KLA11051
Multiple vulnerabilities in Microsoft Windows

Обновлено: 03/06/2020
Дата обнаружения
13/06/2017
Уровень угрозы
Warning
Описание

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause a denial of service, obtain sensitive information and possibly to write local files.

Below is a complete list of vulnerabilities:

  1. Incorrectly set permissions on folders inside the DEFAULT folder structure can be exploited locally by logging on and tampering wiht the DEFAULT folder contents possible to write local files;
  2. An improper client authentication in Helppane.exe can be exploited locally by using a specially designed application to gain privileges;
  3. An incorrect security feature behaviour while enforcing case sensitivity for certain variable checks can be exploited locally via a specially designed application to bypass security restrictions;
  4. An improper handling of kernel mode requests of some specific types can be exploited via a specially designed request to cause a denial of service;
  5. An improper handling of objects in memory in Windows Search can be exploited via specially designed SMB messages to obtain sensitive information;
  6. An incorrect handling of objects in memory in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information.

Technical details

Exploiting vulnerability (3) can lead to bypassing UEFI (Unified Extensible Firmware Interface) variable security.

NB: Not every vulnerability already have CVSS rating so cumulative CVSS rating can be not representative.

Пораженные продукты

Microsoft Windows 7 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows 10
Microsoft Windows Server 2008 R2 Service Pack 1 
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2017-0298
CVE-2017-0295
CVE-2017-8493
CVE-2017-8515
CVE-2017-8544
CVE-2017-8554
CVE-2017-8553
Оказываемое влияние
?
OSI 
[?]

DoS 
[?]

SB 
[?]

WLF 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2017-02952.1Warning
CVE-2017-02984.4Warning
CVE-2017-84932.1Warning
CVE-2017-85154.9Warning
CVE-2017-85442.1Warning
CVE-2017-85531.9Warning
CVE-2017-85541.9Warning