Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, bypass security restrictions, cause denial of service.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Desktop Bridge VFS can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Remote Assistance can be exploited remotely via specially crafted to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Desktop Bridge can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Microsoft Video Control can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted file to execute arbitrary code.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- A remote code execution vulnerability in CredSSP can be exploited remotely via specially crafted application to execute arbitrary code.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in CNG can be exploited remotely via specially crafted application to bypass security restrictions.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Storage Services can be exploited remotely via specially crafted application to gain privileges.
Первичный источник обнаружения
- CVE-2018-0811
CVE-2018-0813
CVE-2018-0814
CVE-2018-0816
CVE-2018-0817
CVE-2018-0868
CVE-2018-0877
CVE-2018-0878
CVE-2018-0880
CVE-2018-0881
CVE-2018-0882
CVE-2018-0883
CVE-2018-0884
CVE-2018-0885
CVE-2018-0886
CVE-2018-0888
CVE-2018-0894
CVE-2018-0895
CVE-2018-0896
CVE-2018-0897
CVE-2018-0898
CVE-2018-0899
CVE-2018-0900
CVE-2018-0901
CVE-2018-0902
CVE-2018-0904
CVE-2018-0926
CVE-2018-0977
CVE-2018-0983
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Список CVE
- CVE-2018-0811 warning
- CVE-2018-0813 warning
- CVE-2018-0814 warning
- CVE-2018-0816 high
- CVE-2018-0817 high
- CVE-2018-0868 high
- CVE-2018-0877 high
- CVE-2018-0878 warning
- CVE-2018-0880 high
- CVE-2018-0881 high
- CVE-2018-0882 high
- CVE-2018-0883 critical
- CVE-2018-0884 warning
- CVE-2018-0885 high
- CVE-2018-0886 critical
- CVE-2018-0888 warning
- CVE-2018-0894 warning
- CVE-2018-0895 warning
- CVE-2018-0896 warning
- CVE-2018-0897 warning
- CVE-2018-0898 warning
- CVE-2018-0899 warning
- CVE-2018-0900 warning
- CVE-2018-0901 warning
- CVE-2018-0902 warning
- CVE-2018-0904 warning
- CVE-2018-0926 warning
- CVE-2018-0977 high
- CVE-2018-0983 high
Список KB
- 4103723
- 4088782
- 4088787
- 4088786
- 4088779
- 4088877
- 4088776
- 4088876
- 4088879
- 4088880
- 4103716
- 4103731
- 4103715
- 4103721
- 4103730
- 4103726
- 4103727
- 4103725
- 4556799
- 4551853
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!