Searching
..

Click anywhere to stop

KLA12341
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 22/01/2024
Дата обнаружения
09/11/2021
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
  2. An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
  3. An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely to obtain sensitive information.
  4. An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely to obtain sensitive information.
  5. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  6. An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
  7. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Microsoft COM for Windows can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Credential Security Support Provider Protocol (CredSSP) can be exploited remotely to gain privileges.
  11. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2012
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2021-42282
CVE-2021-41367
CVE-2021-41371
CVE-2021-38665
CVE-2021-38666
CVE-2021-42291
CVE-2021-42278
CVE-2021-41377
CVE-2021-41379
CVE-2021-42285
CVE-2021-42283
CVE-2021-42275
CVE-2021-38631
CVE-2021-41370
CVE-2021-42287
CVE-2021-41366
CVE-2021-42284
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows Server 2008
CVE-IDS
KB list

5007233
5007236
5007263
5007246
5007260
5007255
5007245
5007247