KLA11221
Multiple vulnerabilities in Microsoft Windows
Updated: 12/04/2018
CVSS
?
9.3
Detect date
?
04/10/2018
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows . Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, cause denial of service and possibly to bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An incorrect applying of network isolation settings in Active Directory can be exploited remotely via a specially designed application to bypass security restrictions;
  2. Multiple improper memory address initialization vulnerabilities in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information;
  3. An improper HTTP 2.0 requests parsing in HTTP.sys can be exploited remotely via a specially designed request to cause denial of service;
  4. Multiple improper input validation vulnerabilities in Windows Hyper-V can be exploited locally via a specially designed application to obtain sensitive information;
  5. An incorrect handling of objects in memory in Windows Kernel can be exploited locally via a specially designed application to gain privileges;
  6. An incorrect untrusted files validation in Device Guard can be exploited locally via a specially designed application to bypass security restrictions;
  7. An improper handling of malformed SNMP traps in Windows SNMP can be exploited remotely via unknown vectors to cause denial of service and possibly to gain privileges;
  8. An incorrect requests handling in Remote Desktop Protocol (RDP) can be exploited remotely via a specially crafted requests to cause denial of service;
  9. Memory corruption vulnerability in Microsoft Malware Protection Engine can be exploited locally via a specially designed application to execute arbitrary code;
  10. Buffer overflow vulnerability in Microsoft JET Database Engine can be exploited remotely via a specially designed Excel file to execute arbitrary code;
  11. An incorrect handling of objects in memory in VBScript engine can be exploited remotely via a specially crafted website to execute arbitrary code and possible to gain privileges;
  12. An improper handling of objects in memory in Windows Adobe Type Manager Font Driver can be exploited locally via a specially crafted application to gain privileges;
  13. An incorrect kernel memory mapping in DirectX Graphics Kernel Subsystem can be exploited locally via a specially designed application to gain privileges;
  14. Multiple vulnerabilities in Windows font library can be exploited locally via a specially designed document file or remotely via a specially designed website to execute arbitrary code.
Affected products

Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for 64-based Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Defender
Windows Intune Endpoint Protection
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server, version 1709 (Server Core Installation)

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2018-0887
CVE-2018-0890
CVE-2018-0956
CVE-2018-0957
CVE-2018-0960
CVE-2018-0963
CVE-2018-0964
CVE-2018-0966
CVE-2018-0967
CVE-2018-0968
CVE-2018-0969
CVE-2018-0970
CVE-2018-0971
CVE-2018-0972
CVE-2018-0973
CVE-2018-0974
CVE-2018-0975
CVE-2018-0976
CVE-2018-1003
CVE-2018-1004
CVE-2018-1008
CVE-2018-1009
CVE-2018-1010
CVE-2018-1012
CVE-2018-1013
CVE-2018-1015
CVE-2018-1016
CVE-2018-8116

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows 10
Windows Defender
CVE-IDS
?

CVE-2018-0887
CVE-2018-0890
CVE-2018-0956
CVE-2018-0957
CVE-2018-0960
CVE-2018-0963
CVE-2018-0964
CVE-2018-0966
CVE-2018-0967
CVE-2018-0968
CVE-2018-0969
CVE-2018-0970
CVE-2018-0971
CVE-2018-0972
CVE-2018-0973
CVE-2018-0974
CVE-2018-0975
CVE-2018-0976
CVE-2018-1003
CVE-2018-1004
CVE-2018-1008
CVE-2018-1009
CVE-2018-1010
CVE-2018-1012
CVE-2018-1013
CVE-2018-1015
CVE-2018-1016
CVE-2018-8116

Microsoft official advisories
Microsoft Security Update Guide
KB list

4093112
4103727
4093114
4093478
4093224
4093111
4093107
4093227
4093223
4093108
4093109
4093119
4093118
4093115
4093122
4093123
4093257
4091756
4284835