Kaspersky ID:
KLA12226
Дата обнаружения:
13/07/2021
Обновлено:
02/02/2024

Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows SMB can be exploited remotely to obtain sensitive information.
  2. A spoofing vulnerability in Windows Certificate can be exploited remotely to spoof user interface.
  3. A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
  4. A denial of service vulnerability in Windows DNS Server can be exploited remotely to cause denial of service.
  5. A spoofing vulnerability in Windows Installer can be exploited remotely to spoof user interface.
  6. A remote code execution vulnerability in Windows Address Book can be exploited remotely to execute arbitrary code.
  7. A security feature bypass vulnerability in Windows LSA can be exploited remotely to bypass security restrictions.
  8. An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  10. A denial of service vulnerability in Windows LSA can be exploited remotely to cause denial of service.
  11. A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
  12. A remote code execution vulnerability in Windows DNS Snap-in can be exploited remotely to execute arbitrary code.
  13. A denial of service vulnerability in Windows TCP/IP Driver can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  15. An information disclosure vulnerability in GDI+ can be exploited remotely to obtain sensitive information.
  16. An information disclosure vulnerability in Windows Key Distribution Center can be exploited remotely to obtain sensitive information.
  17. A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
  18. A security feature bypass vulnerability in Windows Security Account Manager Remote Protocol can be exploited remotely to bypass security restrictions.
  19. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  20. A remote code execution vulnerability in Microsoft Windows Media Foundation can be exploited remotely to execute arbitrary code.
  21. An information disclosure vulnerability in Windows Remote Assistance can be exploited remotely to obtain sensitive information.
  22. An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
  23. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  24. A denial of service vulnerability in Bowser.sys can be exploited remotely to cause denial of service.
  25. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  26. A spoofing vulnerability in Windows Authenticode can be exploited remotely to spoof user interface.
  27. An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
  28. An information disclosure vulnerability in Windows GDI can be exploited remotely to obtain sensitive information.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2021-34497
    high
  • CVE-2021-34444
    high
  • CVE-2021-34504
    critical
  • CVE-2021-34456
    critical
  • CVE-2021-33788
    critical
  • CVE-2021-34494
    critical
  • CVE-2021-34446
    critical
  • CVE-2021-31183
    critical
  • CVE-2021-33745
    high
  • CVE-2021-34440
    high
  • CVE-2021-33749
    critical
  • CVE-2021-33764
    high
  • CVE-2021-33757
    high
  • CVE-2021-34441
    critical
  • CVE-2021-34507
    high
  • CVE-2021-34516
    critical
  • CVE-2021-33780
    critical
  • CVE-2021-34476
    critical
  • CVE-2021-34511
    critical
  • CVE-2021-34500
    high
  • CVE-2021-34496
    high
  • CVE-2021-33783
    high
  • CVE-2021-34492
    critical
  • CVE-2021-34442
    critical
  • CVE-2021-33765
    high
  • CVE-2021-33786
    critical
  • CVE-2021-33754
    critical
  • CVE-2021-33752
    critical
  • CVE-2021-33750
    critical
  • CVE-2021-31979
    critical
  • CVE-2021-33756
    critical
  • CVE-2021-34448
    high
  • CVE-2021-34499
    high
  • CVE-2021-34457
    high
  • CVE-2021-33746
    critical
  • CVE-2021-34498
    critical
  • CVE-2021-34447
    high
  • CVE-2021-33782
    high
  • CVE-2021-34514
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.