Kaspersky ID:
KLA11881
Detect Date:
01/08/2019
Updated:
01/22/2024

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2019-0549
    warning
  • CVE-2019-0583
    critical
  • CVE-2019-0543
    warning
  • CVE-2019-0580
    critical
  • CVE-2019-0569
    warning
  • CVE-2019-0577
    critical
  • CVE-2019-0554
    warning
  • CVE-2019-0581
    critical
  • CVE-2019-0582
    critical
  • CVE-2019-0579
    critical
  • CVE-2019-0536
    warning
  • CVE-2019-0578
    critical
  • CVE-2019-0584
    critical
  • CVE-2019-0538
    critical
  • CVE-2019-0576
    critical
  • CVE-2019-0575
    critical
  • CVE-2019-0541
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.