Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A spoofing vulnerability in Microsoft Bluetooth Driver can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in NetBIOS can be exploited remotely via specially crafted to execute arbitrary code.
- An information disclosure vulnerability in Windows Uniscribe can be exploited remotely via specially crafted document to obtain sensitive information.
- A remote code execution vulnerability in Windows Uniscribe can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted file to execute arbitrary code.
- A spoofing vulnerability in Internet Explorer can be exploited remotely via specially crafted website to spoof user interface.
- An information disclosure vulnerability in Windows System Information Console can be exploited remotely via specially crafted to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Graphics Component can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
Первичный источник обнаружения
- CVE-2017-8707
CVE-2017-8708
CVE-2017-8709
CVE-2017-8628
CVE-2017-0161
CVE-2017-8695
CVE-2017-8696
CVE-2017-8699
CVE-2017-8733
CVE-2017-8710
CVE-2017-8719
CVE-2017-8678
CVE-2017-8679
CVE-2017-8676
CVE-2017-8677
CVE-2017-8675
CVE-2017-8687
CVE-2017-8685
CVE-2017-8684
CVE-2017-8683
CVE-2017-8682
CVE-2017-8681
CVE-2017-8680
CVE-2017-8741
CVE-2017-8720
CVE-2017-8688
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Internet-Explorer
- Microsoft-Lync
- Microsoft-Office
- Microsoft-Lync-2010-Attendee
- Microsoft-Word
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Edge
Список CVE
- CVE-2017-8741 critical
- CVE-2017-8733 warning
- CVE-2017-8675 high
- CVE-2017-8676 warning
- CVE-2017-8719 warning
- CVE-2017-8720 critical
- CVE-2017-0161 critical
- CVE-2017-8628 high
- CVE-2017-8677 high
- CVE-2017-8678 high
- CVE-2017-8679 high
- CVE-2017-8680 high
- CVE-2017-8681 high
- CVE-2017-8682 critical
- CVE-2017-8683 high
- CVE-2017-8684 high
- CVE-2017-8685 high
- CVE-2017-8687 high
- CVE-2017-8688 high
- CVE-2017-8695 high
- CVE-2017-8696 critical
- CVE-2017-8699 high
- CVE-2017-8707 high
- CVE-2017-8708 warning
- CVE-2017-8709 warning
- CVE-2017-8710 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!