KLA11195
Multiple vulnerabilities in Microsoft Windows
Updated: 07/22/2020
Detect date
?
02/13/2018
Severity
?
Critical
Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  2. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  3. An information disclosure vulnerability in Windows EOT Font Engine can be exploited remotely via specially crafted embedded to obtain sensitive information.
  4. An elevation of privilege vulnerability in Windows AppContainer can be exploited remotely via specially crafted application to gain privileges.
  5. An elevation of privilege vulnerability in Windows NTFS Global Reparse Point can be exploited remotely via specially crafted application to gain privileges.
  6. An elevation of privilege vulnerability in Named Pipe File System can be exploited remotely via specially crafted application to gain privileges.
  7. A remote code execution vulnerability in StructuredQuery can be exploited remotely via specially crafted file to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows Storage Services can be exploited remotely via specially crafted application to gain privileges.
  9. A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
  10. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  11. A denial of service vulnerability in Windows can be exploited remotely via specially crafted requests to cause denial of service.
  12. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  13. A memory corruption vulnerability in Windows Scripting Engine can be exploited remotely to obtain sensitive information.
Affected products

Windows Server 2016 (Server Core installation)
Windows 10 Version 1709 for x64-based Systems
Windows Server, version 1709 (Server Core Installation)

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2018-0742
CVE-2018-0756
CVE-2018-0757
CVE-2018-0760
CVE-2018-0809
CVE-2018-0810
CVE-2018-0820
CVE-2018-0821
CVE-2018-0822
CVE-2018-0823
CVE-2018-0825
CVE-2018-0826
CVE-2018-0827
CVE-2018-0828
CVE-2018-0829
CVE-2018-0830
CVE-2018-0831
CVE-2018-0832
CVE-2018-0833
CVE-2018-0842
CVE-2018-0843
CVE-2018-0844
CVE-2018-0846
CVE-2018-0847

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
?
CVE-2018-07420.0Unknown
CVE-2018-07560.0Unknown
CVE-2018-07570.0Unknown
CVE-2018-07600.0Unknown
CVE-2018-08090.0Unknown
CVE-2018-08100.0Unknown
CVE-2018-08200.0Unknown
CVE-2018-08210.0Unknown
CVE-2018-08220.0Unknown
CVE-2018-08230.0Unknown
CVE-2018-08250.0Unknown
CVE-2018-08260.0Unknown
CVE-2018-08270.0Unknown
CVE-2018-08280.0Unknown
CVE-2018-08290.0Unknown
CVE-2018-08300.0Unknown
CVE-2018-08310.0Unknown
CVE-2018-08320.0Unknown
CVE-2018-08330.0Unknown
CVE-2018-08420.0Unknown
CVE-2018-08430.0Unknown
CVE-2018-08440.0Unknown
CVE-2018-08460.0Unknown
CVE-2018-08470.0Unknown
Microsoft official advisories
Microsoft Security Update Guide
KB list

4074591
4074590
4074594
4074597
4074593
4074589
4074596
4074592
4074588

Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/44149

https://www.exploit-db.com/exploits/44147

https://www.exploit-db.com/exploits/44148

https://www.exploit-db.com/exploits/44152

https://www.exploit-db.com/exploits/44146

https://www.exploit-db.com/exploits/44189

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.