KLA50775
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 29/09/2023
Дата обнаружения
11/07/2023
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, execute arbitrary code, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Remote Procedure Call Runtime can be exploited remotely to cause denial of service.
  2. An information disclosure vulnerability in Remote Procedure Call Runtime can be exploited remotely to obtain sensitive information.
  3. A remote code execution vulnerability in Remote Procedure Call Runtime can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Microsoft VOLSNAP.SYS can be exploited remotely to gain privileges.
  5. A remote code execution vulnerability in Microsoft Message Queuing can be exploited remotely to execute arbitrary code.
  6. A denial of service vulnerability in Windows Deployment Services can be exploited remotely to cause denial of service.
  7. An elevation of privilege vulnerability in Active Template Library can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  9. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  10. A remote code execution vulnerability in Windows Active Directory Certificate Services (AD CS) can be exploited remotely to execute arbitrary code.
  11. An elevation of privilege vulnerability in Windows MSHTML Platform can be exploited remotely to gain privileges.
  12. A denial of service vulnerability in Microsoft Message Queuing can be exploited remotely to cause denial of service.
  13. An elevation of privilege vulnerability in Windows Transaction Manager can be exploited remotely to gain privileges.
  14. An information disclosure vulnerability in Microsoft DirectMusic can be exploited remotely to obtain sensitive information.
  15. Security bypass vulnerability in Windows Remote Desktop Protocol can be exploited remotely to bypass security restrictions.
  16. A remote code execution vulnerability in Windows Deployment Services can be exploited remotely to execute arbitrary code.
  17. A security feature bypass vulnerability in Windows Remote Desktop can be exploited remotely to bypass security restrictions.
  18. A remote code execution vulnerability in Office and Windows HTML can be exploited remotely to execute arbitrary code.
  19. An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
  20. An information disclosure vulnerability in OLE Automation can be exploited remotely to obtain sensitive information.
  21. A remote code execution vulnerability in Windows Network Load Balancing can be exploited remotely to execute arbitrary code.
  22. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  23. A remote code execution vulnerability in Microsoft Failover Cluster can be exploited remotely to execute arbitrary code.
  24. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  25. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  26. An information disclosure vulnerability in Windows Netlogon can be exploited remotely to obtain sensitive information.
  27. A remote code execution vulnerability in USB Audio Class System Driver can be exploited remotely to execute arbitrary code.
  28. A remote code execution vulnerability in Windows Pragmatic General Multicast (PGM) can be exploited remotely to execute arbitrary code.
  29. An elevation of privilege vulnerability in Volume Shadow Copy can be exploited remotely to gain privileges.
  30. A remote code execution vulnerability in Microsoft ODBC Driver can be exploited remotely to execute arbitrary code.
  31. An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
  32. An elevation of privilege vulnerability in Windows CNG Key Isolation Service can be exploited remotely to gain privileges.
  33. A denial of service vulnerability in Windows Extended Negotiation can be exploited remotely to cause denial of service.
  34. A denial of service vulnerability in Windows Peer Name Resolution Protocol can be exploited remotely to cause denial of service.
  35. An elevation of privilege vulnerability in Windows Image Acquisition can be exploited remotely to gain privileges.
Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2023-33167
CVE-2023-33164
CVE-2023-35316
CVE-2023-35300
CVE-2023-32034
CVE-2023-35312
CVE-2023-32057
CVE-2023-35318
CVE-2023-33169
CVE-2023-35321
CVE-2023-32055
CVE-2023-35345
CVE-2023-35309
CVE-2023-35365
CVE-2023-33168
CVE-2023-35350
CVE-2023-32046
CVE-2023-32044
CVE-2023-35328
CVE-2023-35341
CVE-2023-35332
CVE-2023-35322
CVE-2023-32043
CVE-2023-35344
CVE-2023-36884
CVE-2023-36874
CVE-2023-33166
CVE-2023-32035
CVE-2023-32042
CVE-2023-35314
CVE-2023-33163
CVE-2023-33173
CVE-2023-33154
CVE-2023-32033
CVE-2023-35319
CVE-2023-35299
CVE-2023-32053
CVE-2023-35351
CVE-2023-21526
CVE-2023-32045
CVE-2023-35303
CVE-2023-35367
CVE-2023-35297
CVE-2023-32054
CVE-2023-35366
CVE-2023-33172
CVE-2023-32038
CVE-2023-33174
CVE-2023-35310
CVE-2023-35340
CVE-2023-35346
CVE-2023-35330
CVE-2023-32050
CVE-2023-35338
CVE-2023-35342
ADV230001
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Server 2008
CVE-IDS
CVE-2023-368845.0Warning
CVE-2023-331675.0Warning
CVE-2023-353165.0Warning
CVE-2023-320345.0Warning
CVE-2023-320575.0Warning
CVE-2023-353185.0Warning
CVE-2023-331695.0Warning
CVE-2023-353215.0Warning
CVE-2023-353455.0Warning
CVE-2023-353095.0Warning
CVE-2023-331685.0Warning
CVE-2023-353505.0Warning
CVE-2023-320465.0Warning
CVE-2023-353445.0Warning
CVE-2023-331665.0Warning
CVE-2023-320355.0Warning
CVE-2023-331635.0Warning
CVE-2023-352995.0Warning
CVE-2023-320535.0Warning
CVE-2023-353515.0Warning
CVE-2023-320455.0Warning
CVE-2023-353675.0Warning
CVE-2023-352975.0Warning
CVE-2023-320545.0Warning
CVE-2023-320385.0Warning
CVE-2023-331745.0Warning
CVE-2023-353465.0Warning
CVE-2023-353385.0Warning
CVE-2023-353425.0Warning
CVE-2023-331645.0Warning
CVE-2023-353005.0Warning
CVE-2023-353125.0Warning
CVE-2023-320555.0Warning
CVE-2023-353655.0Warning
CVE-2023-320445.0Warning
CVE-2023-353285.0Warning
CVE-2023-353415.0Warning
CVE-2023-353225.0Warning
CVE-2023-353325.0Warning
CVE-2023-320435.0Warning
CVE-2023-368745.0Warning
CVE-2023-320425.0Warning
CVE-2023-353145.0Warning
CVE-2023-331735.0Warning
CVE-2023-331545.0Warning
CVE-2023-320335.0Warning
CVE-2023-353195.0Warning
CVE-2023-215265.0Warning
CVE-2023-353035.0Warning
CVE-2023-353665.0Warning
CVE-2023-331725.0Warning
CVE-2023-353105.0Warning
CVE-2023-353405.0Warning
CVE-2023-353305.0Warning
CVE-2023-320505.0Warning
KB list

5028222
5028226
5028240
5028167
5028224
5029301
5029318
5029296
5029307