Searching
..

Click anywhere to stop

KLA11108
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 22/01/2024
Дата обнаружения
10/10/2017
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. Unspecified Microsoft Server Block Message can be exploited remotely via specially crafted requests to cause denial of service.
  2. A remote code execution vulnerability in Windows SMB can be exploited remotely via specially crafted packet to execute arbitrary code.
  3. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A remote code execution vulnerability in Microsoft Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
  5. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  6. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
  7. A remote code execution vulnerability in Microsoft JET Database Engine can be exploited remotely via specially crafted to execute arbitrary code.
  8. An information disclosure vulnerability in Internet Explorer can be exploited remotely via specially crafted content to obtain sensitive information.
  9. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely via specially crafted application to gain privileges.
  10. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  11. An information disclosure vulnerability in Microsoft Search can be exploited remotely via specially crafted messages to obtain sensitive information.
  12. A remote code execution vulnerability in Windows Search can be exploited remotely via specially crafted messages to execute arbitrary code.
  13. A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted content to execute arbitrary code.
  14. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
  15. An information disclosure vulnerability in Windows SMB can be exploited remotely to obtain sensitive information.
Пораженные продукты

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Internet Explorer 9
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows Server 2012
Internet Explorer 11
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2016
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 10
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2012 R2

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2017-11781
CVE-2017-11780
CVE-2017-11785
CVE-2017-11784
CVE-2017-11765
CVE-2017-11763
CVE-2017-11762
CVE-2017-8694
CVE-2017-11822
CVE-2017-8717
CVE-2017-11790
CVE-2017-11824
CVE-2017-11793
CVE-2017-8718
CVE-2017-8727
CVE-2017-11772
CVE-2017-11771
CVE-2017-11819
CVE-2017-8689
CVE-2017-11810
CVE-2017-11817
CVE-2017-11816
CVE-2017-11815
CVE-2017-11814
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

PE 
[?]
Связанные продукты
Microsoft Internet Explorer
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2017-117626.8High
CVE-2017-117636.8High
CVE-2017-117652.1Warning
CVE-2017-117725.0Warning
CVE-2017-117806.8High
CVE-2017-117817.8Critical
CVE-2017-117842.1Warning
CVE-2017-117852.1Warning
CVE-2017-118142.1Warning
CVE-2017-118153.5Warning
CVE-2017-118162.1Warning
CVE-2017-118171.9Warning
CVE-2017-118197.6Critical
CVE-2017-118246.9High
CVE-2017-86896.9High
CVE-2017-86946.9High
CVE-2017-87179.3Critical
CVE-2017-87189.3Critical
CVE-2017-87277.6Critical
CVE-2017-118107.6Critical
CVE-2017-117904.3Warning
CVE-2017-117937.6Critical
CVE-2017-118227.6Critical