Beschreibung: | Summary: This host is missing a critical security update according to Microsoft KB4467696
Vulnerability Insight: Multiple flaws exist due to:
- PowerShell improperly handles specially crafted files.
- Kernel Remote Procedure Call Provider driver improperly initializes objects in memory.
- Windows kernel improperly initializes objects in memory.
- PowerShell allows an attacker to execute unlogged code.
- Microsoft JScript allows an attacker to bypass Device Guard.
- Windows Search improperly handles objects in memory.
- Microsoft RemoteFX Virtual GPU miniport driver improperly handles objects in memory.
- DirectX improperly handles objects in memory.
- Chakra scripting engine improperly handles objects in memory in Microsoft Edge.
- VBScript engine improperly handles objects in memory.
- Windows incorrectly validates kernel driver signatures.
- Windows COM Marshaler incorrectly processes interface requests.
- Win32k component in Windows improperly handles objects in memory.
- Microsoft Edge improperly handles specific HTML content.
- Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
Vulnerability Impact: Successful exploitation will allow an attacker to run arbitrary code, bypass security restrictions and load improperly signed drivers into the kernel, gain the same user rights as the current user, obtain information to further compromise the user's system, improperly discloses file information, trick a user into believing that the user was on a legitimate website and escalate privileges.
Affected Software/OS: - Microsoft Windows 10 Version 1703 for 32-bit Systems
- Microsoft Windows 10 Version 1703 for x64-based Systems
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|