Kaspersky ID:
KLA11978
Date de la détection:
10/13/2020
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows KernelStream can be exploited remotely via specially crafted application to obtain sensitive information.
  2. An elevation of privilege vulnerability in Windows Network Connections Service can be exploited remotely via specially crafted application to gain privileges.
  3. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  4. A denial of service vulnerability in Windows Remote Desktop Service can be exploited remotely via specially crafted requests to cause denial of service.
  5. An elevation of privilege vulnerability in Windows Application Compatibility Client Library can be exploited remotely via specially crafted application to gain privileges.
  6. A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
  7. A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Event System can be exploited remotely via specially crafted application to gain privileges.
  10. An elevation of privilege vulnerability in Windows – User Profile Service can be exploited remotely via specially crafted application to gain privileges.
  11. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  12. An information disclosure vulnerability in NetBT can be exploited remotely via specially crafted application to obtain sensitive information.
  13. An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows COM Server can be exploited remotely via specially crafted application to gain privileges.
  15. An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
  16. An elevation of privilege vulnerability in Group Policy can be exploited remotely via specially crafted application to gain privileges.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2020-16923
    critical
  • CVE-2020-16889
    high
  • CVE-2020-16887
    critical
  • CVE-2020-16902
    critical
  • CVE-2020-16939
    critical
  • CVE-2020-16972
    critical
  • CVE-2020-16940
    critical
  • CVE-2020-16920
    critical
  • CVE-2020-16922
    high
  • CVE-2020-16924
    critical
  • CVE-2020-16900
    critical
  • CVE-2020-16891
    critical
  • CVE-2020-16897
    high
  • CVE-2020-16973
    critical
  • CVE-2020-16976
    critical
  • CVE-2020-16975
    critical
  • CVE-2020-16974
    critical
  • CVE-2020-16936
    critical
  • CVE-2020-16935
    critical
  • CVE-2020-16912
    critical
  • CVE-2020-16914
    high
  • CVE-2020-16916
    critical
  • CVE-2020-16863
    critical

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.