Kaspersky ID:
KLA11846
Date de la détection:
08/08/2017
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  2. A remote code execution vulnerability in Express Compressed Fonts can be exploited remotely via specially crafted embedded to execute arbitrary code.
  3. A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
  4. A remote code execution vulnerability in Microsoft JET Database Engine can be exploited remotely via specially crafted to execute arbitrary code.
  5. A remote code execution vulnerability in Windows Search can be exploited remotely via specially crafted messages to execute arbitrary code.
  6. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  7. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely via specially crafted application to gain privileges.
  9. A remote code execution vulnerability in Windows PDF can be exploited remotely via specially crafted website to execute arbitrary code.
  10. A denial of service vulnerability in Windows NetBIOS can be exploited remotely to cause denial of service.
  11. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  12. An information disclosure vulnerability in Volume Manager Extension Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  13. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2017-8636
    critical
  • CVE-2017-8641
    critical
  • CVE-2017-8651
    critical
  • CVE-2017-8653
    critical
  • CVE-2017-8593
    high
  • CVE-2017-8620
    critical
  • CVE-2017-8691
    critical
  • CVE-2017-0250
    critical
  • CVE-2017-8633
    critical
  • CVE-2017-8668
    high
  • CVE-2017-0293
    critical
  • CVE-2017-0174
    high
  • CVE-2017-8666
    high
  • CVE-2017-8624
    critical

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.