Beschreibung
Multiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, bypass security restrictions, spoof user interface. Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Windows COM can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Audio Service can be exploited locally via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited locally via specially crafted application to gain privileges.
- A security feature bypass vulnerability in BitLocker can be exploited locally to bypass security restrictions.
- An elevation of privilege vulnerability in DirectX can be exploited locally via specially crafted application to gain privileges.
- An information disclosure vulnerability in DirectX can be exploited locally via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows can be exploited locally via console to gain privileges.
- A tampering vulnerability in Microsoft PowerShell can be exploited locally via specially crafted application to spoof user interface.
- An elevation of privilege vulnerability in Microsoft RemoteFX Virtual GPU miniport driver can be exploited locally via specially crafted application to gain privileges.
- A cross-site-scripting (XSS) vulnerability in Active Directory Federation Services can be exploited remotely via specially crafted web to spoof user interface.
- A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in DirectX can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Deployment Services TFTP Server can be exploited remotely via specially crafted request to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Win32k can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Microsoft PowerShell can be exploited remotely via specially crafted files to execute arbitrary code.
- An information disclosure vulnerability in Win32k can be exploited locally via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in DirectX can be exploited locally via specially crafted application to gain privileges.
- A security feature bypass vulnerability in Microsoft JScript can be exploited locally via specially crafted application to bypass security restrictions.
- A security feature bypass vulnerability in Windows can be exploited locally to bypass security restrictions.
- A remote code execution vulnerability in Windows Search can be exploited remotely via specially crafted messages to execute arbitrary code.
- An information disclosure vulnerability in MSRPC can be exploited locally via specially crafted application to obtain sensitive information.
Technical details
CVE-2018-8589 was discovered and reported by Igor Soumenkov (2igosha) and Boris Larin (Oct0xor) of Kaspersky Lab. Details about this vulnerability can be found in the following article: A new exploit for zero-day vulnerability CVE-2018-8589.
Ursprüngliche Informationshinweise
- CVE-2018-8553
- CVE-2018-8550
- CVE-2018-8454
- CVE-2018-8562
- CVE-2018-8566
- CVE-2018-8561
- CVE-2018-8563
- CVE-2018-8592
- CVE-2018-8415
- CVE-2018-8471
- CVE-2018-8547
- CVE-2018-8544
- CVE-2018-8584
- CVE-2018-8485
- CVE-2018-8476
- CVE-2018-8589
- CVE-2018-8256
- CVE-2018-8565
- CVE-2018-8554
- CVE-2018-8417
- CVE-2018-8549
- CVE-2018-8450
- CVE-2018-8407
- ADV990001
CVE Liste
- CVE-2018-8408 critical
- CVE-2018-8553 critical
- CVE-2018-8550 critical
- CVE-2018-8454 critical
- CVE-2018-8562 critical
- CVE-2018-8566 critical
- CVE-2018-8561 critical
- CVE-2018-8563 critical
- CVE-2018-8592 critical
- CVE-2018-8415 critical
- CVE-2018-8471 critical
- CVE-2018-8547 critical
- CVE-2018-8544 critical
- CVE-2018-8584 critical
- CVE-2018-8485 critical
- CVE-2018-8476 critical
- CVE-2018-8589 critical
- CVE-2018-8256 critical
- CVE-2018-8565 critical
- CVE-2018-8554 critical
- CVE-2018-8417 critical
- CVE-2018-8549 critical
- CVE-2018-8450 critical
- CVE-2018-8407 critical
KB Liste
- 4467680
- 4467708
- 4467691
- 4467702
- 4467686
- 4467696
- 4467701
- 4467697
- 4467706
- 4467107
- 4465664
- 4093430
- 4465663
- 4467703
- 4465660
- 4467678
- 4465659
- 3173426
- 4467700
- 4465661
- 3173424
- 4467106
- 4470788
- 4485448
- 4485447
- 4487327
- 4485449
- 4490628
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com