![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.811811 |
Category: | Windows : Microsoft Bulletins |
Title: | Microsoft Windows Multiple Vulnerabilities (KB4038874) |
Summary: | This host is missing an important security; update according to Microsoft KB4038874 |
Description: | Summary: This host is missing an important security update according to Microsoft KB4038874 Vulnerability Insight: Multiple flaws exist: - when the Windows kernel improperly handles objects in memory. - when the Windows kernel fails to properly initialize a memory address. Vulnerability Impact: Successful exploitation will allow an attacker who successfully exploited this vulnerability to obtain information to further compromise the user's system and also to retrieve the base address of the kernel driver from a compromised process. Affected Software/OS: Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2. Solution: The vendor has released updates. Please see the references for more information. CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-8679 BugTraq ID: 100720 http://www.securityfocus.com/bid/100720 http://www.securitytracker.com/id/1039325 Common Vulnerability Exposure (CVE) ID: CVE-2017-8708 BugTraq ID: 100791 http://www.securityfocus.com/bid/100791 https://www.exploit-db.com/exploits/42743/ Common Vulnerability Exposure (CVE) ID: CVE-2017-8719 BugTraq ID: 100803 http://www.securityfocus.com/bid/100803 |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |