VID |
26809 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for August 2017 is not installed.
- A denial of service vulnerability exists when Microsoft Windows improperly handles NetBIOS packets. (CVE-2017-0174)
- A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. (CVE-2017-0250)
- A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. (CVE-2017-0293)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. (CVE-2017-8593)
- A remote code execution vulnerability exists when Windows Search handles objects in memory. (CVE-2017-8620)
- An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. (CVE-2017-8624)
- This security update resolves a vulnerability in Windows Error Reporting (WER). (CVE-2017-8633)
- A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render content when handling objects in memory. (CVE-2017-8636)
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft browsers. (CVE-2017-8641)
- A remote code execution vulnerability exists when Microsoft browsers improperly access objects in memory. (CVE-2017-8653)
- An information disclosure vulnerability exists when the win32k component improperly provides kernel information. (CVE-2017-8666)
- An information disclosure vulnerability exists when the Volume Manager Extension Driver component improperly provides kernel information. (CVE-2017-8668)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. (CVE-2017-8691)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.microsoft.com/en-us/help/4034664/windows-7-sp1-windows-server-2008-r2-sp1-update-kb4034664 https://support.microsoft.com/en-us/help/4034674/windows-10-update-kb4034674 https://support.microsoft.com/en-us/help/4034681 https://support.microsoft.com/en-us/help/4034659
* Platforms Affected: Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows 7 SP1 Windows 7 x64 SP1 Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin August 2017 Microsoft security update at https://support.microsoft.com/en-us/help/4034664/windows-7-sp1-windows-server-2008-r2-sp1-update-kb4034664 https://support.microsoft.com/en-us/help/4034674/windows-10-update-kb4034674 https://support.microsoft.com/en-us/help/4034681 https://support.microsoft.com/en-us/help/4034659 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2017-0174,CVE-2017-0250,CVE-2017-0293,CVE-2017-8593,CVE-2017-8620,CVE-2017-8624,CVE-2017-8633,CVE-2017-8636,CVE-2017-8641,CVE-2017-8653 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|