Kaspersky ID:
KLA11552
Detect Date:
09/10/2019
Updated:
10/08/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An information disclosure vulnerability in Windows SMB Client Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A cross-site-scripting (XSS) vulnerability Active Directory Federation Services can be exploited remotely via specially crafted request to spoof user interface.
  5. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  6. An elevation of privilege vulnerability in Microsoft Windows Store Installer can be exploited remotely via specially crafted application to gain privileges.
  7. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  8. An information disclosure vulnerability in DirectWrite can be exploited remotely via specially crafted document to obtain sensitive information.
  9. An information disclosure vulnerability in DirectX can be exploited remotely via specially crafted application to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
  11. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  12. An elevation of privilege vulnerability in Diagnostics Hub Standard Collector Service can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Media can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
  15. An elevation of privilege vulnerability in Microsoft Compatibility Appraiser can be exploited remotely via specially crafted application to gain privileges.
  16. A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
  17. An elevation of privilege vulnerability in Windows Network Connectivity Assistant can be exploited remotely via specially crafted application to gain privileges.
  18. An elevation of privilege vulnerability in Windows Audio Service can be exploited remotely via specially crafted application to gain privileges.
  19. An elevation of privilege vulnerability in Winlogon can be exploited remotely via specially crafted application to gain privileges.
  20. A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
  21. An elevation of privilege vulnerability in Windows Update Delivery Optimization can be exploited remotely to gain privileges.
  22. An information disclosure vulnerability in Windows Transaction Manager can be exploited remotely via specially crafted application to obtain sensitive information.
  23. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  24. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  25. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  26. A security feature bypass vulnerability in Windows Secure Boot can be exploited remotely to bypass security restrictions.
  27. An elevation of privilege vulnerability in Windows Text Service Framework can be exploited remotely via specially crafted application to gain privileges.
  28. An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2019-1246
    critical
  • CVE-2019-1292
    warning
  • CVE-2019-1215
    critical
  • CVE-2019-1250
    critical
  • CVE-2019-1293
    high
  • CVE-2019-1273
    high
  • CVE-2019-1249
    critical
  • CVE-2019-0788
    critical
  • CVE-2019-1242
    critical
  • CVE-2019-1270
    high
  • CVE-2019-1286
    high
  • CVE-2019-1240
    critical
  • CVE-2019-1252
    high
  • CVE-2019-1291
    critical
  • CVE-2019-1251
    high
  • CVE-2019-1216
    high
  • CVE-2019-1278
    critical
  • CVE-2019-1272
    critical
  • CVE-2019-1256
    critical
  • CVE-2019-1303
    critical
  • CVE-2019-1248
    critical
  • CVE-2019-1232
    critical
  • CVE-2019-1271
    critical
  • CVE-2019-0787
    critical
  • CVE-2019-1241
    critical
  • CVE-2019-1247
    critical
  • CVE-2019-1290
    critical
  • CVE-2019-1269
    critical
  • CVE-2019-1244
    high
  • CVE-2019-1253
    critical
  • CVE-2019-1267
    critical
  • CVE-2019-1280
    critical
  • CVE-2019-1287
    critical
  • CVE-2019-1277
    critical
  • CVE-2019-1268
    critical
  • CVE-2019-1285
    critical
  • CVE-2019-0928
    high
  • CVE-2019-1289
    high
  • CVE-2019-1219
    high
  • CVE-2019-1214
    critical
  • CVE-2019-1243
    critical
  • CVE-2019-1282
    high
  • CVE-2019-1274
    high
  • CVE-2019-1294
    warning
  • CVE-2019-1235
    critical
  • CVE-2019-1254
    high
  • CVE-2019-1245
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.