Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.815862
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Windows Multiple Vulnerabilities (KB4530689)
Resumen:This host is missing a critical security; update according to Microsoft KB4530689
Descripción:Summary:
This host is missing a critical security
update according to Microsoft KB4530689

Vulnerability Insight:
Multiple flaws exist due to:

- Windows kernel improperly handles objects in memory.

- Remote Desktop Protocol (RDP) improperly handles connection requests.

- Windows AppX Deployment Service (AppXSVC) improperly handles hard links.

- Win32k component fails to properly handle objects in memory.

Please see the references for more information about the vulnerabilities.

Vulnerability Impact:
Successful exploitation will allow an attacker
to crash host server, execute code with elevated permissions, obtain information
to further compromise the user's system, escalate privileges and bypass security
restrictions.

Affected Software/OS:
- Microsoft Windows 10 Version 1607 x32/x64

- Microsoft Windows Server 2016

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-1453
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1453
Common Vulnerability Exposure (CVE) ID: CVE-2019-1458
http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458
Common Vulnerability Exposure (CVE) ID: CVE-2019-1465
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1465
https://www.zerodayinitiative.com/advisories/ZDI-19-1008/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1466
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1466
https://www.zerodayinitiative.com/advisories/ZDI-19-1007/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1467
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1467
Common Vulnerability Exposure (CVE) ID: CVE-2019-1468
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1468
https://www.zerodayinitiative.com/advisories/ZDI-19-1004/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1469
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1469
Common Vulnerability Exposure (CVE) ID: CVE-2019-1470
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1470
Common Vulnerability Exposure (CVE) ID: CVE-2019-1472
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1472
Common Vulnerability Exposure (CVE) ID: CVE-2019-1474
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1474
Common Vulnerability Exposure (CVE) ID: CVE-2019-1476
http://packetstormsecurity.com/files/155653/AppXSvc-17763-Arbitrary-File-Overwrite.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1476
Common Vulnerability Exposure (CVE) ID: CVE-2019-1484
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1484
Common Vulnerability Exposure (CVE) ID: CVE-2019-1485
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1485
Common Vulnerability Exposure (CVE) ID: CVE-2019-1488
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1488
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.