Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows COM Aggregate Marshaler can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows when the Win32k component fails to properly handle objects in memory can be exploited remotely to gain privileges.
- Information disclosure vulnerability when DirectX improperly handles objects in memory can be exploited to obtain sensitive information.
- A tampering vulnerability exists in PowerShell can be exploited to execute unlogged code.
- An elevation of privilege vulnerability in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory can be exploited remotely to gain privileges.
- A remote code execution vulnerability in the way that the VBScript engine handles objects in memory can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in the way that Windows Deployment Services TFTP Server handles objects in memory can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability when Windows improperly handles calls to Win32k.sys can be exploited remotely to gain privileges.
- A remote code execution vulnerability when PowerShell improperly handles specially crafted files can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability when the win32k component improperly provides kernel information can be exploited to obtain sensitive information.
- A remote code execution vulnerability when Windows Search handles objects in memory can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability when «Kernel Remote Procedure Call Provider» driver improperly initializes objects in memory can be exploited to obtain sensitive information.
- Security vulnerability when Windows incorrectly validates kernel driver signatures can be exploited to bypass security restrictions.
- Security UI vulnerability when an open source customization for Microsoft Active Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected AD FS server can be exploited to spoof user interface.
- An elevation of privilege vulnerability when DirectX improperly handles objects in memory can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2018-8552
CVE-2018-8408
CVE-2018-8553
CVE-2018-8550
CVE-2018-8562
CVE-2018-8563
CVE-2018-8415
CVE-2018-8471
CVE-2018-8544
CVE-2018-8476
CVE-2018-8589
CVE-2018-8256
CVE-2018-8565
CVE-2018-8450
CVE-2018-8407
CVE-2018-8549
CVE-2018-8547
CVE-2018-8485
CVE-2018-8561
ADV990001
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Internet-Explorer
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
Список CVE
- CVE-2018-8552 critical
- CVE-2018-8408 high
- CVE-2018-8553 critical
- CVE-2018-8550 critical
- CVE-2018-8562 critical
- CVE-2018-8561 critical
- CVE-2018-8563 high
- CVE-2018-8415 critical
- CVE-2018-8471 critical
- CVE-2018-8547 high
- CVE-2018-8544 critical
- CVE-2018-8485 critical
- CVE-2018-8476 critical
- CVE-2018-8589 critical
- CVE-2018-8256 critical
- CVE-2018-8565 high
- CVE-2018-8549 high
- CVE-2018-8450 critical
- CVE-2018-8407 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!