Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows COM Aggregate Marshaler can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows when the Win32k component fails to properly handle objects in memory can be exploited remotely to gain privileges.
- Information disclosure vulnerability when DirectX improperly handles objects in memory can be exploited to obtain sensitive information.
- A tampering vulnerability exists in PowerShell can be exploited to execute unlogged code.
- An elevation of privilege vulnerability in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory can be exploited remotely to gain privileges.
- A remote code execution vulnerability in the way that the VBScript engine handles objects in memory can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in the way that Windows Deployment Services TFTP Server handles objects in memory can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability when Windows improperly handles calls to Win32k.sys can be exploited remotely to gain privileges.
- A remote code execution vulnerability when PowerShell improperly handles specially crafted files can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability when the win32k component improperly provides kernel information can be exploited to obtain sensitive information.
- A remote code execution vulnerability when Windows Search handles objects in memory can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability when “Kernel Remote Procedure Call Provider” driver improperly initializes objects in memory can be exploited to obtain sensitive information.
- Security vulnerability when Windows incorrectly validates kernel driver signatures can be exploited to bypass security restrictions.
- Security UI vulnerability when an open source customization for Microsoft Active Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected AD FS server can be exploited to spoof user interface.
- An elevation of privilege vulnerability when DirectX improperly handles objects in memory can be exploited remotely to gain privileges.
Original advisories
- CVE-2018-8408
- CVE-2018-8553
- CVE-2018-8550
- CVE-2018-8562
- CVE-2018-8563
- CVE-2018-8415
- CVE-2018-8471
- CVE-2018-8544
- CVE-2018-8476
- CVE-2018-8589
- CVE-2018-8256
- CVE-2018-8565
- CVE-2018-8450
- CVE-2018-8407
- CVE-2018-8549
- CVE-2018-8547
- CVE-2018-8485
- CVE-2018-8561
- ADV990001
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Internet-Explorer
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
CVE list
- CVE-2018-8552 critical
- CVE-2018-8408 high
- CVE-2018-8553 critical
- CVE-2018-8550 critical
- CVE-2018-8562 critical
- CVE-2018-8561 critical
- CVE-2018-8563 high
- CVE-2018-8415 critical
- CVE-2018-8471 critical
- CVE-2018-8547 high
- CVE-2018-8544 critical
- CVE-2018-8485 critical
- CVE-2018-8476 critical
- CVE-2018-8589 critical
- CVE-2018-8256 critical
- CVE-2018-8565 high
- CVE-2018-8549 high
- CVE-2018-8450 critical
- CVE-2018-8407 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!