Kaspersky ID:
KLA11060
Дата обнаружения:
11/04/2017
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities have been found in Microsoft Windows Hyper-V. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code and cause a denial of service.

Below is a complete list of vulnerabilities:

  1. Multiple vulnerabilities related to an improper validation of guest operating system network traffic in Windows Hyper-V Network Switch can be exploited remotely via a specially designed application to execute arbitrary code;
  2. Multiple vulnerabilities related to an improper validation of guest operating system user input in Windows Hyper-V Network Switch can be exploited remotely via a specially designed application to obtain sensitive information;
  3. Multiple vulnerabilities related to an incorrect validation of input from a privileged user on a guest operating system can be exploited remotely via a specially designed application to cause a denial of service;
  4. Multiple vulnerabilities related to an improper handling of an access from virtual machines to the Hyper-V Network Switch can be exploited remotely via a specially designed application to cause a denial of service.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2017-0162
    high
  • CVE-2017-0163
    high
  • CVE-2017-0168
    high
  • CVE-2017-0169
    high
  • CVE-2017-0178
    high
  • CVE-2017-0179
    high
  • CVE-2017-0180
    high
  • CVE-2017-0181
    high
  • CVE-2017-0182
    high
  • CVE-2017-0183
    high
  • CVE-2017-0184
    high
  • CVE-2017-0185
    high
  • CVE-2017-0186
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.