Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.811920
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft Windows Multiple Vulnerabilities (KB4042120)
Zusammenfassung:This host is missing an important security; update according to Microsoft KB4042120
Beschreibung:Summary:
This host is missing an important security
update according to Microsoft KB4042120

Vulnerability Insight:
Multiple flaws exist due to:

- The Windows kernel improperly handles objects in memory.

- The Windows kernel-mode driver fails to properly handle objects in memory.

- The Windows Graphics Component improperly handles objects in memory.

Vulnerability Impact:
Successful exploitation will allow an attacker
to obtain information to further compromise the user's system and also run
arbitrary code in kernel mode.

Affected Software/OS:
Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2.

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-8694
BugTraq ID: 101100
http://www.securityfocus.com/bid/101100
http://www.securitytracker.com/id/1039526
Common Vulnerability Exposure (CVE) ID: CVE-2017-11765
BugTraq ID: 101111
http://www.securityfocus.com/bid/101111
Common Vulnerability Exposure (CVE) ID: CVE-2017-11814
BugTraq ID: 101093
http://www.securityfocus.com/bid/101093
Common Vulnerability Exposure (CVE) ID: CVE-2017-11824
BugTraq ID: 101099
http://www.securityfocus.com/bid/101099
http://www.securitytracker.com/id/1039536
Common Vulnerability Exposure (CVE) ID: CVE-2017-8689
BugTraq ID: 101128
http://www.securityfocus.com/bid/101128
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.