Description
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A spoofing vulnerability in Microsoft Bluetooth Driver can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in NetBIOS can be exploited remotely via specially crafted to execute arbitrary code.
- An information disclosure vulnerability in Windows Uniscribe can be exploited remotely via specially crafted document to obtain sensitive information.
- A remote code execution vulnerability in Windows Uniscribe can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted file to execute arbitrary code.
- A spoofing vulnerability in Internet Explorer can be exploited remotely via specially crafted website to spoof user interface.
- An information disclosure vulnerability in Windows System Information Console can be exploited remotely via specially crafted to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Graphics Component can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
Original advisories
- CVE-2017-8708
- CVE-2017-8709
- CVE-2017-8628
- CVE-2017-0161
- CVE-2017-8695
- CVE-2017-8696
- CVE-2017-8699
- CVE-2017-8733
- CVE-2017-8710
- CVE-2017-8719
- CVE-2017-8678
- CVE-2017-8679
- CVE-2017-8676
- CVE-2017-8677
- CVE-2017-8675
- CVE-2017-8687
- CVE-2017-8685
- CVE-2017-8684
- CVE-2017-8683
- CVE-2017-8682
- CVE-2017-8681
- CVE-2017-8680
- CVE-2017-8741
- CVE-2017-8720
- CVE-2017-8688
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Internet-Explorer
- Microsoft-Lync
- Microsoft-Office
- Microsoft-Lync-2010-Attendee
- Microsoft-Word
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Edge
CVE list
- CVE-2017-8741 critical
- CVE-2017-8733 warning
- CVE-2017-8675 high
- CVE-2017-8676 warning
- CVE-2017-8719 warning
- CVE-2017-8720 critical
- CVE-2017-0161 critical
- CVE-2017-8628 high
- CVE-2017-8677 high
- CVE-2017-8678 high
- CVE-2017-8679 high
- CVE-2017-8680 high
- CVE-2017-8681 high
- CVE-2017-8682 critical
- CVE-2017-8683 high
- CVE-2017-8684 high
- CVE-2017-8685 high
- CVE-2017-8687 high
- CVE-2017-8688 high
- CVE-2017-8695 high
- CVE-2017-8696 critical
- CVE-2017-8699 high
- CVE-2017-8707 high
- CVE-2017-8708 warning
- CVE-2017-8709 warning
- CVE-2017-8710 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!