Beschreibung: | Summary: This host is missing a critical security update according to Microsoft KB4088875
Vulnerability Insight: Multiple flaws exist due to:
- When Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system.
- The way that the scripting engine handles objects in memory in Internet Explorer.
- When Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system.
- The Credential Security Support Provider protocol (CredSSP).
- Windows when the Microsoft Video Control mishandles objects in memory.
- When Windows Shell does not properly validate file copy destinations.
- When Internet Explorer fails a check, allowing sandbox escape.
- The Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass.
- The Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.
- When the Windows kernel improperly initializes objects in memory.
- When Windows Remote Assistance incorrectly processes XML External Entities (XXE).
- The way that the Windows Graphics Device Interface (GDI) handles objects in memory.
Vulnerability Impact: Successful exploitation will allow attacker to gain access to information, crash server and run arbitrary code in system mode.
Affected Software/OS: - Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 7.6
CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
|