Description: | Summary: This host is missing a critical security update according to Microsoft KB4457144.
Vulnerability Insight: Multiple flaws exist due to:
- Denial of service vulnerability (named 'FragmentSmack').
- Hyper-V on a host server fails to properly validate guest operating system user input.
- Windows bowser.sys kernel-mode driver fails to properly handle objects in memory.
- Browser scripting engine improperly handle object types.
- Windows font library improperly handles specially crafted embedded fonts.
- Windows kernel improperly handles objects in memory.
- Microsoft JET Database Engine improperly handles objects in memory.
- Windows Kernel API improperly handles registry objects in memory.
- Windows kernel fails to properly initialize a memory address.
- MSXML parser improperly processes user input.
- Windows GDI component improperly handles objects in memory.
- Windows GDI component improperly discloses the contents of its memory.
- Windows Graphics component improperly handles objects in memory.
- Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
- Internet Explorer improperly accesses objects in memory.
- Scripting engine improperly handles objects in memory.
- Windows improperly parses files.
Vulnerability Impact: Successful exploitation will allow an attacker to crash the affected system, execute arbitrary code on the host operating system, disclose contents of System memory and also read privileged data across trust boundaries.
Affected Software/OS: - Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows 7 for 32-bit/x64-based Systems Service Pack 1
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|