Kaspersky ID:
KLA11875
Detect Date:
04/09/2019
Updated:
06/28/2024

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  3. A remote code execution vulnerability in Windows IOleCvt Interface can be exploited remotely via specially crafted website to execute arbitrary code.
  4. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  5. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  6. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  7. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  8. An elevation of privilege vulnerability in Windows CSRSS can be exploited remotely via specially crafted application to gain privileges.
  9. A remote code execution vulnerability in MS XML can be exploited remotely via specially crafted website to execute arbitrary code.
  10. A remote code execution vulnerability in OLE Automation can be exploited remotely via specially crafted website to execute arbitrary code.
  11. An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
  12. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  13. A remote code execution vulnerability in Windows can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
  15. A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
  16. A tampering vulnerability in Microsoft Browsers can be exploited remotely via specially crafted website to spoof user interface.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2019-0845
    critical
  • CVE-2019-0794
    critical
  • CVE-2019-0795
    critical
  • CVE-2019-0856
    high
  • CVE-2019-0803
    critical
  • CVE-2019-0792
    critical
  • CVE-2019-0879
    critical
  • CVE-2019-0842
    critical
  • CVE-2019-0846
    critical
  • CVE-2019-0796
    high
  • CVE-2019-0791
    critical
  • CVE-2019-0793
    critical
  • CVE-2019-0859
    critical
  • CVE-2019-0877
    critical
  • CVE-2019-0802
    high
  • CVE-2019-0847
    critical
  • CVE-2019-0805
    critical
  • CVE-2019-0730
    critical
  • CVE-2019-0849
    high
  • CVE-2019-0836
    critical
  • CVE-2019-0735
    critical
  • CVE-2019-0731
    critical
  • CVE-2019-0732
    critical
  • CVE-2019-0851
    critical
  • CVE-2019-0844
    high
  • CVE-2019-0853
    critical
  • CVE-2019-0838
    critical
  • CVE-2019-0848
    high
  • CVE-2019-0839
    warning
  • CVE-2019-0764
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.