Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows SMB can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Windows Certificate can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows DNS Server can be exploited remotely to cause denial of service.
- A spoofing vulnerability in Windows Installer can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows Address Book can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows LSA can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows LSA can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows DNS Snap-in can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows TCP/IP Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in GDI+ can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Key Distribution Center can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows Security Account Manager Remote Protocol can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Windows Media Foundation can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Remote Assistance can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A denial of service vulnerability in Bowser.sys can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Authenticode can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI can be exploited remotely to obtain sensitive information.
Original advisories
- CVE-2021-34492
- CVE-2021-34497
- CVE-2021-34442
- CVE-2021-34444
- CVE-2021-33765
- CVE-2021-34504
- CVE-2021-33786
- CVE-2021-34456
- CVE-2021-34494
- CVE-2021-33788
- CVE-2021-33754
- CVE-2021-34446
- CVE-2021-33752
- CVE-2021-31183
- CVE-2021-33750
- CVE-2021-33745
- CVE-2021-31979
- CVE-2021-33756
- CVE-2021-34440
- CVE-2021-33749
- CVE-2021-33764
- CVE-2021-34448
- CVE-2021-34499
- CVE-2021-33757
- CVE-2021-34457
- CVE-2021-34441
- CVE-2021-34507
- CVE-2021-33746
- CVE-2021-34498
- CVE-2021-34516
- CVE-2021-34447
- CVE-2021-33780
- CVE-2021-34476
- CVE-2021-34511
- CVE-2021-33782
- CVE-2021-34514
- CVE-2021-34500
- CVE-2021-34496
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
CVE list
- CVE-2021-34497 high
- CVE-2021-34444 high
- CVE-2021-34504 critical
- CVE-2021-34456 critical
- CVE-2021-33788 critical
- CVE-2021-34494 critical
- CVE-2021-34446 critical
- CVE-2021-31183 critical
- CVE-2021-33745 high
- CVE-2021-34440 high
- CVE-2021-33749 critical
- CVE-2021-33764 high
- CVE-2021-33757 high
- CVE-2021-34441 critical
- CVE-2021-34507 high
- CVE-2021-34516 critical
- CVE-2021-33780 critical
- CVE-2021-34476 critical
- CVE-2021-34511 critical
- CVE-2021-34500 high
- CVE-2021-34496 high
- CVE-2021-33783 high
- CVE-2021-34492 critical
- CVE-2021-34442 critical
- CVE-2021-33765 high
- CVE-2021-33786 critical
- CVE-2021-33754 critical
- CVE-2021-33752 critical
- CVE-2021-33750 critical
- CVE-2021-31979 critical
- CVE-2021-33756 critical
- CVE-2021-34448 high
- CVE-2021-34499 high
- CVE-2021-34457 high
- CVE-2021-33746 critical
- CVE-2021-34498 critical
- CVE-2021-34447 high
- CVE-2021-33782 high
- CVE-2021-34514 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!