KLA48842
Multiple vulnerabilities in Microsoft Products (ESU)

Updated: 05/19/2023
Detect date
?
04/11/2023
Severity
?
Critical
Description

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information, spoof user interface, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  3. A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
  4. An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
  5. A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
  6. A remote code execution vulnerability in Windows Network Load Balancing can be exploited remotely to execute arbitrary code.
  7. A remote code execution vulnerability in Windows Internet Key Exchange (IKE) Protocol Extensions can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  9. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  10. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  12. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  13. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  14. A remote code execution vulnerability in DHCP Server Service can be exploited remotely to execute arbitrary code.
  15. A remote code execution vulnerability in Windows Point-to-Point Tunneling Protocol can be exploited remotely to execute arbitrary code.
  16. A remote code execution vulnerability in Layer 2 Tunneling Protocol can be exploited remotely to execute arbitrary code.
  17. A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
  18. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  19. An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
  20. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  21. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  22. An elevation of privilege vulnerability in Netlogon RPC can be exploited remotely to gain privileges.
  23. A denial of service vulnerability in Windows Secure Socket Tunneling Protocol (SSTP) can be exploited remotely to cause denial of service.
  24. A denial of service vulnerability in Windows Network Address Translation (NAT) can be exploited remotely to cause denial of service.
  25. An elevation of privilege vulnerability in Windows Advanced Local Procedure Call (ALPC) can be exploited remotely to gain privileges.
  26. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  27. A remote code execution vulnerability in Windows Bluetooth Driver can be exploited remotely to execute arbitrary code.
  28. A security feature bypass vulnerability in Windows Group Policy can be exploited remotely to bypass security restrictions.
  29. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  30. A remote code execution vulnerability in Microsoft SQL Server can be exploited remotely to execute arbitrary code.
  31. A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
  32. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
  33. An information disclosure vulnerability in Remote Procedure Call Runtime can be exploited remotely to obtain sensitive information.
Exploitation

The following public exploits exists for this vulnerability:

https://github.com/glavstroy/CVE-2023-28231

https://github.com/Hashi0x/PoC-CVE-2023-21554

https://github.com/zoemurmure/CVE-2023-21554-PoC

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Microsoft SQL Server 2008 R2 for x64-Based Systems Service Pack 3 (QFE)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Microsoft SQL Server 2008 R2 for 32-Bit Systems Service Pack 3 (QFE)
Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4 (QFE)
Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 (QFE)
Microsoft SQL Server 2012 for 32-bit Systems Service Pack 4 (QFE)
Microsoft SQL Server 2008 for x64-Based Systems Service Pack 4 (QFE)

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2023-28272
CVE-2023-28306
CVE-2023-28298
CVE-2023-28267
CVE-2023-28228
CVE-2023-28240
CVE-2023-28238
CVE-2023-28250
CVE-2023-28308
CVE-2023-28244
CVE-2023-28252
CVE-2023-28218
CVE-2023-24931
CVE-2023-28229
CVE-2023-28293
CVE-2023-28231
CVE-2023-28232
CVE-2023-28219
CVE-2023-28275
CVE-2023-21554
CVE-2023-28271
CVE-2023-24912
CVE-2023-28254
CVE-2023-28253
CVE-2023-28268
CVE-2023-28255
CVE-2023-28305
CVE-2023-28241
CVE-2023-28217
CVE-2023-28216
CVE-2023-28302
CVE-2023-28227
CVE-2023-28256
CVE-2023-28278
CVE-2023-28276
CVE-2023-21727
CVE-2023-28222
CVE-2023-28307
CVE-2023-28220
CVE-2023-23384
CVE-2023-28223
CVE-2023-28266
CVE-2023-21729
CVE-2023-21769

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Related products
Microsoft SQL Server
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2008
CVE-IDS
?
CVE-2023-282725.0Critical
CVE-2023-283065.0Critical
CVE-2023-282985.0Critical
CVE-2023-282675.0Critical
CVE-2023-282285.0Critical
CVE-2023-282405.0Critical
CVE-2023-282385.0Critical
CVE-2023-282505.0Critical
CVE-2023-283085.0Critical
CVE-2023-282445.0Critical
CVE-2023-282525.0Critical
CVE-2023-282185.0Critical
CVE-2023-249315.0Critical
CVE-2023-282295.0Critical
CVE-2023-282935.0Critical
CVE-2023-282315.0Critical
CVE-2023-282325.0Critical
CVE-2023-282195.0Critical
CVE-2023-282755.0Critical
CVE-2023-215545.0Critical
CVE-2023-282715.0Critical
CVE-2023-249125.0Critical
CVE-2023-282545.0Critical
CVE-2023-282535.0Critical
CVE-2023-282685.0Critical
CVE-2023-282555.0Critical
CVE-2023-283055.0Critical
CVE-2023-282415.0Critical
CVE-2023-282175.0Critical
CVE-2023-282165.0Critical
CVE-2023-283025.0Critical
CVE-2023-282275.0Critical
CVE-2023-282565.0Critical
CVE-2023-282785.0Critical
CVE-2023-282765.0Critical
CVE-2023-217275.0Critical
CVE-2023-282225.0Critical
CVE-2023-283075.0Critical
CVE-2023-282205.0Critical
CVE-2023-233845.0Critical
CVE-2023-282235.0Critical
CVE-2023-282665.0Critical
CVE-2023-217295.0Critical
CVE-2023-217695.0Critical
KB list

5021123
5021112
5020863
5025279
5025271
5025277
5025273

Microsoft official advisories
Microsoft Security Update Guide
Find out the statistics of the vulnerabilities spreading in your region