Kaspersky ID:
KLA73906
Erkennungsdatum:
10/08/2024
Aktualisiert:
10/10/2024

Beschreibung

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Visual C++ Redistributable Installer can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in .NET and Visual Studio can be exploited remotely to execute arbitrary code
  3. A remote code execution vulnerability in Visual Studio Code extension for Arduino can be exploited remotely to execute arbitrary code.
  4. A remote code execution vulnerability in DeepSpeed can be exploited remotely to execute arbitrary code.
  5. Implementation vulnerability in .NET, .NET Framework, and Visual Studio can be exploited to cause denial of service.
  6. A remote code execution vulnerability in Visual Studio Code for Linux can be exploited remotely to execute arbitrary code.
  7. Implementation vulnerability in .NET and Visual Studio can be exploited to cause denial of service.
  8. Denial of service vulnerability can be exploited remotely to cause denial of service.

Ursprüngliche Informationshinweise

Betroffene Produkte

CVE Liste

  • CVE-2024-38229
    critical
  • CVE-2024-43485
    critical
  • CVE-2024-43484
    critical
  • CVE-2024-43483
    critical
  • CVE-2024-43590
    critical
  • CVE-2024-43488
    critical
  • CVE-2024-43497
    critical
  • CVE-2024-43601
    high
  • CVE-2024-43603
    high

KB Liste

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.