Kaspersky ID:
KLA11059
Дата обнаружения:
11/04/2017
Обновлено:
22/07/2020

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Office/WordPad can be exploited remotely via specially crafted files to execute arbitrary code.
  2. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  3. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  4. A security feature bypass vulnerability in ADFS can be exploited remotely via specially crafted application to bypass security restrictions.
  5. A denial of service vulnerability in Active Directory can be exploited remotely to cause denial of service.
  6. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  7. An elevation of privilege vulnerability in LDAP can be exploited remotely via specially crafted application to gain privileges.
  8. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  9. A denial of service vulnerability in Windows IPSec can be exploited remotely to cause denial of service.
  10. An information disclosure vulnerability in OpenType Font Driver can be exploited remotely via specially crafted fonts to obtain sensitive information.
  11. An elevation of privilege vulnerability in Windows OLE can be exploited remotely to gain privileges.
  12. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  13. An information disclosure vulnerability in libjpeg can be exploited remotely via specially crafted application to obtain sensitive information.

Первичный источник обнаружения

Эксплуатация

This vulnerability can be exploited by the following malware:

https://threats.kaspersky.com/en/threat/Exploit.MSOffice.CVE-2017-0199/

https://threats.kaspersky.com/en/threat/Exploit.MSOffice.Oleink/

https://threats.kaspersky.com/en/threat/Trojan.Win32.FormBook/

https://threats.kaspersky.com/en/threat/Trojan-PSW.Win32.Azorult/

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/42995

https://www.exploit-db.com/exploits/41894

https://www.exploit-db.com/exploits/41934

https://threats.kaspersky.com/en/threat/Exploit.MSOffice.CVE-2017-0199/

https://threats.kaspersky.com/en/threat/Exploit.MSOffice.Oleink/

https://threats.kaspersky.com/en/threat/Trojan-PSW.Win32.Azorult/

https://threats.kaspersky.com/en/threat/Trojan.Win32.FormBook/

https://www.exploit-db.com/exploits/41879

https://www.exploit-db.com/exploits/41901

https://www.exploit-db.com/exploits/41880

https://www.exploit-db.com/exploits/41902

Связанные продукты

Список CVE

  • CVE-2017-0199
    unknown
  • CVE-2017-0058
    unknown
  • CVE-2017-0155
    unknown
  • CVE-2017-0156
    unknown
  • CVE-2017-0159
    unknown
  • CVE-2017-0164
    unknown
  • CVE-2017-0165
    unknown
  • CVE-2017-0166
    unknown
  • CVE-2017-0167
    unknown
  • CVE-2017-0188
    unknown
  • CVE-2017-0189
    unknown
  • CVE-2017-0191
    unknown
  • CVE-2017-0192
    unknown
  • CVE-2017-0211
    unknown
  • CVE-2017-0158
    unknown
  • CVE-2013-6629
    unknown

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.