Kaspersky ID:
KLA11875
Erkennungsdatum:
04/09/2019
Aktualisiert:
02/09/2026

Beschreibung

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  3. A remote code execution vulnerability in Windows IOleCvt Interface can be exploited remotely via specially crafted website to execute arbitrary code.
  4. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  5. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  6. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  7. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  8. An elevation of privilege vulnerability in Windows CSRSS can be exploited remotely via specially crafted application to gain privileges.
  9. A remote code execution vulnerability in MS XML can be exploited remotely via specially crafted website to execute arbitrary code.
  10. A remote code execution vulnerability in OLE Automation can be exploited remotely via specially crafted website to execute arbitrary code.
  11. An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
  12. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  13. A remote code execution vulnerability in Windows can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
  15. A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
  16. A tampering vulnerability in Microsoft Browsers can be exploited remotely via specially crafted website to spoof user interface.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2019-0845
    critical
  • CVE-2019-0794
    critical
  • CVE-2019-0795
    critical
  • CVE-2019-0856
    high
  • CVE-2019-0803
    critical
  • CVE-2019-0792
    critical
  • CVE-2019-0879
    critical
  • CVE-2019-0842
    critical
  • CVE-2019-0846
    critical
  • CVE-2019-0796
    high
  • CVE-2019-0791
    critical
  • CVE-2019-0793
    critical
  • CVE-2019-0859
    critical
  • CVE-2019-0877
    critical
  • CVE-2019-0802
    high
  • CVE-2019-0847
    critical
  • CVE-2019-0805
    critical
  • CVE-2019-0730
    critical
  • CVE-2019-0849
    high
  • CVE-2019-0836
    critical
  • CVE-2019-0735
    critical
  • CVE-2019-0731
    critical
  • CVE-2019-0732
    critical
  • CVE-2019-0851
    critical
  • CVE-2019-0844
    high
  • CVE-2019-0853
    critical
  • CVE-2019-0838
    critical
  • CVE-2019-0848
    high
  • CVE-2019-0839
    warning
  • CVE-2019-0764
    high

KB Liste

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.