Kaspersky ID:
KLA11009
Detect Date:
05/09/2017
Updated:
09/29/2020

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows SMB can be exploited remotely via specially crafted packet to obtain sensitive information.
  2. A denial of service vulnerability in Windows DNS Server can be exploited remotely to cause denial of service.
  3. A denial of service vulnerability in Windows SMB can be exploited remotely via specially crafted requests to cause denial of service.
  4. A remote code execution vulnerability in Windows SMB can be exploited remotely via specially crafted packet to execute arbitrary code.
  5. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  6. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  7. An elevation of privilege vulnerability in Windows COM can be exploited remotely via specially crafted application to gain privileges.
  8. An elevation of privilege vulnerability in Windows COM can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Hyper-V vSMB can be exploited remotely to gain privileges.
  10. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
  11. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to cause denial of service.
  12. An elevation of privilege vulnerability in Dxgkrnl.sys can be exploited remotely via specially crafted application to cause denial of service.
  13. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.

Original advisories

Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/44478

https://www.exploit-db.com/exploits/42007

https://www.exploit-db.com/exploits/42006

https://www.exploit-db.com/exploits/42008

https://www.exploit-db.com/exploits/42009

https://www.exploit-db.com/exploits/42021

https://www.exploit-db.com/exploits/42020

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2017-0280
    high
  • CVE-2017-0279
    high
  • CVE-2017-0278
    high
  • CVE-2017-0277
    high
  • CVE-2017-0276
    warning
  • CVE-2017-0275
    warning
  • CVE-2017-0274
    warning
  • CVE-2017-0273
    warning
  • CVE-2017-0272
    critical
  • CVE-2017-0271
    warning
  • CVE-2017-0270
    warning
  • CVE-2017-0269
    warning
  • CVE-2017-0268
    warning
  • CVE-2017-0267
    warning
  • CVE-2017-0263
    high
  • CVE-2017-0259
    warning
  • CVE-2017-0258
    warning
  • CVE-2017-0246
    high
  • CVE-2017-0245
    warning
  • CVE-2017-0220
    warning
  • CVE-2017-0214
    warning
  • CVE-2017-0213
    warning
  • CVE-2017-0212
    high
  • CVE-2017-0190
    warning
  • CVE-2017-0171
    warning
  • CVE-2017-0077
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.