Kaspersky ID:
KLA11552
Дата обнаружения:
10/09/2019
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An information disclosure vulnerability in Windows SMB Client Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A cross-site-scripting (XSS) vulnerability Active Directory Federation Services can be exploited remotely via specially crafted request to spoof user interface.
  5. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  6. An elevation of privilege vulnerability in Microsoft Windows Store Installer can be exploited remotely via specially crafted application to gain privileges.
  7. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  8. An information disclosure vulnerability in DirectWrite can be exploited remotely via specially crafted document to obtain sensitive information.
  9. An information disclosure vulnerability in DirectX can be exploited remotely via specially crafted application to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
  11. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  12. An elevation of privilege vulnerability in Diagnostics Hub Standard Collector Service can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Media can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
  15. An elevation of privilege vulnerability in Microsoft Compatibility Appraiser can be exploited remotely via specially crafted application to gain privileges.
  16. A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
  17. An elevation of privilege vulnerability in Windows Network Connectivity Assistant can be exploited remotely via specially crafted application to gain privileges.
  18. An elevation of privilege vulnerability in Windows Audio Service can be exploited remotely via specially crafted application to gain privileges.
  19. An elevation of privilege vulnerability in Winlogon can be exploited remotely via specially crafted application to gain privileges.
  20. A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
  21. An elevation of privilege vulnerability in Windows Update Delivery Optimization can be exploited remotely to gain privileges.
  22. An information disclosure vulnerability in Windows Transaction Manager can be exploited remotely via specially crafted application to obtain sensitive information.
  23. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  24. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  25. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  26. A security feature bypass vulnerability in Windows Secure Boot can be exploited remotely to bypass security restrictions.
  27. An elevation of privilege vulnerability in Windows Text Service Framework can be exploited remotely via specially crafted application to gain privileges.
  28. An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2019-1246
    critical
  • CVE-2019-1292
    high
  • CVE-2019-1215
    high
  • CVE-2019-1250
    critical
  • CVE-2019-1293
    warning
  • CVE-2019-1273
    warning
  • CVE-2019-1249
    critical
  • CVE-2019-0788
    critical
  • CVE-2019-1242
    critical
  • CVE-2019-1270
    warning
  • CVE-2019-1286
    warning
  • CVE-2019-1240
    critical
  • CVE-2019-1252
    warning
  • CVE-2019-1291
    critical
  • CVE-2019-1251
    warning
  • CVE-2019-1216
    warning
  • CVE-2019-1278
    warning
  • CVE-2019-1272
    high
  • CVE-2019-1256
    high
  • CVE-2019-1303
    high
  • CVE-2019-1248
    critical
  • CVE-2019-1232
    warning
  • CVE-2019-1271
    high
  • CVE-2019-0787
    critical
  • CVE-2019-1241
    critical
  • CVE-2019-1247
    critical
  • CVE-2019-1290
    critical
  • CVE-2019-1269
    high
  • CVE-2019-1244
    warning
  • CVE-2019-1253
    high
  • CVE-2019-1267
    high
  • CVE-2019-1280
    critical
  • CVE-2019-1287
    warning
  • CVE-2019-1277
    warning
  • CVE-2019-1268
    high
  • CVE-2019-1285
    high
  • CVE-2019-0928
    high
  • CVE-2019-1289
    warning
  • CVE-2019-1219
    warning
  • CVE-2019-1214
    high
  • CVE-2019-1243
    critical
  • CVE-2019-1282
    warning
  • CVE-2019-1274
    warning
  • CVE-2019-1294
    warning
  • CVE-2019-1235
    high
  • CVE-2019-1254
    warning
  • CVE-2019-1245
    warning

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.