Description: | Summary: This host is missing a critical security update according to Microsoft KB4088782
Vulnerability Insight: Multiple flaws exist due to:
- The way that the scripting engine handles objects in memory in Microsoft Edge and Internet Explorer.
- Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system.
- Windows Scripting Host which could allow an attacker to bypass Device Guard.
- Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system.
- The Credential Security Support Provider protocol (CredSSP).
- Windows kernel-mode driver fails to properly handle objects in memory.
- Windows Desktop Bridge does not properly manage the virtual registry.
- Microsoft Video Control mishandles objects in memory.
- Windows Shell does not properly validate file copy destinations.
- Storage Services improperly handles objects in memory.
- Internet Explorer fails a check, allowing sandbox escape.
- The Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass.
- The Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.
- The Cryptography Next Generation (CNG) kernel-mode driver.
- Windows Desktop Bridge VFS does not take into account user/kernel mode when managing file paths.
- Windows Remote Assistance incorrectly processes XML External Entities (XXE).
- Windows Graphics Device Interface (GDI) handles objects in memory.
Vulnerability Impact: Successful exploitation will allow attacker to gain access to information, crash server and run arbitrary code in system mode.
Affected Software/OS: Microsoft Windows 10 Version 1703 x32/x64.
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 7.6
CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
|