Kaspersky ID:
KLA11552
Дата обнаружения:
10/09/2019
Обновлено:
09/12/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An information disclosure vulnerability in Windows SMB Client Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A cross-site-scripting (XSS) vulnerability Active Directory Federation Services can be exploited remotely via specially crafted request to spoof user interface.
  5. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  6. An elevation of privilege vulnerability in Microsoft Windows Store Installer can be exploited remotely via specially crafted application to gain privileges.
  7. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  8. An information disclosure vulnerability in DirectWrite can be exploited remotely via specially crafted document to obtain sensitive information.
  9. An information disclosure vulnerability in DirectX can be exploited remotely via specially crafted application to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
  11. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  12. An elevation of privilege vulnerability in Diagnostics Hub Standard Collector Service can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Media can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
  15. An elevation of privilege vulnerability in Microsoft Compatibility Appraiser can be exploited remotely via specially crafted application to gain privileges.
  16. A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
  17. An elevation of privilege vulnerability in Windows Network Connectivity Assistant can be exploited remotely via specially crafted application to gain privileges.
  18. An elevation of privilege vulnerability in Windows Audio Service can be exploited remotely via specially crafted application to gain privileges.
  19. An elevation of privilege vulnerability in Winlogon can be exploited remotely via specially crafted application to gain privileges.
  20. A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
  21. An elevation of privilege vulnerability in Windows Update Delivery Optimization can be exploited remotely to gain privileges.
  22. An information disclosure vulnerability in Windows Transaction Manager can be exploited remotely via specially crafted application to obtain sensitive information.
  23. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  24. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  25. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  26. A security feature bypass vulnerability in Windows Secure Boot can be exploited remotely to bypass security restrictions.
  27. An elevation of privilege vulnerability in Windows Text Service Framework can be exploited remotely via specially crafted application to gain privileges.
  28. An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2019-1292
    high
  • CVE-2019-1215
    high
  • CVE-2019-1293
    high
  • CVE-2019-1273
    high
  • CVE-2019-0788
    high
  • CVE-2019-1270
    high
  • CVE-2019-1286
    high
  • CVE-2019-1252
    high
  • CVE-2019-1291
    high
  • CVE-2019-1251
    high
  • CVE-2019-1216
    high
  • CVE-2019-1278
    high
  • CVE-2019-1272
    high
  • CVE-2019-1256
    high
  • CVE-2019-1303
    unknown
  • CVE-2019-1232
    high
  • CVE-2019-1271
    high
  • CVE-2019-0787
    high
  • CVE-2019-1290
    high
  • CVE-2019-1269
    high
  • CVE-2019-1244
    high
  • CVE-2019-1253
    high
  • CVE-2019-1267
    high
  • CVE-2019-1280
    high
  • CVE-2019-1287
    high
  • CVE-2019-1277
    high
  • CVE-2019-1268
    high
  • CVE-2019-1285
    high
  • CVE-2019-0928
    high
  • CVE-2019-1289
    high
  • CVE-2019-1219
    high
  • CVE-2019-1214
    high
  • CVE-2019-1282
    high
  • CVE-2019-1274
    high
  • CVE-2019-1294
    high
  • CVE-2019-1235
    high
  • CVE-2019-1254
    high
  • CVE-2019-1245
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.