Kaspersky ID:
KLA11977
Дата обнаружения:
13/10/2020
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An information disclosure vulnerability in Windows KernelStream can be exploited remotely via specially crafted application to obtain sensitive information.
  3. An elevation of privilege vulnerability in Windows Network Connections Service can be exploited remotely via specially crafted application to gain privileges.
  4. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely via specially crafted application to gain privileges.
  6. A remote code execution vulnerability in Windows TCP/IP can be exploited remotely via specially crafted to execute arbitrary code.
  7. A remote code execution vulnerability in Windows Camera Codec Pack can be exploited remotely via specially crafted file to execute arbitrary code.
  8. An elevation of privilege vulnerability in Group Policy can be exploited remotely via specially crafted application to gain privileges.
  9. An elevation of privilege vulnerability in Windows iSCSI Target Service can be exploited remotely via specially crafted application to gain privileges.
  10. An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely via specially crafted application to gain privileges.
  11. An elevation of privilege vulnerability in Windows Application Compatibility Client Library can be exploited remotely via specially crafted application to gain privileges.
  12. An information disclosure vulnerability in Windows Enterprise App Management Service can be exploited remotely to obtain sensitive information.
  13. An elevation of privilege vulnerability in Windows — User Profile Service can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows Setup can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely via specially crafted application to gain privileges.
  16. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  17. A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
  18. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  19. A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
  20. An elevation of privilege vulnerability in Windows Event System can be exploited remotely via specially crafted application to gain privileges.
  21. A denial of service vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to cause denial of service.
  22. An elevation of privilege vulnerability in Windows Storage Services can be exploited remotely via specially crafted application to gain privileges.
  23. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  24. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  25. An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
  26. A remote code execution vulnerability in Windows NAT can be exploited remotely via specially crafted application to execute arbitrary code.
  27. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  28. An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to obtain sensitive information.
  29. An information disclosure vulnerability in NetBT can be exploited remotely via specially crafted application to obtain sensitive information.
  30. A denial of service vulnerability in Windows TCP/IP can be exploited remotely via specially crafted to cause denial of service.
  31. An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
  32. An elevation of privilege vulnerability in Windows COM Server can be exploited remotely via specially crafted application to gain privileges.
  33. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  34. An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
  35. A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
  36. A security feature bypass vulnerability in Windows can be exploited remotely via specially crafted application to bypass security restrictions.
  37. A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
  38. An information disclosure vulnerability in Windows Text Services Framework can be exploited remotely via specially crafted file to obtain sensitive information.
  39. An elevation of privilege vulnerability in Windows Error Reporting Manager can be exploited remotely via specially crafted application to gain privileges.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2020-16923
    critical
  • CVE-2020-16889
    high
  • CVE-2020-16887
    critical
  • CVE-2020-16902
    critical
  • CVE-2020-16885
    critical
  • CVE-2020-16898
    critical
  • CVE-2020-16968
    critical
  • CVE-2020-16939
    critical
  • CVE-2020-16980
    critical
  • CVE-2020-16972
    critical
  • CVE-2020-16967
    critical
  • CVE-2020-16876
    high
  • CVE-2020-16919
    high
  • CVE-2020-16940
    critical
  • CVE-2020-16908
    critical
  • CVE-2020-16909
    critical
  • CVE-2020-16920
    critical
  • CVE-2020-16907
    critical
  • CVE-2020-16922
    high
  • CVE-2020-16905
    high
  • CVE-2020-16924
    critical
  • CVE-2020-1243
    critical
  • CVE-2020-16900
    high
  • CVE-2020-16927
    critical
  • CVE-2020-0764
    critical
  • CVE-2020-16890
    critical
  • CVE-2020-16891
    critical
  • CVE-2020-16892
    critical
  • CVE-2020-16894
    critical
  • CVE-2020-16901
    warning
  • CVE-2020-16896
    critical
  • CVE-2020-16897
    high
  • CVE-2020-16973
    critical
  • CVE-2020-16899
    critical
  • CVE-2020-1047
    critical
  • CVE-2020-16976
    critical
  • CVE-2020-16975
    critical
  • CVE-2020-16974
    critical
  • CVE-2020-16936
    critical
  • CVE-2020-16935
    critical
  • CVE-2020-1167
    critical
  • CVE-2020-16877
    high
  • CVE-2020-16912
    critical
  • CVE-2020-1080
    critical
  • CVE-2020-16914
    high
  • CVE-2020-16916
    critical
  • CVE-2020-16911
    critical
  • CVE-2020-16910
    high
  • CVE-2020-16913
    critical
  • CVE-2020-16938
    high
  • CVE-2020-16915
    critical
  • CVE-2020-16921
    high
  • CVE-2020-16895
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.