Дата обнаружения
|
13/12/2016 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
The following public exploits exists for this vulnerability: https://www.exploit-db.com/exploits/41615 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2016-7219 CVE-2016-7272 CVE-2016-7259 CVE-2016-7274 CVE-2016-7260 CVE-2016-7278 CVE-2016-7279 CVE-2016-7295 CVE-2016-7292 CVE-2016-7257 CVE-2016-7283 CVE-2016-7282 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Internet Explorer Microsoft Office Microsoft Word Microsoft Windows Microsoft Windows Server Microsoft Windows Vista Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 Microsoft Edge |
CVE-IDS
|
CVE-2016-72729.3Critical
CVE-2016-72574.3Warning CVE-2016-72797.6Critical CVE-2016-72782.6Warning CVE-2016-72839.3Critical CVE-2016-72824.3Warning CVE-2016-72927.2High CVE-2016-72749.3Critical CVE-2016-72952.1Warning CVE-2016-72192.1Warning CVE-2016-72597.2High CVE-2016-72607.2High |
KB list
|
3203621 |