Description: | Summary: This host is missing a critical security update according to Microsoft KB4489899
Vulnerability Insight: Multiple flaws exist due to:
- Microsoft Edge does not properly enforce cross-domain policies.
- The scripting engine improperly handles objects in memory in Microsoft Edge and browsers.
- Click2Play protection in Microsoft Edge improperly handles flash objects.
- The ChakraCore scripting engine improperly handles objects in memory.
- The Windows Jet Database Engine improperly handles objects in memory.
- The Windows GDI component improperly discloses the contents of its memory.
- The Windows kernel improperly handles objects in memory.
- The win32k component improperly provides kernel information.
- The Microsoft XML Core Services MSXML parser improperly processes user input.
- The Win32k component fails to properly handle objects in memory.
- The Windows Print Spooler does not properly handle objects in memory.
- An integer overflow in Windows Subsystem for Linux.
- Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system.
- Windows kernel fails to properly handle objects in memory.
- Windows DHCP client does not validate specially crafted DHCP responses to a client.
- Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system.
- Windows SMB Server improperly handles certain requests.
- Windows Deployment Services TFTP Server improperly handles objects in memory.
- Windows AppX Deployment Server allows file creation in arbitrary locations.
- Windows kernel improperly initializes objects in memory.
- Microsoft browsers improperly handle requests of different origins.
- Internet Explorer improperly accesses objects in memory.
- The VBScript engine handles improperly objects in memory.
- Internet Explorer fails to validate the correct Security Zone of requests for specific URLs.
- Windows kernel fails to properly initialize a memory address.
- The ActiveX Data objects (ADO) improperly handles objects in memory.
- Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, and to allow requests that should otherwise be ignored.
Vulnerability Impact: Successful exploitation will allow an attacker to elevate privileges, gain the same user rights as the current user, run arbitrary code on a target system, obtain information to further compromise the user's system and cause the host server to crash.
Affected Software/OS: - Microsoft Windows 10 Version 1809 for 32-bit Systems and
- Microsoft Windows 10 Version 1809 for x64-based Systems
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|