Kaspersky ID:
KLA11009
Дата обнаружения:
09/05/2017
Обновлено:
22/07/2020

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Hyper-V vSMB can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows SMB can be exploited remotely via specially crafted packet to execute arbitrary code.
  3. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
  4. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to cause denial of service.
  5. An information disclosure vulnerability in Windows SMB can be exploited remotely via specially crafted packet to obtain sensitive information.
  6. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  7. A denial of service vulnerability in Windows SMB can be exploited remotely via specially crafted requests to cause denial of service.
  8. An elevation of privilege vulnerability in Windows COM can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows COM can be exploited remotely via specially crafted application to gain privileges.
  10. An elevation of privilege vulnerability in Dxgkrnl.sys can be exploited remotely via specially crafted application to cause denial of service.
  11. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  12. A denial of service vulnerability in Windows DNS Server can be exploited remotely to cause denial of service.
  13. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.

Первичный источник обнаружения

Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/44478

https://www.exploit-db.com/exploits/42007

https://www.exploit-db.com/exploits/42006

https://www.exploit-db.com/exploits/42008

https://www.exploit-db.com/exploits/42009

https://www.exploit-db.com/exploits/42021

https://www.exploit-db.com/exploits/42020

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2017-0280
    unknown
  • CVE-2017-0279
    unknown
  • CVE-2017-0278
    unknown
  • CVE-2017-0277
    unknown
  • CVE-2017-0276
    unknown
  • CVE-2017-0275
    unknown
  • CVE-2017-0274
    unknown
  • CVE-2017-0273
    unknown
  • CVE-2017-0272
    unknown
  • CVE-2017-0271
    unknown
  • CVE-2017-0270
    unknown
  • CVE-2017-0269
    unknown
  • CVE-2017-0268
    unknown
  • CVE-2017-0267
    unknown
  • CVE-2017-0263
    unknown
  • CVE-2017-0259
    unknown
  • CVE-2017-0258
    unknown
  • CVE-2017-0246
    unknown
  • CVE-2017-0245
    unknown
  • CVE-2017-0220
    unknown
  • CVE-2017-0214
    unknown
  • CVE-2017-0213
    unknown
  • CVE-2017-0212
    unknown
  • CVE-2017-0190
    unknown
  • CVE-2017-0171
    unknown
  • CVE-2017-0077
    unknown

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.