Kaspersky ID:
KLA11221
Дата обнаружения:
10/04/2018
Обновлено:
02/02/2024

Описание

Multiple serious vulnerabilities have been found in Microsoft Windows . Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, cause denial of service and possibly to bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An incorrect applying of network isolation settings in Active Directory can be exploited remotely via a specially designed application to bypass security restrictions;
  2. Multiple improper memory address initialization vulnerabilities in Windows Kernel can be exploited locally via a specially designed application to obtain sensitive information;
  3. An improper HTTP 2.0 requests parsing in HTTP.sys can be exploited remotely via a specially designed request to cause denial of service;
  4. Multiple improper input validation vulnerabilities in Windows Hyper-V can be exploited locally via a specially designed application to obtain sensitive information;
  5. An incorrect handling of objects in memory in Windows Kernel can be exploited locally via a specially designed application to gain privileges;
  6. An incorrect untrusted files validation in Device Guard can be exploited locally via a specially designed application to bypass security restrictions;
  7. An improper handling of malformed SNMP traps in Windows SNMP can be exploited remotely via unknown vectors to cause denial of service and possibly to gain privileges;
  8. An incorrect requests handling in Remote Desktop Protocol (RDP) can be exploited remotely via a specially crafted requests to cause denial of service;
  9. Memory corruption vulnerability in Microsoft Malware Protection Engine can be exploited locally via a specially designed application to execute arbitrary code;
  10. Buffer overflow vulnerability in Microsoft JET Database Engine can be exploited remotely via a specially designed Excel file to execute arbitrary code;
  11. An incorrect handling of objects in memory in VBScript engine can be exploited remotely via a specially crafted website to execute arbitrary code and possible to gain privileges;
  12. An improper handling of objects in memory in Windows Adobe Type Manager Font Driver can be exploited locally via a specially crafted application to gain privileges;
  13. An incorrect kernel memory mapping in DirectX Graphics Kernel Subsystem can be exploited locally via a specially designed application to gain privileges;
  14. Multiple vulnerabilities in Windows font library can be exploited locally via a specially designed document file or remotely via a specially designed website to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2018-0887
    high
  • CVE-2018-0890
    high
  • CVE-2018-0956
    critical
  • CVE-2018-0957
    high
  • CVE-2018-0960
    high
  • CVE-2018-0963
    critical
  • CVE-2018-0964
    high
  • CVE-2018-0966
    warning
  • CVE-2018-0967
    high
  • CVE-2018-0968
    high
  • CVE-2018-0969
    high
  • CVE-2018-0970
    high
  • CVE-2018-0971
    high
  • CVE-2018-0972
    high
  • CVE-2018-0973
    high
  • CVE-2018-0974
    high
  • CVE-2018-0975
    high
  • CVE-2018-0976
    high
  • CVE-2018-1003
    critical
  • CVE-2018-1004
    critical
  • CVE-2018-1008
    high
  • CVE-2018-1009
    critical
  • CVE-2018-1010
    critical
  • CVE-2018-1012
    critical
  • CVE-2018-1013
    critical
  • CVE-2018-1015
    critical
  • CVE-2018-1016
    critical
  • CVE-2018-8116
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.