KLA11195
Multiple vulnerabilities in Microsoft Windows

Обновлено: 14/08/2020
Дата обнаружения
13/02/2018
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  2. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  3. An information disclosure vulnerability in Windows EOT Font Engine can be exploited remotely via specially crafted embedded to obtain sensitive information.
  4. An elevation of privilege vulnerability in Windows AppContainer can be exploited remotely via specially crafted application to gain privileges.
  5. An elevation of privilege vulnerability in Windows NTFS Global Reparse Point can be exploited remotely via specially crafted application to gain privileges.
  6. An elevation of privilege vulnerability in Named Pipe File System can be exploited remotely via specially crafted application to gain privileges.
  7. A remote code execution vulnerability in StructuredQuery can be exploited remotely via specially crafted file to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows Storage Services can be exploited remotely via specially crafted application to gain privileges.
  9. A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
  10. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  11. A denial of service vulnerability in Windows can be exploited remotely via specially crafted requests to cause denial of service.
  12. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  13. A memory corruption vulnerability in Windows Scripting Engine can be exploited remotely to obtain sensitive information.
Пораженные продукты

Windows Server 2016 (Server Core installation)
Windows 10 Version 1709 for x64-based Systems
Windows Server, version 1709 (Server Core Installation)

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2018-0742
CVE-2018-0756
CVE-2018-0757
CVE-2018-0760
CVE-2018-0809
CVE-2018-0810
CVE-2018-0820
CVE-2018-0821
CVE-2018-0822
CVE-2018-0823
CVE-2018-0825
CVE-2018-0826
CVE-2018-0827
CVE-2018-0828
CVE-2018-0829
CVE-2018-0830
CVE-2018-0831
CVE-2018-0832
CVE-2018-0833
CVE-2018-0842
CVE-2018-0843
CVE-2018-0844
CVE-2018-0846
CVE-2018-0847
ADV180005
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2018-07424.6Warning
CVE-2018-07564.6Warning
CVE-2018-07571.9Warning
CVE-2018-07602.1Warning
CVE-2018-08096.9High
CVE-2018-08101.9Warning
CVE-2018-08204.6Warning
CVE-2018-08214.4Warning
CVE-2018-08224.4Warning
CVE-2018-08234.4Warning
CVE-2018-08257.6Critical
CVE-2018-08264.4Warning
CVE-2018-08274.6Warning
CVE-2018-08284.6Warning
CVE-2018-08291.9Warning
CVE-2018-08301.9Warning
CVE-2018-08314.6Warning
CVE-2018-08321.9Warning
CVE-2018-08336.3High
CVE-2018-08426.9High
CVE-2018-08431.9Warning
CVE-2018-08444.6Warning
CVE-2018-08464.6Warning
CVE-2018-08474.3Warning
Microsoft official advisories
Microsoft Security Update Guide
KB list

4074591
4074590
4074594
4074597
4074593
4074589
4074596
4074592
4074588

Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/44149

https://www.exploit-db.com/exploits/44147

https://www.exploit-db.com/exploits/44148

https://www.exploit-db.com/exploits/44152

https://www.exploit-db.com/exploits/44146

https://www.exploit-db.com/exploits/44189

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Узнай статистику распространения уязвимостей в твоем регионе