KLA11039
Multiple vulnerabilities in Microsoft Windows
Обновлено: 16/07/2019
Дата обнаружения
13/06/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, cause a denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An improper validation of input before loading DLL (dynamic link library) files can be exploited remotely by convincing a user to open a specially designed Office document to execute arbitrary code;
  2. An incorrect enforcement of privilege levels in Windows Hyper-V instruction emulation can be exploited remotely to gain privileges on a target guest operating system;
  3. An improper validation of buffer length done by tdx.sys can be exploited remotely via a specially designed application to gain privileges;
  4. An incorrect handling of cabinet files can be exploited remotely via a specially designed cabinet file to execute arbitrary code;
  5. Multiple vulnerabilities related to an improper handling of objects in memory in Windows Uniscribe can be exploited remotely by convincing a user to visit an untrusted webpage or open a specially designed document to obtain sensitive information;
  6. Multiple vulnerabilities related to an improper initialization of objects in memory in Windows kernel can be exploited via a specially designed application to obtain sensitive information;
  7. An incorrect handling of files in memory in Microsoft office can be exploited remotely either by sending a specially designed file and convincing a user to open the file or by hosting a website with a malicious content to execute arbitrary code;
  8. An improper handling of LNK files in the Windows Explorer can be exploited remotely in case an icon of a specially designed shortcut is displayed to execute arbitrary code;
  9. An incorrect handling of objects in memory in Windows kernel-mode driver can be exploited locally via a specially designed application to gain privileges;
  10. An improper parsing of PDF files in Microsoft Windows can be exploited remotely by convincing a user to open a specially designed PDF file to obtain sensitive information;
  11. An incorrect sanitizing of content in Skype for Business and Lync Servers can be exploited remotely by inviting a user to an instant message session and sending a message which contains a specially designed JavaScript content to obtain sensitive information.

Technical details

In case of vulnerability (4), malicious user can convince a user to open a specially designed cabinet file or spoof a network printer and convince a user to open a specially designed cabinet file which looks like a printer driver.

Пораженные продукты

Microsoft Office Word Viewer
Microsoft Windows 7 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows 10
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 Service Pack 2
Microsoft Office 2013 Service Pack 1
Microsoft Office 2016 Click-to-Run (CR)
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2016

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2017-0219
CVE-2017-0284
CVE-2017-0218
CVE-2017-0215
CVE-2017-8479
CVE-2017-0299
CVE-2017-8485
CVE-2017-0193
CVE-2017-8478
CVE-2017-8488
CVE-2017-8528
CVE-2017-8460
CVE-2017-8475
CVE-2017-8476
CVE-2017-8470
CVE-2017-8494
CVE-2017-8466
CVE-2017-8464
CVE-2017-0291
CVE-2017-0216
CVE-2017-0292
CVE-2017-8480
CVE-2017-8489
CVE-2017-0285
CVE-2017-0300
CVE-2017-8534
CVE-2017-8491
CVE-2017-8471
CVE-2017-8477
CVE-2017-8462
CVE-2017-0173
CVE-2017-0294
CVE-2017-8472
CVE-2017-8482
CVE-2017-8492
CVE-2017-8490
CVE-2017-8483
CVE-2017-0283
CVE-2017-8484
CVE-2017-8481
CVE-2017-8468
CVE-2017-0282
CVE-2017-0260
CVE-2017-8509
CVE-2017-8469
CVE-2017-8474
CVE-2017-8465
CVE-2017-0297
CVE-2017-0296
CVE-2017-8473
CVE-2017-8543
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2017-854310.0Critical
CVE-2017-02194.6Warning
CVE-2017-02841.9Warning
CVE-2017-02184.6Warning
CVE-2017-02154.6Warning
CVE-2017-84791.9Warning
CVE-2017-02991.9Warning
CVE-2017-84851.9Warning
CVE-2017-01934.6Warning
CVE-2017-84781.9Warning
CVE-2017-84881.9Warning
CVE-2017-85289.3Critical
CVE-2017-84604.4Warning
CVE-2017-84751.9Warning
CVE-2017-84761.9Warning
CVE-2017-84701.9Warning
CVE-2017-84946.9High
CVE-2017-84667.2High
CVE-2017-84649.3Critical
CVE-2017-02919.3Critical
CVE-2017-02164.6Warning
CVE-2017-02929.3Critical
CVE-2017-84801.9Warning
CVE-2017-84891.9Warning
CVE-2017-02851.9Warning
CVE-2017-03001.9Warning
CVE-2017-85344.3Warning
CVE-2017-84911.9Warning
CVE-2017-84711.9Warning
CVE-2017-84771.9Warning
CVE-2017-84621.9Warning
CVE-2017-01734.6Warning
CVE-2017-02949.3Critical
CVE-2017-84721.9Warning
CVE-2017-84821.9Warning
CVE-2017-84921.9Warning
CVE-2017-84901.9Warning
CVE-2017-84831.9Warning
CVE-2017-02838.8Critical
CVE-2017-84841.9Warning
CVE-2017-84811.9Warning
CVE-2017-84687.2High
CVE-2017-02821.9Warning
CVE-2017-02609.3Critical
CVE-2017-84692.1Warning
CVE-2017-84741.9Warning
CVE-2017-84657.2High
CVE-2017-02971.9Warning
CVE-2017-02967.2High
CVE-2017-84731.9Warning
Microsoft official advisories
Microsoft Security Update Guide
KB list

4022719
4022726
4022714
4022724
4022727
4022715
4025342
4025339
4034668
4034674
4034681
4034658
4034660
4022725
4022722
4022717
4024402
4022718
4022008
4021903
4021923
4022013
4022010
4018106
4022887
4022884
4022883
3217845
4034666
4034665
4034672
4034679
4034664
4034741