Beschreibung: | Summary: This host is missing a critical security update according to Microsoft KB4041691
Vulnerability Insight: Multiple flaws exist due to:
- A spoofing vulnerability in the Windows implementation of wireless networking (KRACK)
- An error when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
- An error in the Microsoft Server Block Message (SMB) when an attacker sends specially crafted requests to the server.
- An error in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass.
- An error in certain Trusted Platform Module (TPM) chipsets.
- An error when Internet Explorer improperly accesses objects in memory.
- An error in the way that certain Windows components handle the loading of DLL files.
- An error when the Windows kernel improperly handles objects in memory.
- An error when the Windows font library improperly handles specially crafted embedded fonts.
- An error when the Microsoft Windows Graphics Component improperly handles objects in memory.
- An error when the Windows kernel-mode driver fails to properly handle objects in memory.
- An error in the way the scripting engine handle objects in memory in Microsoft browsers.
- An error in the way that the scripting engine handles objects in memory in Microsoft Edge.
- An error in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session.
- An error in the Microsoft JET Database Engine that could allow remote code execution on an affected system.
- An error when Internet Explorer improperly handles objects in memory.
- An error when the Windows Graphics Component improperly handles objects in memory.
- An error in the way that the scripting engine handles objects in memory in Internet Explorer.
- An error when the Windows Update Delivery Optimization does not properly enforce file share permissions.
- An error in Windows Domain Name System (DNS) DNSAPI.
- An error in the default Windows SMB Server configuration which allows anonymous users to remotely access certain named pipes that are also configured to allow anonymous access to users who are logged on locally.
- An error when Windows Search improperly handles objects in memory.
- An error in Microsoft Windows storage when it fails to validate an integrity-level check.
- An error in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft Edge.
- when Internet Explorer improperly accesses objects in memory via the Microsoft Windows Text Services Framework.
- An error when the Windows kernel improperly initializes objects in memory.
- An error in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system.
- An error in the way that the Windows SMB Server handles certain requests.
Vulnerability Impact: Successful exploitation will allow an attacker to run arbitrary code in the security context of the local system, conduct NTLM dictionary attacks, cause the affected system to crash, take complete control of an affected system, obtain sensitive information to further compromise the user's system, inject code into a trusted PowerShell process, run processes in an elevated context, inject code code in kernel mode and gain elevated privileges.
Affected Software/OS: - Microsoft Windows Server 2016
- Microsoft Windows 10 Version 1607 x32/x64
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|