 critical
- CVE-2018-8492 critical
- CVE-2018-8481 critical
- CVE-2018-8482 critical
- CVE-2018-8506 critical
- CVE-2018-8490 critical
- CVE-2018-8413 critical
- CVE-2018-8329 critical
- CVE-2018-8453 critical
- CVE-2018-8411 critical
- CVE-2018-8494 critical
- CVE-2018-8495 critical
- CVE-2018-8484 critical
- CVE-2018-8427 critical
- CVE-2018-8489 critical
- CVE-2018-8497 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!