Beschreibung: | Summary: This host is missing a critical security update according to Microsoft KB4457128
Vulnerability Insight: Multiple flaws exist due to:
- Denial of service vulnerability (named 'FragmentSmack').
- Hyper-V on a host server fails to properly validate guest operating system user input.
- Windows bowser.sys kernel-mode driver fails to properly handle objects in memory.
- Browser scripting engine improperly handle object types.
- Windows font library improperly handles specially crafted embedded fonts.
- SMB improperly handles specially crafted client requests.
- Scripting engine improperly handles objects in memory.
- Microsoft JET Database Engine improperly handles objects in memory.
- Windows Kernel API improperly handles registry objects in memory.
- Windows kernel fails to properly initialize a memory address.
- MSXML parser improperly processes user input.
- Microsoft .NET Framework improperly processes untrusted input.
- Windows GDI component improperly discloses the contents of its memory.
- Microsoft Edge improperly handles specific HTML content.
- Windows Graphics component improperly handles objects in memory.
- An integer overflow in Windows Subsystem for Linux.
- Windows Hyper-V BIOS loader fails to provide a high-entropy source.
- Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
- Speculative execution side-channel vulnerabilities.
Vulnerability Impact: Successful exploitation will allow an attacker to crash the affected system, execute arbitrary code on the host operating system, disclose contents of System memory and also read privileged data across trust boundaries.
Affected Software/OS: - Microsoft Windows 10 Version 1803 for 32-bit Systems
- Microsoft Windows 10 Version 1803 for x64-based Systems
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|