Kaspersky ID:
KLA11978
Дата обнаружения:
13/10/2020
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows KernelStream can be exploited remotely via specially crafted application to obtain sensitive information.
  2. An elevation of privilege vulnerability in Windows Network Connections Service can be exploited remotely via specially crafted application to gain privileges.
  3. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  4. A denial of service vulnerability in Windows Remote Desktop Service can be exploited remotely via specially crafted requests to cause denial of service.
  5. An elevation of privilege vulnerability in Windows Application Compatibility Client Library can be exploited remotely via specially crafted application to gain privileges.
  6. A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
  7. A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Event System can be exploited remotely via specially crafted application to gain privileges.
  10. An elevation of privilege vulnerability in Windows — User Profile Service can be exploited remotely via specially crafted application to gain privileges.
  11. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  12. An information disclosure vulnerability in NetBT can be exploited remotely via specially crafted application to obtain sensitive information.
  13. An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows COM Server can be exploited remotely via specially crafted application to gain privileges.
  15. An information disclosure vulnerability in Windows GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
  16. An elevation of privilege vulnerability in Group Policy can be exploited remotely via specially crafted application to gain privileges.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2020-16923
    critical
  • CVE-2020-16889
    high
  • CVE-2020-16887
    critical
  • CVE-2020-16902
    critical
  • CVE-2020-16939
    critical
  • CVE-2020-16972
    critical
  • CVE-2020-16940
    critical
  • CVE-2020-16920
    critical
  • CVE-2020-16922
    high
  • CVE-2020-16924
    critical
  • CVE-2020-16900
    high
  • CVE-2020-16891
    critical
  • CVE-2020-16897
    high
  • CVE-2020-16973
    critical
  • CVE-2020-16976
    critical
  • CVE-2020-16975
    critical
  • CVE-2020-16974
    critical
  • CVE-2020-16936
    critical
  • CVE-2020-16935
    critical
  • CVE-2020-16912
    critical
  • CVE-2020-16914
    high
  • CVE-2020-16916
    critical
  • CVE-2020-16863
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.