KLA49156
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 07/06/2023
Дата обнаружения
09/05/2023
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Windows iSCSI Target Service can be exploited remotely to obtain sensitive information.
  2. A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
  3. An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely to gain privileges.
  4. An information disclosure vulnerability in Windows NTLM Security Support Provider can be exploited remotely to obtain sensitive information.
  5. A security feature bypass vulnerability in Windows Driver Revocation List can be exploited remotely to bypass security restrictions.
  6. A denial of service vulnerability in Remote Procedure Call Runtime can be exploited remotely to cause denial of service.
  7. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in Windows Secure Socket Tunneling Protocol (SSTP) can be exploited remotely to execute arbitrary code.
  9. A denial of service vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to cause denial of service.
  10. A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
  11. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  14. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
Эксплуатация

The following public exploits exists for this vulnerability:

https://github.com/OLeDouxEt/CVE-2023-29324_Patch_Deploy

https://github.com/a-bazi/test-CVE-2023-29325

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2023-24945
CVE-2023-29324
CVE-2023-24946
CVE-2023-24900
CVE-2023-28251
CVE-2023-24942
CVE-2023-29325
CVE-2023-24903
CVE-2023-24940
CVE-2023-24932
CVE-2023-24904
CVE-2023-28283
CVE-2023-29336
CVE-2023-24943
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2008
CVE-IDS
CVE-2023-293245.0Critical
CVE-2023-249465.0Critical
CVE-2023-249005.0Critical
CVE-2023-293255.0Critical
CVE-2023-249325.0Critical
CVE-2023-249435.0Critical
CVE-2023-249455.0Critical
CVE-2023-249425.0Critical
CVE-2023-282515.0Critical
CVE-2023-282835.0Critical
CVE-2023-249405.0Critical
CVE-2023-249035.0Critical
CVE-2023-293365.0Critical
CVE-2023-249045.0Critical
KB list

5026366
5026426
5026408
5026427
5026413