KLA10979
Multiple vulnerabilities in Microsoft Windows

Обновлено: 24/06/2023
Дата обнаружения
14/03/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, gain privileges, obtain sensitive information and cause a denial of service.

Below is a complete list of vulnerabilities:

  1. An improper validation of certain elements of a signed PowerShell script in Device Guard can be exploited remotely to bypass security restrictions;
  2. An incorrect handling of certain requests sent by a malicious SMB server to the client can be exploited remotely via injected HTML header links, redirectors and some other methods causing the SMB client to connect to a malicious SMB server and cause a denial of service;
  3. An improper validation of input before loading DLL files can be exploited remotely to execute arbitrary code;
  4. A failure in handling requests in dnsclient can be exploited remotely via making a user visit an untrusted webpage (if the target is workstation) or sending a DNS query to a malicious server (if the target is a server) to obtain sensitive information;
  5. An improper client authentication in Helppane.exe can be exploited remotely to gain privileges and execute arbitrary code;
  6. An integer overflow vulnerability in the iSNS Server service can be exploited remotely via connecting to the iSNS Server with a specially designed apllication and sending malicious requests using it to execute arbitrary code in the context of the SYSTEM account.

Technical details

Vulnerability (2) is related to the implementations of the Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3) client.

Vulnerability (3) can be exploited by an attacker who has an access to the local system and has an ability to run a malicious application.

Vulnerability (5) can be exploited in case a DCOM object in Helppane.exe is configured to run as the interactive user.

Vulnerability (6) occurs when iSNS Server service fails to validate input from the client in a proper way.

Пораженные продукты

Microsoft Windows Vista Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows 10
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
MS17-012
CVE-2017-0051
CVE-2017-0021
CVE-2017-0095
CVE-2017-0096
CVE-2017-0097
CVE-2017-0098
CVE-2017-0099
CVE-2017-0109
CVE-2017-0074
CVE-2017-0075
CVE-2017-0076
CVE-2017-0055
CVE-2017-0102
CVE-2017-0103
CVE-2017-0101
CVE-2017-0050
CVE-2017-0056
CVE-2017-0024
CVE-2017-0026
CVE-2017-0078
CVE-2017-0079
CVE-2017-0080
CVE-2017-0081
CVE-2017-0082
CVE-2017-0043
CVE-2017-0045
CVE-2017-0022
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
CVE-2017-0014
CVE-2017-0060
CVE-2017-0061
CVE-2017-0062
CVE-2017-0063
CVE-2017-0025
CVE-2017-0073
CVE-2017-0108
CVE-2017-0038
CVE-2017-0001
CVE-2017-0005
CVE-2017-0047
CVE-2017-0072
CVE-2017-0083
CVE-2017-0084
CVE-2017-0085
CVE-2017-0086
CVE-2017-0087
CVE-2017-0088
CVE-2017-0089
CVE-2017-0090
CVE-2017-0091
CVE-2017-0092
CVE-2017-0111
CVE-2017-0112
CVE-2017-0113
CVE-2017-0114
CVE-2017-0115
CVE-2017-0116
CVE-2017-0117
CVE-2017-0118
CVE-2017-0119
CVE-2017-0120
CVE-2017-0121
CVE-2017-0122
CVE-2017-0123
CVE-2017-0124
CVE-2017-0125
CVE-2017-0126
CVE-2017-0127
CVE-2017-0128
CVE-2017-0130
CVE-2017-0008
CVE-2017-0057
CVE-2017-0100
CVE-2017-0104
CVE-2017-0007
CVE-2017-0016
CVE-2017-0039
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2017-00512.9Warning
CVE-2017-00217.7Critical
CVE-2017-00957.9Critical
CVE-2017-00962.3Warning
CVE-2017-00972.3Warning
CVE-2017-00982.9Warning
CVE-2017-00992.3Warning
CVE-2017-01097.4High
CVE-2017-00742.3Warning
CVE-2017-00757.4High
CVE-2017-00762.9Warning
CVE-2017-00554.3Warning
CVE-2017-01024.6Warning
CVE-2017-01034.4Warning
CVE-2017-01016.8High
CVE-2017-00507.2High
CVE-2017-00567.2High
CVE-2017-00247.2High
CVE-2017-00267.2High
CVE-2017-00787.2High
CVE-2017-00797.2High
CVE-2017-00807.2High
CVE-2017-00817.2High
CVE-2017-00827.2High
CVE-2017-00432.9Warning
CVE-2017-00454.3Warning
CVE-2017-00224.3Warning
CVE-2017-01439.3Critical
CVE-2017-01449.3Critical
CVE-2017-01459.3Critical
CVE-2017-01469.3Critical
CVE-2017-01474.3Warning
CVE-2017-01489.3Critical
CVE-2017-00147.6Critical
CVE-2017-00602.1Warning
CVE-2017-00612.6Warning
CVE-2017-00621.9Warning
CVE-2017-00634.3Warning
CVE-2017-00257.2High
CVE-2017-00734.3Warning
CVE-2017-01089.3Critical
CVE-2017-00384.3Warning
CVE-2017-00017.2High
CVE-2017-00056.9High
CVE-2017-00477.2High
CVE-2017-00729.3Critical
CVE-2017-00839.3Critical
CVE-2017-00849.3Critical
CVE-2017-00854.3Warning
CVE-2017-00869.3Critical
CVE-2017-00879.3Critical
CVE-2017-00889.3Critical
CVE-2017-00899.3Critical
CVE-2017-00909.3Critical
CVE-2017-00914.3Warning
CVE-2017-00924.3Warning
CVE-2017-01114.3Warning
CVE-2017-01124.3Warning
CVE-2017-01134.3Warning
CVE-2017-01144.3Warning
CVE-2017-01154.3Warning
CVE-2017-01164.3Warning
CVE-2017-01174.3Warning
CVE-2017-01184.3Warning
CVE-2017-01194.3Warning
CVE-2017-01204.3Warning
CVE-2017-01214.3Warning
CVE-2017-01224.3Warning
CVE-2017-01234.3Warning
CVE-2017-01244.3Warning
CVE-2017-01254.3Warning
CVE-2017-01264.3Warning
CVE-2017-01274.3Warning
CVE-2017-01284.3Warning
CVE-2017-01307.6Critical
CVE-2017-00084.3Warning
CVE-2017-00574.3Warning
CVE-2017-01004.4Warning
CVE-2017-01049.3Critical
CVE-2017-00072.1Warning
CVE-2017-00167.1High
CVE-2017-00399.3Critical