Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, gain privileges, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A security feature bypass vulnerability in Device Guard Code Integrity Policy can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Search can be exploited remotely via specially crafted messages to execute arbitrary code.
- An information disclosure vulnerability in Windows PDF can be exploited remotely via specially crafted to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Windows Uniscribe can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
- An information disclosure vulnerability in Windows Uniscribe can be exploited remotely via specially crafted document to obtain sensitive information.
- An elevation of privilege vulnerability in Hypervisor Code Integrity can be exploited remotely to gain privileges.
- A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted cabinet to execute arbitrary code.
- An elevation of privilege vulnerability in Windows TDX can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Microsoft Windows can be exploited remotely via specially crafted to execute arbitrary code.
- A remote code execution vulnerability in Windows PDF can be exploited remotely via specially crafted to execute arbitrary code.
Первичный источник обнаружения
- CVE-2017-0219
CVE-2017-0218
CVE-2017-0215
CVE-2017-0216
CVE-2017-0173
CVE-2017-8483
CVE-2017-8466
CVE-2017-8543
CVE-2017-8488
CVE-2017-8460
CVE-2017-0289
CVE-2017-0288
CVE-2017-8528
CVE-2017-8527
CVE-2017-0283
CVE-2017-0282
CVE-2017-0287
CVE-2017-0285
CVE-2017-0284
CVE-2017-0193
CVE-2017-8464
CVE-2017-8470
CVE-2017-8471
CVE-2017-8472
CVE-2017-8473
CVE-2017-8475
CVE-2017-0294
CVE-2017-0296
CVE-2017-0291
CVE-2017-0292
CVE-2017-8531
CVE-2017-8533
CVE-2017-8532
Эксплуатация
The following public exploits exists for this vulnerability:
https://www.exploit-db.com/exploits/42235
https://www.exploit-db.com/exploits/42212
https://www.exploit-db.com/exploits/42223
https://www.exploit-db.com/exploits/42429
https://www.exploit-db.com/exploits/42382
https://www.exploit-db.com/exploits/42236
https://www.exploit-db.com/exploits/42224
https://www.exploit-db.com/exploits/42225
https://www.exploit-db.com/exploits/42243
https://www.exploit-db.com/exploits/42234
https://www.exploit-db.com/exploits/42237
https://www.exploit-db.com/exploits/42226
https://www.exploit-db.com/exploits/42239
https://www.exploit-db.com/exploits/42241
https://www.exploit-db.com/exploits/42240
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Word
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Список CVE
- CVE-2017-8543 unknown
- CVE-2017-0219 unknown
- CVE-2017-0284 unknown
- CVE-2017-0218 unknown
- CVE-2017-0215 unknown
- CVE-2017-0193 unknown
- CVE-2017-8488 unknown
- CVE-2017-8528 unknown
- CVE-2017-8460 unknown
- CVE-2017-8475 unknown
- CVE-2017-8470 unknown
- CVE-2017-8466 unknown
- CVE-2017-8464 unknown
- CVE-2017-0291 unknown
- CVE-2017-0216 unknown
- CVE-2017-0292 unknown
- CVE-2017-0285 unknown
- CVE-2017-8471 unknown
- CVE-2017-0173 unknown
- CVE-2017-0294 unknown
- CVE-2017-8472 unknown
- CVE-2017-8483 unknown
- CVE-2017-0283 unknown
- CVE-2017-0282 unknown
- CVE-2017-0296 unknown
- CVE-2017-8473 unknown
- CVE-2017-0287 unknown
- CVE-2017-0288 unknown
- CVE-2017-0289 unknown
- CVE-2017-8527 unknown
- CVE-2017-8531 unknown
- CVE-2017-8532 unknown
- CVE-2017-8533 unknown
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com