Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.832367
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Windows Multiple Vulnerabilities (KB5019961)
Resumen:This host is missing an important security; update according to Microsoft KB5019961
Descripción:Summary:
This host is missing an important security
update according to Microsoft KB5019961

Vulnerability Insight:
Multiple flaws exist due to:

- Windows Fax Compose Form Remote Code Execution Vulnerability.

- Remote Procedure Call Runtime Remote Code Execution Vulnerability.

- Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation would allow an
attacker to elevate privileges, execute arbitrary commands, bypass security
feature, disclose information and conduct DoS attacks.

Affected Software/OS:
Microsoft Windows 11 version 21H2 for x64-based Systems.

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-41045
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41045
Common Vulnerability Exposure (CVE) ID: CVE-2022-41039
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41039
Common Vulnerability Exposure (CVE) ID: CVE-2022-41109
Windows Win32k Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41109
Common Vulnerability Exposure (CVE) ID: CVE-2022-41100
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41100
Common Vulnerability Exposure (CVE) ID: CVE-2022-41099
BitLocker Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099
Common Vulnerability Exposure (CVE) ID: CVE-2022-41098
Windows GDI+ Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41098
Common Vulnerability Exposure (CVE) ID: CVE-2022-41097
Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41097
Common Vulnerability Exposure (CVE) ID: CVE-2022-41096
Microsoft DWM Core Library Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41096
Common Vulnerability Exposure (CVE) ID: CVE-2022-41095
Windows Digital Media Receiver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41095
Common Vulnerability Exposure (CVE) ID: CVE-2022-41093
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41093
Common Vulnerability Exposure (CVE) ID: CVE-2022-41092
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092
Common Vulnerability Exposure (CVE) ID: CVE-2022-41090
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41090
Common Vulnerability Exposure (CVE) ID: CVE-2022-41088
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41088
Common Vulnerability Exposure (CVE) ID: CVE-2022-41086
Windows Group Policy Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41086
Common Vulnerability Exposure (CVE) ID: CVE-2022-41058
Windows Network Address Translation (NAT) Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41058
Common Vulnerability Exposure (CVE) ID: CVE-2022-41057
Windows HTTP.sys Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41057
Common Vulnerability Exposure (CVE) ID: CVE-2022-41056
Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41056
Common Vulnerability Exposure (CVE) ID: CVE-2022-41055
Windows Human Interface Device Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41055
Common Vulnerability Exposure (CVE) ID: CVE-2022-41053
Windows Kerberos Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41053
Common Vulnerability Exposure (CVE) ID: CVE-2022-41052
Windows Graphics Component Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41052
Common Vulnerability Exposure (CVE) ID: CVE-2022-41047
Microsoft ODBC Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41047
Common Vulnerability Exposure (CVE) ID: CVE-2022-41048
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41048
Common Vulnerability Exposure (CVE) ID: CVE-2022-38015
Windows Hyper-V Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38015
Common Vulnerability Exposure (CVE) ID: CVE-2022-37992
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37992
Common Vulnerability Exposure (CVE) ID: CVE-2022-23824
https://security.gentoo.org/glsa/202402-07
DSA-5378
https://www.debian.org/security/2023/dsa-5378
FEDORA-2022-53a4a5dd11
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/
FEDORA-2022-9f51d13fa3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues
http://www.openwall.com/lists/oss-security/2022/11/10/2
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040
Common Vulnerability Exposure (CVE) ID: CVE-2022-41128
Windows Scripting Languages Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128
Common Vulnerability Exposure (CVE) ID: CVE-2022-41125
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41125
Common Vulnerability Exposure (CVE) ID: CVE-2022-41118
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41118
Common Vulnerability Exposure (CVE) ID: CVE-2022-41073
Windows Print Spooler Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41073
http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-41114
Windows Bind Filter Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41114
Common Vulnerability Exposure (CVE) ID: CVE-2022-41054
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41054
Common Vulnerability Exposure (CVE) ID: CVE-2022-41102
Windows Overlay Filter Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41102
Common Vulnerability Exposure (CVE) ID: CVE-2022-41101
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41101
Common Vulnerability Exposure (CVE) ID: CVE-2022-41050
Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41050
Common Vulnerability Exposure (CVE) ID: CVE-2022-41049
Windows Mark of the Web Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41049
Common Vulnerability Exposure (CVE) ID: CVE-2022-41091
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41091
CopyrightCopyright (C) 2023 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.