Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.832175
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft Windows Multiple Vulnerabilities (KB5030214)
Zusammenfassung:This host is missing an important security; update according to Microsoft KB5030214
Beschreibung:Summary:
This host is missing an important security
update according to Microsoft KB5030214

Vulnerability Insight:
Multiple flaws exist due to:

- An issue that affects the Microsoft Distributed Transaction Coordinator (DTC).
It has a handle leak. Because of this, the system runs out of memory.

- An issue that affects the Resultant Set of Policy (RSOP).

- An issue that affects Server Message Block (SMB).

- An issue that affects scheduled tasks. The tasks fail when they use stored local
user account credentials.

- An issue that affects those who use Windows Update for Business. After you are
asked to change your password at sign in, the change operation fails.

- An issue that is related to changes in the forwarding of events.

- An issue that affects the Group Policy Service.

- An issue that affects the Remote Desktop (RD) Web Role. If you enable that role,
it fails when you upgrade RD deployments more than once.

- An issue that affects Narrator. Its focus does not change when
the keyboard focus changes. Because of this, Narrator reads the
wrong label within the dialog that appears when you sign in.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation will allow an
attacker to elevate privileges, execute arbitrary commands, disclose
information, bypass security restrictions, spoofing and conduct DoS
attacks.

Affected Software/OS:
- Microsoft Windows 10 Version 1809 for 32-bit Systems

- Microsoft Windows 10 Version 1809 for x64-based Systems

- Microsoft Windows Server 2019

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-35355
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35355
Common Vulnerability Exposure (CVE) ID: CVE-2023-36801
DHCP Server Service Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36801
Common Vulnerability Exposure (CVE) ID: CVE-2023-36802
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802
Common Vulnerability Exposure (CVE) ID: CVE-2023-36803
Windows Kernel Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36803
http://packetstormsecurity.com/files/175109/Microsoft-Windows-Kernel-Out-Of-Bounds-Reads-Memory-Disclosure.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-36804
Windows GDI Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36804
Common Vulnerability Exposure (CVE) ID: CVE-2023-36805
Windows MSHTML Platform Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36805
Common Vulnerability Exposure (CVE) ID: CVE-2023-38139
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38139
http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-38140
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38140
http://packetstormsecurity.com/files/175108/Microsoft-Windows-Kernel-Paged-Pool-Memory-Disclosure.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-38141
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38141
http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-38142
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38142
Common Vulnerability Exposure (CVE) ID: CVE-2023-38143
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38143
Common Vulnerability Exposure (CVE) ID: CVE-2023-38144
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38144
Common Vulnerability Exposure (CVE) ID: CVE-2023-38147
Windows Miracast Wireless Display Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38147
Common Vulnerability Exposure (CVE) ID: CVE-2023-38149
Windows TCP/IP Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38149
Common Vulnerability Exposure (CVE) ID: CVE-2023-38152
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38152
Common Vulnerability Exposure (CVE) ID: CVE-2023-38160
Windows TCP/IP Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38160
Common Vulnerability Exposure (CVE) ID: CVE-2023-38161
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38161
Common Vulnerability Exposure (CVE) ID: CVE-2023-38162
DHCP Server Service Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38162
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.