Korean
<< Back
VID 26807
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description Microsoft Security Update for June 2017 is not installed.

- An elevation of privilege vulnerability exists in Windows Hyper-V instruction emulation due to a failure to properly enforce privilege levels. An attacker on a guest operating system can exploit this to gain elevated privileges on the guest. Note that the host operating system is not vulnerable. (CVE-2017-0193)

- A remote code execution vulnerability exists in Microsoft Office due to improper validation of user-supplied input before loading dynamic link library (DLL) files. An unauthenticated, remote attacker can exploit this, by convincing a user to open a secially crafted file, to execute arbitrary code in the context of the current user. (CVE-2017-0260)

- An information disclosure vulnerability exists in Windows Uniscribe due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to disclose the contents of memory. (CVE-2017-0282)

- A remote code execution vulnerability exists in Windows Uniscribe software due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to execute arbitrary code in the context of the current user. (CVE-2017-0283)

- An information disclosure vulnerability exists in Windows Uniscribe due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to disclose the contents of memory. (CVE-2017-0284)

- An information disclosure vulnerability exists in Windows Uniscribe due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to disclose the contents of memory. (CVE-2017-0285)

- An information disclosure vulnerability exists in the Windows GDI component due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to disclose the contents of memory. (CVE-2017-0286)

- An information disclosure vulnerability exists in the Windows GDI component due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to disclose the contents of memory. (CVE-2017-0287)

- An information disclosure vulnerability exists in the Windows GDI component due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted document file, to disclose the contents of memory. (CVE-2017-0288)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://support.microsoft.com/en-us/help/4022719
https://support.microsoft.com/en-us/help/4022726/windows-8-update-kb4022726
https://support.microsoft.com/en-us/help/4022715/windows-10-update-kb4022715
https://support.microsoft.com/en-us/help/4022725

* Platforms Affected:
Windows Server 2008 SP2
Windows Server 2008 x64 SP2
Windows 7 SP1
Windows 7 x64 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 R2 x64 SP1
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows Server 2016
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin June 2017 Microsoft security update at
https://support.microsoft.com/en-us/help/4022719
https://support.microsoft.com/en-us/help/4022726/windows-8-update-kb4022726
https://support.microsoft.com/en-us/help/4022715/windows-10-update-kb4022715
https://support.microsoft.com/en-us/help/4022725
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2017-0193,CVE-2017-0260,CVE-2017-0282,CVE-2017-0283,CVE-2017-0284,CVE-2017-0285,CVE-2017-0286,CVE-2017-0287,CVE-2017-0288,CVE-2017-0289 (CVE)
Related URL 98810,98818,98819,98820,98821,98822,98824,98826,98837,98839 (SecurityFocus)
Related URL (ISS)