KLA11394
Multiple vulnerabilities in Microsoft Windows
Обновлено: 29/03/2019
Дата обнаружения
08/01/2019
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
  2. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  3. An elevation of privilege vulnerability in Windows Runtime can be exploited remotely via specially crafted application to gain privileges.
  4. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  5. An elevation of privilege vulnerability in Microsoft XmlDocument can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
  7. A remote code execution vulnerability in Windows DHCP Client can be exploited remotely via specially crafted application to execute arbitrary code.
  8. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  9. An information disclosure vulnerability in Windows Subsystem for Linux can be exploited remotely via specially crafted application to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows COM can be exploited remotely via specially crafted application to gain privileges.
Пораженные продукты

Windows 10 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows Server 2019
Windows 10 Version 1809 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows Server, version 1709 (Server Core Installation)
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1709 for 64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 8.1 for 32-bit systems
Windows Server 2012
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2012 (Server Core installation)

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2019-0572
CVE-2019-0549
CVE-2019-0570
CVE-2019-0583
CVE-2019-0555
CVE-2019-0543
CVE-2019-0580
CVE-2019-0571
CVE-2019-0547
CVE-2019-0574
CVE-2019-0550
CVE-2019-0569
CVE-2019-0551
CVE-2019-0553
CVE-2019-0573
CVE-2019-0577
CVE-2019-0554
CVE-2019-0581
CVE-2019-0582
CVE-2019-0579
CVE-2019-0536
CVE-2019-0578
CVE-2019-0584
CVE-2019-0552
CVE-2019-0538
CVE-2019-0576
CVE-2019-0575
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

PE 
[?]
CVE-IDS
CVE-2019-05727.8Critical
CVE-2019-05494.7Critical
CVE-2019-05707.8Critical
CVE-2019-05837.8Critical
CVE-2019-05557.0Critical
CVE-2019-05437.8Critical
CVE-2019-05807.8Critical
CVE-2019-05717.8Critical
CVE-2019-05479.8Critical
CVE-2019-05747.8Critical
CVE-2019-05507.6Critical
CVE-2019-05695.5Critical
CVE-2019-05517.6Critical
CVE-2019-05534.7Critical
CVE-2019-05737.8Critical
CVE-2019-05777.8Critical
CVE-2019-05544.7Critical
CVE-2019-05817.8Critical
CVE-2019-05827.8Critical
CVE-2019-05797.8Critical
CVE-2019-05364.7Critical
CVE-2019-05787.8Critical
CVE-2019-05847.8Critical
CVE-2019-05527.0Critical
CVE-2019-05387.8Critical
CVE-2019-05767.8Critical
CVE-2019-05757.8Critical
KB list

4480978
4480962
4480966
4480116
4480961
4480973
4480963
4480960
4480968
4480964
4480957
4480972
4480970
4480975
4487020
4487017
4486996
4487026
4487025
4487044
4487018
4487028
4487000
4486993

Microsoft official advisories
Microsoft Security Update Guide