Kaspersky ID:
KLA11881
Дата обнаружения:
08/01/2019
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  4. A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2019-0549
    warning
  • CVE-2019-0583
    critical
  • CVE-2019-0543
    warning
  • CVE-2019-0580
    critical
  • CVE-2019-0569
    warning
  • CVE-2019-0577
    critical
  • CVE-2019-0554
    warning
  • CVE-2019-0581
    critical
  • CVE-2019-0582
    critical
  • CVE-2019-0579
    critical
  • CVE-2019-0536
    warning
  • CVE-2019-0578
    critical
  • CVE-2019-0584
    critical
  • CVE-2019-0538
    critical
  • CVE-2019-0576
    critical
  • CVE-2019-0575
    critical
  • CVE-2019-0541
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.