Kaspersky ID:
KLA49156
Дата обнаружения:
09/05/2023
Обновлено:
25/07/2024

Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
  2. An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely to gain privileges.
  3. An information disclosure vulnerability in Windows NTLM Security Support Provider can be exploited remotely to obtain sensitive information.
  4. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  5. A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
  6. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  7. An information disclosure vulnerability in Windows iSCSI Target Service can be exploited remotely to obtain sensitive information.
  8. A denial of service vulnerability in Remote Procedure Call Runtime can be exploited remotely to cause denial of service.
  9. A security feature bypass vulnerability in Windows Driver Revocation List can be exploited remotely to bypass security restrictions.
  10. A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
  11. A denial of service vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to cause denial of service.
  12. A remote code execution vulnerability in Windows Secure Socket Tunneling Protocol (SSTP) can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  15. A remote code execution vulnerability in Windows Network File System can be exploited remotely to execute arbitrary code.
  16. An elevation of privilege vulnerability in Windows Bluetooth Driver can be exploited remotely to gain privileges.
  17. An information disclosure vulnerability in Windows NFS Portmapper can be exploited remotely to obtain sensitive information.
  18. A denial of service vulnerability in Server for NFS can be exploited remotely to cause denial of service.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2023-29324
    high
  • CVE-2023-24946
    critical
  • CVE-2023-24900
    high
  • CVE-2023-24939
    critical
  • CVE-2023-29325
    critical
  • CVE-2023-24932
    high
  • CVE-2023-24948
    high
  • CVE-2023-24943
    critical
  • CVE-2023-24941
    critical
  • CVE-2023-24945
    high
  • CVE-2023-24942
    critical
  • CVE-2023-28251
    high
  • CVE-2023-28283
    critical
  • CVE-2023-24940
    critical
  • CVE-2023-24903
    critical
  • CVE-2023-24901
    critical
  • CVE-2023-29336
    critical
  • CVE-2023-24904
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.