Kaspersky ID:
KLA11898
Detect Date:
11/13/2018
Updated:
10/10/2024

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  3. A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows COM Aggregate Marshaler can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows when the Win32k component fails to properly handle objects in memory can be exploited remotely to gain privileges.
  6. Information disclosure vulnerability when DirectX improperly handles objects in memory can be exploited to obtain sensitive information.
  7. A tampering vulnerability exists in PowerShell can be exploited to execute unlogged code.
  8. An elevation of privilege vulnerability in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in the way that the VBScript engine handles objects in memory can be exploited remotely to execute arbitrary code.
  10. A remote code execution vulnerability in the way that Windows Deployment Services TFTP Server handles objects in memory can be exploited remotely to execute arbitrary code.
  11. An elevation of privilege vulnerability when Windows improperly handles calls to Win32k.sys can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability when PowerShell improperly handles specially crafted files can be exploited remotely to execute arbitrary code.
  13. Information disclosure vulnerability when the win32k component improperly provides kernel information can be exploited to obtain sensitive information.
  14. A remote code execution vulnerability when Windows Search handles objects in memory can be exploited remotely to execute arbitrary code.
  15. Information disclosure vulnerability when “Kernel Remote Procedure Call Provider” driver improperly initializes objects in memory can be exploited to obtain sensitive information.
  16. Security vulnerability when Windows incorrectly validates kernel driver signatures can be exploited to bypass security restrictions.
  17. Security UI vulnerability when an open source customization for Microsoft Active Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected AD FS server can be exploited to spoof user interface.
  18. An elevation of privilege vulnerability when DirectX improperly handles objects in memory can be exploited remotely to gain privileges.
 
 

 

 

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2018-8552
    critical
  • CVE-2018-8408
    high
  • CVE-2018-8553
    critical
  • CVE-2018-8550
    critical
  • CVE-2018-8562
    critical
  • CVE-2018-8561
    critical
  • CVE-2018-8563
    high
  • CVE-2018-8415
    critical
  • CVE-2018-8471
    critical
  • CVE-2018-8547
    high
  • CVE-2018-8544
    critical
  • CVE-2018-8485
    critical
  • CVE-2018-8476
    critical
  • CVE-2018-8589
    critical
  • CVE-2018-8256
    critical
  • CVE-2018-8565
    high
  • CVE-2018-8549
    high
  • CVE-2018-8450
    critical
  • CVE-2018-8407
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.