Дата обнаружения
|
10/12/2019 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, bypass security restrictions, cause denial of service. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
The following public exploits exists for this vulnerability: https://github.com/rip1s/CVE-2019-1458 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2019-1470 CVE-2019-1466 CVE-2019-1474 CVE-2019-1465 CVE-2019-1484 CVE-2019-1478 CVE-2019-1468 CVE-2019-1458 CVE-2019-1480 CVE-2019-1481 CVE-2019-1485 CVE-2019-1488 CVE-2019-1453 CVE-2019-1467 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
|
CVE-2019-14846.8High
CVE-2019-14882.1Warning CVE-2019-14704.0Warning CVE-2019-14535.0Critical CVE-2019-14654.3Warning CVE-2019-14587.2High CVE-2019-14742.1Warning CVE-2019-14814.3Warning CVE-2019-14804.3Warning CVE-2019-14674.3Warning CVE-2019-14689.3Critical CVE-2019-14787.2High CVE-2019-14664.3Warning CVE-2019-14857.6Critical |
KB list
|