Kaspersky ID:
KLA11881
Fecha de detección:
01/08/2019
Actualizado:
01/28/2026

Descripción

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Productos relacionados

Lista CVE

  • CVE-2019-0549
    high
  • CVE-2019-0583
    critical
  • CVE-2019-0543
    critical
  • CVE-2019-0580
    critical
  • CVE-2019-0569
    high
  • CVE-2019-0577
    critical
  • CVE-2019-0554
    high
  • CVE-2019-0581
    critical
  • CVE-2019-0582
    critical
  • CVE-2019-0579
    critical
  • CVE-2019-0536
    high
  • CVE-2019-0578
    critical
  • CVE-2019-0584
    critical
  • CVE-2019-0538
    critical
  • CVE-2019-0576
    critical
  • CVE-2019-0575
    critical
  • CVE-2019-0541
    critical

Lista KB

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.