Beschreibung: | Summary: This host is missing a critical security update according to Microsoft KB4457129
Vulnerability Insight: Multiple flaws exist due to:
- Denial of service vulnerability (named 'FragmentSmack').
- Windows bowser.sys kernel-mode driver fails to properly handle objects in memory.
- Browser scripting engine improperly handle object types.
- Windows font library improperly handles specially crafted embedded fonts.
- SMB improperly handles specially crafted client requests.
- Microsoft JET Database Engine improperly handles objects in memory.
- Windows Kernel API improperly handles registry objects in memory.
- Windows kernel fails to properly initialize a memory address.
- Microsoft XML Core Services improperly MSXML parser processes user input.
- Windows GDI component improperly discloses the contents of its memory.
- Windows Graphics component improperly handles objects in memory.
- Hyper-V improperly validates guest operating system user input.
- Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
- Windows kernel improperly handles objects in memory.
- Microsoft Server Message Block 2.0 (SMBv2) server improperly handles certain requests.
- Internet Explorer improperly accesses objects in memory.
- Scripting engine does not properly handle objects in memory in Microsoft browsers.
- Windows improperly parses files.
- Internet Explorer improperly handles script.
- Windows does not properly handle specially crafted image files.
Vulnerability Impact: Successful exploitation will allow an attacker to execute arbitrary code in the context of the current user, obtain information to further compromise the user's system, gain elevated privileges on a targeted system and also cause the affected system to crash.
Affected Software/OS: - Microsoft Windows 8.1 for 32-bit/x64
- Microsoft Windows Server 2012 R2
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|