Searching
..

Click anywhere to stop

KLA10601
Multiple vulnerabilities in Microsoft products

Обновлено: 02/02/2024
Дата обнаружения
11/11/2014
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service gain privileges, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Improper input validation can be exploited locally via a specially designed input;
  2. Improper thread handling can be exploited locally via unknown vectors;
  3. Improper 2D figures handling can be exploited remotely via a specially designed files;
  4. Improper JPEG files parsing can be exploited remotely via a specially designed file or memory manipulations;
  5. An unknown vulnerability can be exploited remotely via a specially designed web content;
  6. An unknown vulnerability can be exploited remotely via vectors related to IPv6;
  7. Improper handling objects in memory can be exploited remotely via an unknown vectors;
  8. Improper file associations handling can be exploited remotely via vectors related to Windows Shell;
  9. Improper user state validation can be exploited remotely via vectors related to SAMR;
  10. Improper iSCSI packets handling can be exploited remotely via an unknown vectors;
  11. An unknown vulnerability can be exploited remotely via vectors related to RDP, On-Screen keyboard, DirectShow, Internet Explorer, Microsoft IME for Japanese and Task Sheduler;
  12. Improper .bat or .cmd files processing can be exploited locally via DLL hijack;
  13. Improper passwords handling can be exploited remotely via share access;
  14. Improper TCP implementation can be exploited remotely via a specially designed TCP header;
  15. Use-After-free can be exploited remotely via a specially designed Office document;
  16. Improper font files restrictions can be exploited locally via a specially designed file;
  17. Improper signatures validation can be exploited remotely via vectors related to Kerberos KDC;
  18. Memory leak can be exploited remotely via a specially designed client;
  19. Double free vulnerability can be exploited locally via a specially designed application;
  20. An unknown vulnerability can be exploited via specially designed application;
  21. Improper addresses validation can be exploited locally via specially designed IOCTL call;
  22. Improper XML handling can be exploited remotely via a specially designed XML content;
  23. Improper permissions validation can be exploited remotely via vectors related to Microsoft audio component;
  24. Improper handling failed login attempts can be exploited via vectors related to RDP;
  25. Improper memory allocation can be exploited remotely via a specially designed USB device;
  26. An unknown vulnerability can be exploited remotely via a specially designed OLE object;
  27. Improper packets handling can be exploited remotely via a vectors related to Secure Channel;
  28. An unknown vulnerability can be exploited remotely via a specially designed Journal.
Пораженные продукты

Windows XP Service pack 3
Windows XP Professional x64 Service Pack 3
Windows Server 2003 x86, x64, Itanium Service Pack 2
Windows Vista x86, x64 Service Pack 2
Windows Server 2008 x86, x64, Itanium Service Pack 2
Windows 7 x86, x64 Service Pack 1
Windows Server 2008 R2 x64, Itanium Service Pacl 1
Windows 8 x86, x64
Windows 8.1 x86, x64
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2014-1816
CVE-2014-6532
CVE-2014-0266
CVE-2014-4076
CVE-2014-6321
CVE-2014-6322
CVE-2014-6324
CVE-2014-1767
CVE-2014-4077
CVE-2014-4074
CVE-2014-1807
CVE-2013-5065
CVE-2014-0300
CVE-2014-0323
CVE-2014-4971
CVE-2014-0301
CVE-2014-0262
CVE-2014-0263
CVE-2014-4115
CVE-2014-4113
CVE-2014-0315
CVE-2014-0316
CVE-2014-0317
CVE-2014-0255
CVE-2014-0318
CVE-2014-4118
CVE-2014-6352
CVE-2014-6332
CVE-2014-0296
CVE-2014-0256
CVE-2014-1811
CVE-2014-0254
CVE-2014-1819
CVE-2014-6355
CVE-2014-2780
CVE-2014-2781
CVE-2014-1812
CVE-2014-4064
CVE-2014-6318
CVE-2014-1814
CVE-2014-4060
CVE-2014-1824
CVE-2014-6317
CVE-2014-4114
CVE-2014-4148
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

WLF 
[?]

PE 
[?]

RLF 
[?]

SUI 
[?]

LoI 
[?]
Связанные продукты
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2003
Windows RT
Microsoft Windows XP
CVE-IDS