Дата обнаружения
|
13/09/2016 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Windows. Malicious users can exploit these vulnerabilities to cause denial of service. execute arbitrary code, obtain sensitive information or gain privileges. Below is a complete list of vulnerabilities
Technical details Vulnerability (4) can be mitigated via usage of enterprise perimeter firewall. To exploit vulnerability (8) attacker must be able to establish an authenticated SMBv1 session to the SMBv1 Server. To mitigate this vulnerability you can disable SMBv1. For further instructions take a look at original advisory listed below. |
Пораженные продукты
|
Microsoft Windows Vista Service Pack 2 |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2016-3370 CVE-2016-3374 CVE-2016-3375 CVE-2016-3373 CVE-2016-3368 CVE-2016-3369 CVE-2016-3371 CVE-2016-3372 CVE-2016-3306 CVE-2016-3344 CVE-2016-3345 CVE-2016-3346 CVE-2016-3348 CVE-2016-3349 CVE-2016-3352 CVE-2016-3302 CVE-2016-3354 CVE-2016-3355 CVE-2016-3356 CVE-2016-3305 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Vista Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
|
CVE-2016-33704.3Warning
CVE-2016-33744.3Warning CVE-2016-33757.6Critical CVE-2016-33734.3Warning CVE-2016-33689.0Critical CVE-2016-33697.8Critical CVE-2016-33714.3Warning CVE-2016-33723.6Warning CVE-2016-33064.6Warning CVE-2016-33442.1Warning CVE-2016-33459.0Critical CVE-2016-33467.2High CVE-2016-33489.3Critical CVE-2016-33497.2High CVE-2016-33524.3Warning CVE-2016-33026.2High CVE-2016-33544.3Warning CVE-2016-33557.2High CVE-2016-33569.3Critical CVE-2016-33054.6Warning |