KLA12167
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 27/05/2021
Дата обнаружения
11/05/2021
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Hyper-V can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  3. An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely to obtain sensitive information.
  4. A spoofing vulnerability in Windows Wireless Networking can be exploited remotely to spoof user interface.
  5. An information disclosure vulnerability in Microsoft Windows Infrared Data Association (IrDA) can be exploited remotely to obtain sensitive information.
  6. A spoofing vulnerability in Microsoft Bluetooth Driver can be exploited remotely to spoof user interface.
  7. An elevation of privilege vulnerability in Windows SSDP Service can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Microsoft Jet Red Database Engine and Access Connectivity Engine can be exploited remotely to execute arbitrary code.
  9. A remote code execution vulnerability in OLE Automation can be exploited remotely to execute arbitrary code.
  10. An information disclosure vulnerability in Windows Wireless Networking can be exploited remotely to obtain sensitive information.
  11. A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server, version 1909 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Windows 10 Version 1803 for x64-based Systems
Internet Explorer 11
Windows 10 for x64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 8.1 for 32-bit systems
Internet Explorer 9
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 (32-bit edition)
Windows 10 Version 1909 for ARM64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 1909 for 32-bit Systems
Microsoft Office 2013 RT Service Pack 1
Windows 10 Version 2004 for x64-based Systems
Windows Server 2019 (Server Core installation)
Microsoft Office 2019 for 32-bit editions
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 10 Version 1909 for x64-based Systems
Windows Server 2012
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows RT 8.1
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 for 32-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Windows Server 2019
Microsoft Office 2019 for 64-bit editions
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2016
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Windows 10 Version 2004 for 32-bit Systems
Microsoft 365 Apps for Enterprise for 64-bit Systems
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 10 Version 1803 for 32-bit Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 8.1 for x64-based systems

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2021-28476
CVE-2021-31188
CVE-2021-31186
CVE-2020-24588
CVE-2021-31184
CVE-2021-31182
CVE-2020-26144
CVE-2021-31193
CVE-2021-28455
CVE-2021-31194
CVE-2020-24587
CVE-2021-26419
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Internet Explorer
Microsoft Office
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2021-284765.0Critical
CVE-2021-311885.0Critical
CVE-2021-311865.0Critical
CVE-2020-245882.9Warning
CVE-2021-311845.0Critical
CVE-2021-311825.0Critical
CVE-2020-261445.0Critical
CVE-2021-311935.0Critical
CVE-2021-284555.0Critical
CVE-2021-311945.0Critical
CVE-2020-245871.8Warning
CVE-2021-264195.0Critical
Microsoft official advisories
Microsoft Security Update Guide
KB list

5003228
5003233
5003210
5003165
5003225

Узнай статистику распространения уязвимостей в твоем регионе