KLA11207
Multiple vulnerabilities in Microsoft Windows
Updated: 06/26/2019
Detect date
?
03/13/2018
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, execute arbitrary code, bypass security restrictions and gain privileges.

Below is a complete list of vulnerabilities:

  1. Multiple memory corruption vulnerabilities in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information or gain privileges;
  2. An incorrect handling of objects in memory in Windows Graphics Device Interface (GDI) can be exploited locally via running a specially crafted application to gain privileges;
  3. An incorrect input data processing in Windows Installer can be exploited locally via a specially designed input data;
  4. An unspecified vulnerability in Desktop Bridge VFS can be exploited locally via a specially crafted application to gain privileges;
  5. An improper XML validation in XML External Entities (XXE) can be exploited locally to obtain sensitive information;
  6. An incorrect handling of objects in memory in Microsoft Video Control can be exploited locally via running a specially crafted application to gain privileges;
  7. An improper processing of file destination path in copy function of Windows Shell can be exploited locally to execute arbitrary code;
  8. An unspecified vulnerability in Windows Scripting Host can be exploited locally to bypass security restrictions;
  9. An improper input validation in Microsoft Hyper-V Network Switch can be exploited locally via a specially designed application to cause denial of service;
  10. An unspecified vulnerability in Credential Security Support Provider protocol (CredSSP) can be exploited locally via running a specially designed application and performing a man-in-the-middle attack against a Remote Desktop Protocol session to execute arbitrary code;
  11. An improper validation and enforcing impersonation levels vulnerability in Cryptography Next Generation (CNG) kernel-mode driver can be exploited locally via running a specially designed application to bypass security restrictions;
  12. An incorrect handling of objects in memory in Storage Services can be exploited via a specially designed application to gain privileges.
Affected products

Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for 64-based Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server, version 1709 (Server Core Installation)

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2018-0811
CVE-2018-0813
CVE-2018-0814
CVE-2018-0815
CVE-2018-0816
CVE-2018-0817
CVE-2018-0868
CVE-2018-0877
CVE-2018-0878
CVE-2018-0880
CVE-2018-0881
CVE-2018-0882
CVE-2018-0883
CVE-2018-0884
CVE-2018-0885
CVE-2018-0886
CVE-2018-0888
CVE-2018-0894
CVE-2018-0895
CVE-2018-0896
CVE-2018-0897
CVE-2018-0898
CVE-2018-0899
CVE-2018-0900
CVE-2018-0901
CVE-2018-0902
CVE-2018-0904
CVE-2018-0926
CVE-2018-0977
CVE-2018-0983

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows 10
CVE-IDS
?
CVE-2018-08112.1Warning
CVE-2018-08132.1Warning
CVE-2018-08142.1Warning
CVE-2018-08156.9High
CVE-2018-08166.9High
CVE-2018-08176.9High
CVE-2018-08686.9High
CVE-2018-08777.2High
CVE-2018-08782.6Warning
CVE-2018-08806.9High
CVE-2018-08816.9High
CVE-2018-08826.9High
CVE-2018-08837.6Critical
CVE-2018-08844.6Warning
CVE-2018-08856.3High
CVE-2018-08867.6Critical
CVE-2018-08884.7Warning
CVE-2018-08941.9Warning
CVE-2018-08951.9Warning
CVE-2018-08961.9Warning
CVE-2018-08971.9Warning
CVE-2018-08981.9Warning
CVE-2018-08991.9Warning
CVE-2018-09001.9Warning
CVE-2018-09011.9Warning
CVE-2018-09024.6Warning
CVE-2018-09041.9Warning
CVE-2018-09262.1Warning
CVE-2018-09776.9High
CVE-2018-09836.9High
Microsoft official advisories
Microsoft Security Update Guide
KB list

4103723
4088782
4088787
4088786
4088779
4088878
4088877
4088875
4088776
4088876
4056564
4073011
4087398
4088827
4088879
4088880
4089175
4089229
4089344
4089453
4103716
4103731
4103715
4103721
4103712
4103730
4103726
4103718
4103727
4103725