Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted image to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in MS XML can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
- A remote code execution vulnerability in Microsoft JET Database Engine can be exploited remotely via specially crafted to execute arbitrary code.
- An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Registry can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Graphics Component can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
Первичный источник обнаружения
- CVE-2018-8475
CVE-2018-8419
CVE-2018-8447
CVE-2018-8420
CVE-2018-8468
CVE-2018-8434
CVE-2018-8332
CVE-2018-8392
CVE-2018-8393
CVE-2018-8336
CVE-2018-8442
CVE-2018-8271
CVE-2018-8410
CVE-2018-8422
CVE-2018-8446
CVE-2018-8433
CVE-2018-8440
CVE-2018-8424
CVE-2018-8443
ADV180022
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Internet-Explorer
- Microsoft-Office
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Список CVE
- CVE-2018-8336 high
- CVE-2018-8433 warning
- CVE-2018-8442 high
- CVE-2018-8440 critical
- CVE-2018-8392 critical
- CVE-2018-8410 critical
- CVE-2018-8332 critical
- CVE-2018-8422 high
- CVE-2018-8271 high
- CVE-2018-8443 high
- CVE-2018-8475 critical
- CVE-2018-8419 high
- CVE-2018-8434 high
- CVE-2018-8420 critical
- CVE-2018-8424 high
- CVE-2018-8468 warning
- CVE-2018-8393 critical
- CVE-2018-8446 high
- CVE-2018-8447 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!