KLA11087
Multiple vulnerabilities in Microsoft Windows
Updated: 06/26/2019
Detect date
?
08/08/2017
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, cause a denial of service and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An improper handling of embedded fonts in Windows font library can be exploited remotely by hosting a specially designed website or by providing a specially crafted document file to execute arbitrary code;
  2. Multiple vulnerabilities related to an incorrect validating guest operating system user input in Windows Hyper-V can be exploited locally by running a specially designed application on a guest operating system to execute arbitrary code or to cause a denial of service;
  3. An incorrect handling of connection requests in Remote Desktop Protocol (RDP) can be exploited remotely by running a specially designed application against a server that provides RDP services to cause a denial of service;
  4. Multiple vulnerabilities related to an incorrect handling of objects in memory in Volume Manager Extension Driver and win32k component can be exploited locally by logging on to an affected system and running a specially designed application to obtain sensitive information;
  5. An improper handling of objects and file executing way in Windows Error Reporting (WER) can be exploited locally via a specially designed application to gain privileges;
  6. Multiple vulnerabilities related to an incorrect handling of objects in memory in Windows Subsystem for Linux and Windows Common Log File System can be exploited locally via a specially designed application to cause a denial of service against the local system;
  7. An incorrect handling of NT pipes in memory of Windows Subsystem for Linux can be exploited locally by running a specially designed application to gain privileges;
  8. An incorrect handling of objects in Win32k can be exploited locally by logging on to an affected system and running a specially designed application to execute arbitrary code in kernel mode;
  9. An improper handling of parameters in a method of a DCOM class in Windows Input Method Editor (IME) can be exploited locally by running a specially designed application to execute arbitrary code;
  10. An improper handling of objects in memory in Microsoft Windows PDF Library can be exploited remotely via a specially designed website that contains malicious PDF content to execute arbitrary code;
  11. An incorrect handling of object in Microsoft JET Database Engine can be exploited remotely by sending a specially designed database file via email and convincing a user to open it to execute arbitrary code;
  12. An incorrect handling of objects in memory in Windows Search can be exploited remotely by sending specially designed messages to the Windows Search service to execute arbitrary code;
  13. An improper handling of objects in memory in Win32k component can be exploited locally via a specially designed application to gain privileges;
  14. An improper NETBIOS packets handling in the Windows network stack can be exploited remotely by sending a series of TCP packets to a target system to cause denial of service.

Technical detailsVulnerability (9) can be exploited even if IME is not enabled.

On Windows 10, vulnerability (10) can be exploited via a specially designed website containing malicious PDF content. As for other operating systems, malicious users have to convince users to open a specially designed PDF document in browser by sending them a link in an email, instant message or as an email attachment.

Affected products

Microsoft Windows 7 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows 10
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2017-0174
CVE-2017-8620
CVE-2017-8593
CVE-2017-8591
CVE-2017-8633
CVE-2017-0293
CVE-2017-8691
CVE-2017-8623
CVE-2017-8622
CVE-2017-8668
CVE-2017-8627
CVE-2017-8673
CVE-2017-0250
CVE-2017-8664
CVE-2017-8666
CVE-2017-8624
CVE-2017-8620
CVE-2017-8691
CVE-2017-0250
CVE-2017-8633
CVE-2017-8668
CVE-2017-8627
CVE-2017-0293
CVE-2017-8666
CVE-2017-8673

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows 10
CVE-IDS
?
CVE-2017-85936.9High
CVE-2017-85917.2High
CVE-2017-86209.3Critical
CVE-2017-86647.2High
CVE-2017-86919.3Critical
CVE-2017-02509.3Critical
CVE-2017-86338.5Critical
CVE-2017-86236.8High
CVE-2017-86227.2High
CVE-2017-86682.1Warning
CVE-2017-86274.7Warning
CVE-2017-02937.6Critical
CVE-2017-01746.1High
CVE-2017-86662.1Warning
CVE-2017-86734.3Warning
CVE-2017-86247.2High
Microsoft official advisories
Microsoft Security Update Guide
KB list

4034668
4034674
4034681
4034658
4034660
4034666
4034665
4034672
4034679
4034664
4035055
4035056
4035679
4022750
4034745
4034744
4034034
4042050
4041689
4041693
4041687
4041676
4041690
4041678
4041681
4041691
4042895
4041679