Description: | Summary: This host is missing a critical security update according to Microsoft KB4520005
Vulnerability Insight: Multiple flaws exist due to:
- Microsoft Browsers does not properly parse HTTP content.
- Microsoft XML Core Services MSXML parser processes user input.
- A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection.
- An error in windows redirected drive buffering system (rdbss.sys) when the operating system improperly handles specific local calls.
- Windows Error Reporting (WER) improperly handles and executes files.
- Windows Error Reporting manager improperly handles hard links.
- Remote Desktop Protocol (RDP) improperly handles connection requests.
- Windows Code Integrity Module improperly handles objects in memory.
- Windows Jet Database Engine improperly handles objects in memory.
Please see the references for more information about the vulnerabilities.
Vulnerability Impact: Successful exploitation will allow an attacker to run arbitrary code on the client machine, bypass security restrictions, elevate privileges and read privileged data across trust boundaries, create a denial of service condition and conduct spoofing attack.
Affected Software/OS: - Microsoft Windows 8.1 for 32-bit/x64-based systems
- Microsoft Windows Server 2012 R2
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|