KLA11842
Multiple vulnerabilities in Microsoft Products (ESU)
Обновлено: 22/07/2020
Дата обнаружения
13/06/2017
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  2. A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
  3. An information disclosure vulnerability in Windows Search can be exploited remotely via specially crafted to obtain sensitive information.
  4. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
  5. A remote code execution vulnerability in Windows Uniscribe can be exploited remotely via specially crafted website to execute arbitrary code.
  6. An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
  7. An information disclosure vulnerability in Windows Uniscribe can be exploited remotely via specially crafted document to obtain sensitive information.
  8. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  9. An elevation of privilege vulnerability in Hypervisor Code Integrity can be exploited remotely to gain privileges.
  10. An elevation of privilege vulnerability in Windows COM Session can be exploited remotely via specially crafted application to obtain sensitive information.
  11. A remote code execution vulnerability in Windows Search can be exploited remotely via specially crafted messages to execute arbitrary code.
  12. A remote code execution vulnerability in Windows can be exploited remotely via specially crafted cabinet to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows TDX can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  15. A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
  16. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
  17. A remote code execution vulnerability in Microsoft Office can be exploited remotely via specially crafted to execute arbitrary code.
Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/42235

https://www.exploit-db.com/exploits/42232

https://www.exploit-db.com/exploits/42219

https://www.exploit-db.com/exploits/42228

https://www.exploit-db.com/exploits/42231

https://www.exploit-db.com/exploits/42212

https://www.exploit-db.com/exploits/42229

https://www.exploit-db.com/exploits/42223

https://www.exploit-db.com/exploits/42429

https://www.exploit-db.com/exploits/42382

https://www.exploit-db.com/exploits/42233

https://www.exploit-db.com/exploits/42213

https://www.exploit-db.com/exploits/42236

https://www.exploit-db.com/exploits/42244

https://www.exploit-db.com/exploits/42215

https://www.exploit-db.com/exploits/42224

https://www.exploit-db.com/exploits/42230

https://www.exploit-db.com/exploits/42218

https://www.exploit-db.com/exploits/42225

https://www.exploit-db.com/exploits/42220

https://www.exploit-db.com/exploits/42216

https://www.exploit-db.com/exploits/42214

https://www.exploit-db.com/exploits/42243

https://www.exploit-db.com/exploits/42234

https://www.exploit-db.com/exploits/42210

https://www.exploit-db.com/exploits/42242

https://www.exploit-db.com/exploits/42237

https://www.exploit-db.com/exploits/42217

https://www.exploit-db.com/exploits/42226

https://www.exploit-db.com/exploits/42238

https://www.exploit-db.com/exploits/42239

https://www.exploit-db.com/exploits/42241

https://www.exploit-db.com/exploits/42240

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Microsoft Silverlight 5 when installed on Microsoft Windows (x64-based)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Internet Explorer 9
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows Server 2012
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Lync 2010 (32-bit)
Microsoft Lync 2013 Service Pack 1 (32-bit)
Skype for Business 2016 (64-bit)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Internet Explorer 11
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Lync 2013 Service Pack 1 (64-bit)
Windows Server 2008 for x64-based Systems Service Pack 2
Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editions
Windows Server 2016
Microsoft Lync 2010 Attendee (admin level install)
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1703 for x64-based Systems
Skype for Business 2016 (32-bit)
Microsoft Lync 2010 Attendee (user level install)
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Microsoft Lync 2010 (64-bit)
Microsoft Office Word Viewer
Microsoft Live Meeting 2007 Console
Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows (32-bit)
Microsoft Edge (EdgeHTML-based)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows (x64-based)
Microsoft Office 2007 Service Pack 3
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Windows 10 Version 1607 for 32-bit Systems
Microsoft Office 2016 Click-to-Run (C2R) for 64-bit editions
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 10
Windows 10 Version 1703 for 32-bit Systems
Microsoft Silverlight 5 when installed on Microsoft Windows (32-bit)
Windows Server 2012 R2
Microsoft Live Meeting 2007 Add-in

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2017-8485
CVE-2017-8484
CVE-2017-8481
CVE-2017-8480
CVE-2017-8469
CVE-2017-8482
CVE-2017-8464
CVE-2017-8544
CVE-2017-8462
CVE-2017-0289
CVE-2017-0288
CVE-2017-8528
CVE-2017-8529
CVE-2017-0283
CVE-2017-0282
CVE-2017-0287
CVE-2017-0286
CVE-2017-0285
CVE-2017-0284
CVE-2017-8483
CVE-2017-8517
CVE-2017-0193
CVE-2017-8471
CVE-2017-0298
CVE-2017-8478
CVE-2017-8479
CVE-2017-8543
CVE-2017-8492
CVE-2017-8490
CVE-2017-8491
CVE-2017-8470
CVE-2017-8489
CVE-2017-8472
CVE-2017-8473
CVE-2017-8553
CVE-2017-8475
CVE-2017-8476
CVE-2017-8488
CVE-2017-0294
CVE-2017-0296
CVE-2017-0297
CVE-2017-8534
CVE-2017-8477
CVE-2017-8531
CVE-2017-0299
CVE-2017-8533
CVE-2017-8532
CVE-2017-8527
CVE-2017-8519
CVE-2017-0260
CVE-2017-0300
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

PE 
[?]
Связанные продукты
Microsoft Internet Explorer
Microsoft Silverlight
Microsoft Lync
Microsoft Office
Microsoft Lync 2010 Attendee
Microsoft Word
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
Microsoft Edge
CVE-IDS
CVE-2017-85430.0Unknown
CVE-2017-02840.0Unknown
CVE-2017-84790.0Unknown
CVE-2017-02990.0Unknown
CVE-2017-84850.0Unknown
CVE-2017-01930.0Unknown
CVE-2017-84780.0Unknown
CVE-2017-84880.0Unknown
CVE-2017-85280.0Unknown
CVE-2017-84750.0Unknown
CVE-2017-84760.0Unknown
CVE-2017-84700.0Unknown
CVE-2017-84640.0Unknown
CVE-2017-84800.0Unknown
CVE-2017-84890.0Unknown
CVE-2017-02850.0Unknown
CVE-2017-03000.0Unknown
CVE-2017-85340.0Unknown
CVE-2017-84910.0Unknown
CVE-2017-84710.0Unknown
CVE-2017-84770.0Unknown
CVE-2017-84620.0Unknown
CVE-2017-02940.0Unknown
CVE-2017-84720.0Unknown
CVE-2017-84820.0Unknown
CVE-2017-84920.0Unknown
CVE-2017-84900.0Unknown
CVE-2017-84830.0Unknown
CVE-2017-02830.0Unknown
CVE-2017-84840.0Unknown
CVE-2017-84810.0Unknown
CVE-2017-02820.0Unknown
CVE-2017-02600.0Unknown
CVE-2017-84690.0Unknown
CVE-2017-02970.0Unknown
CVE-2017-02960.0Unknown
CVE-2017-84730.0Unknown
CVE-2017-85170.0Unknown
CVE-2017-85190.0Unknown
CVE-2017-85290.0Unknown
CVE-2017-02860.0Unknown
CVE-2017-02870.0Unknown
CVE-2017-02880.0Unknown
CVE-2017-02890.0Unknown
CVE-2017-85270.0Unknown
CVE-2017-85310.0Unknown
CVE-2017-85320.0Unknown
CVE-2017-85330.0Unknown
CVE-2017-02980.0Unknown
CVE-2017-85440.0Unknown
CVE-2017-85530.0Unknown
Microsoft official advisories
Microsoft Security Update Guide
KB list

4022719
4021558
4022722
4024402
4022008
4021903
4021923
4022013
4022010
4018106
4022887
4022884
4022883
3217845
4034679
4034664
4034741
4036586
4503292
4503269