Kaspersky ID:
KLA11875
Дата обнаружения:
09/04/2019
Обновлено:
18/03/2024

Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  3. A remote code execution vulnerability in Windows IOleCvt Interface can be exploited remotely via specially crafted website to execute arbitrary code.
  4. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  5. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  6. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  7. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  8. An elevation of privilege vulnerability in Windows CSRSS can be exploited remotely via specially crafted application to gain privileges.
  9. A remote code execution vulnerability in MS XML can be exploited remotely via specially crafted website to execute arbitrary code.
  10. A remote code execution vulnerability in OLE Automation can be exploited remotely via specially crafted website to execute arbitrary code.
  11. An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
  12. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  13. A remote code execution vulnerability in Windows can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
  15. A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
  16. A tampering vulnerability in Microsoft Browsers can be exploited remotely via specially crafted website to spoof user interface.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2019-0845
    critical
  • CVE-2019-0794
    critical
  • CVE-2019-0795
    critical
  • CVE-2019-0856
    high
  • CVE-2019-0803
    critical
  • CVE-2019-0792
    critical
  • CVE-2019-0879
    critical
  • CVE-2019-0842
    critical
  • CVE-2019-0846
    critical
  • CVE-2019-0796
    high
  • CVE-2019-0791
    critical
  • CVE-2019-0793
    critical
  • CVE-2019-0859
    critical
  • CVE-2019-0877
    critical
  • CVE-2019-0802
    high
  • CVE-2019-0847
    critical
  • CVE-2019-0805
    critical
  • CVE-2019-0730
    critical
  • CVE-2019-0849
    high
  • CVE-2019-0836
    critical
  • CVE-2019-0735
    critical
  • CVE-2019-0731
    critical
  • CVE-2019-0732
    critical
  • CVE-2019-0851
    critical
  • CVE-2019-0844
    high
  • CVE-2019-0853
    critical
  • CVE-2019-0838
    critical
  • CVE-2019-0848
    high
  • CVE-2019-0839
    warning
  • CVE-2019-0764
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.