KLA19249
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 29/09/2023
Дата обнаружения
13/09/2022
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft OLE DB Provider for SQL Server can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Windows Fax Service can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Credential Roaming Service can be exploited remotely to gain privileges.
  6. A denial of service vulnerability in Windows DNS Server can be exploited remotely to cause denial of service.
  7. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  9. A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
  10. A remote code execution vulnerability in Windows Internet Key Exchange (IKE) Protocol Extensions can be exploited remotely to execute arbitrary code.
  11. An elevation of privilege vulnerability in Windows Group Policy can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
  14. An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
  15. An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  17. A denial of service vulnerability in Windows Secure Channel can be exploited remotely to cause denial of service.
  18. A denial of service vulnerability in Windows Event Tracing can be exploited remotely to cause denial of service.
  19. An information disclosure vulnerability in SPNEGO Extended Negotiation (NEGOEX) Security Mechanism can be exploited remotely to obtain sensitive information.
  20. A denial of service vulnerability in Windows Internet Key Exchange (IKE) Extension can be exploited remotely to cause denial of service.
  21. An elevation of privilege vulnerability in Windows Distributed File System (DFS) can be exploited remotely to gain privileges.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2022-35840
CVE-2022-38004
CVE-2022-34727
CVE-2022-37969
CVE-2022-30170
CVE-2022-34724
CVE-2022-33647
CVE-2022-34732
CVE-2022-35830
CVE-2022-34726
CVE-2022-34718
CVE-2022-34721
CVE-2022-37955
CVE-2022-34731
CVE-2022-35803
CVE-2022-30200
CVE-2022-34730
CVE-2022-34729
CVE-2022-38006
CVE-2022-38005
CVE-2022-37964
CVE-2022-37956
CVE-2022-34733
CVE-2022-35836
CVE-2022-35833
CVE-2022-35832
CVE-2022-37958
CVE-2022-35835
CVE-2022-33679
CVE-2022-34734
CVE-2022-34728
CVE-2022-34720
CVE-2022-34719
CVE-2022-34722
CVE-2022-35837
CVE-2022-35834
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows 7
Microsoft Windows Server 2008
CVE-IDS
CVE-2022-358405.0Warning
CVE-2022-380045.0Warning
CVE-2022-347275.0Warning
CVE-2022-379695.0Warning
CVE-2022-301705.0Warning
CVE-2022-347245.0Warning
CVE-2022-336475.0Warning
CVE-2022-347325.0Warning
CVE-2022-358305.0Warning
CVE-2022-347265.0Warning
CVE-2022-347185.0Warning
CVE-2022-347215.0Warning
CVE-2022-379555.0Warning
CVE-2022-347315.0Warning
CVE-2022-358035.0Warning
CVE-2022-302005.0Warning
CVE-2022-347305.0Warning
CVE-2022-347295.0Warning
CVE-2022-380065.0Warning
CVE-2022-380055.0Warning
CVE-2022-379565.0Warning
CVE-2022-347335.0Warning
CVE-2022-358365.0Warning
CVE-2022-358335.0Warning
CVE-2022-358325.0Warning
CVE-2022-379585.0Warning
CVE-2022-358355.0Warning
CVE-2022-336795.0Warning
CVE-2022-347345.0Warning
CVE-2022-347285.0Warning
CVE-2022-347205.0Warning
CVE-2022-347195.0Warning
CVE-2022-347225.0Warning
CVE-2022-358375.0Warning
CVE-2022-358345.0Warning
CVE-2022-379645.0Warning
KB list

5017361
5017373
5017371
5017358