Kaspersky ID:
KLA11534
Detect Date:
08/13/2019
Updated:
02/02/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, cause denial of service, spoof user interface, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows Graphics Component can be exploited remotely via specially crafted document to obtain sensitive information.
  2. A remote code execution vulnerability in Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  3. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  4. An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
  5. A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
  6. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  7. A denial of service vulnerability in Windows can be exploited remotely via specially crafted application to cause denial of service.
  8. An elevation of privilege vulnerability in DirectX can be exploited remotely via specially crafted application to gain privileges.
  9. A remote code execution vulnerability in Microsoft Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
  10. Microsoft is aware of the Bluetooth BR/EDR key negotiation vulnerability that exists at the hardware specification level of any BR/EDR Bluetooth device. To address the vulnerability Microsoft has released an update that enforces a default minimum key length to ensure that the key negotiation does not trivialize the encryption.
  11. A denial of service vulnerability in HTTP/2 Server can be exploited remotely via specially crafted to cause denial of service.
  12. A remote code execution vulnerability in Remote Desktop Services can be exploited remotely via specially crafted requests to execute arbitrary code.
  13. An information disclosure vulnerability in Microsoft Graphics Component can be exploited remotely via specially crafted application to obtain sensitive information.
  14. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  15. An information disclosure vulnerability in SymCrypt can be exploited remotely via specially crafted application to obtain sensitive information.
  16. A denial of service vulnerability in XmlLite Runtime can be exploited remotely via specially crafted requests to cause denial of service.
  17. A security feature bypass vulnerability in Windows File Signature can be exploited remotely to bypass security restrictions.
  18. An information disclosure vulnerability in Windows can be exploited remotely via specially crafted website to obtain sensitive information.
  19. An elevation of privilege vulnerability in Windows Subsystem for Linux can be exploited remotely via specially crafted application to gain privileges.
  20. A denial of service vulnerability in Windows DHCP Server can be exploited remotely via specially crafted packets to cause denial of service.
  21. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  22. A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
  23. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
  24. A denial of service vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to cause denial of service.
  25. An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
  26. A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely.
  27. An information disclosure vulnerability in Remote Desktop Protocol Server can be exploited remotely via specially crafted application to obtain sensitive information.
  28. A remote code execution vulnerability in MS XML can be exploited remotely via specially crafted website to execute arbitrary code.
  29. A remote code execution vulnerability in Windows DHCP Client can be exploited remotely via specially crafted to execute arbitrary code.
  30. An elevation of privilege vulnerability in Microsoft Windows p2pimsvc can be exploited remotely via specially crafted application to gain privileges.
  31. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  32. An elevation of privilege vulnerability in Windows NTFS can be exploited remotely via specially crafted application to gain privileges.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2019-1143
    high
  • CVE-2019-0720
    critical
  • CVE-2019-1179
    critical
  • CVE-2019-1175
    critical
  • CVE-2019-1190
    critical
  • CVE-2019-0715
    high
  • CVE-2019-1174
    critical
  • CVE-2019-1227
    high
  • CVE-2019-0716
    warning
  • CVE-2019-1176
    critical
  • CVE-2019-1144
    critical
  • CVE-2019-9506
    critical
  • CVE-2019-9513
    critical
  • CVE-2019-1226
    critical
  • CVE-2019-1177
    critical
  • CVE-2019-1186
    critical
  • CVE-2019-9511
    critical
  • CVE-2019-1153
    high
  • CVE-2019-1147
    critical
  • CVE-2019-1078
    high
  • CVE-2019-1171
    high
  • CVE-2019-0714
    high
  • CVE-2019-1145
    critical
  • CVE-2019-9514
    critical
  • CVE-2019-1170
    critical
  • CVE-2019-1187
    critical
  • CVE-2019-1151
    critical
  • CVE-2019-9512
    critical
  • CVE-2019-1146
    critical
  • CVE-2019-1148
    high
  • CVE-2019-1178
    critical
  • CVE-2019-1180
    critical
  • CVE-2019-1181
    critical
  • CVE-2019-1157
    critical
  • CVE-2019-1163
    high
  • CVE-2019-0718
    high
  • CVE-2019-1172
    warning
  • CVE-2019-1155
    critical
  • CVE-2019-0723
    high
  • CVE-2019-1185
    critical
  • CVE-2019-1149
    critical
  • CVE-2019-1206
    critical
  • CVE-2019-1159
    critical
  • CVE-2019-1188
    critical
  • CVE-2019-1173
    critical
  • CVE-2019-1212
    critical
  • CVE-2019-1162
    critical
  • CVE-2019-1150
    critical
  • CVE-2019-1164
    critical
  • CVE-2019-9518
    critical
  • CVE-2019-1222
    critical
  • CVE-2019-1223
    critical
  • CVE-2019-1152
    critical
  • CVE-2019-1198
    high
  • CVE-2019-1158
    high
  • CVE-2019-1183
    critical
  • CVE-2019-1156
    critical
  • CVE-2019-1225
    critical
  • CVE-2019-1182
    critical
  • CVE-2019-1057
    critical
  • CVE-2019-1224
    critical
  • CVE-2019-0736
    critical
  • CVE-2019-1168
    critical
  • CVE-2019-0965
    critical
  • CVE-2019-0717
    high
  • CVE-2019-1184
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.