Korean
<< Back
VID 26810
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description Microsoft Security Update for September 2017 is not installed.

- A race condition that could lead to a remote code execution vulnerability exists in NetBT Session Services when NetBT fails to maintain certain sequencing requirements. (CVE-2017-0161)

- A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. (CVE-2017-8628)

- An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. (CVE-2017-8675)

- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. (CVE-2017-8676)

- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677)

- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2017-8678)

- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2017-8678, CVE-2017-8679)

- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680)

- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681)

- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. (CVE-2017-8682)

- An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. (CVE-2017-8683)

- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, CVE-2017-8684)

- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, CVE-2017-8684, CVE-2017-8685)

- An Information disclosure vulnerability exists in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. (CVE-2017-8687)

- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface+ (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. (CVE-2017-8688)

- An information disclosure vulnerability exists when Windows Uniscribe improperly discloses the contents of its memory. (CVE-2017-8695)

- A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. (CVE-2017-8696)

- A remote code execution vulnerability exists when Windows Shell does not properly validate file copy destinations. (CVE-2017-8699)

- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2017-8707)

* references:
https://support.microsoft.com/en-us/help/4038779/windows-7-update-kb4038779
https://support.microsoft.com/en-us/help/4038793/windows-8-1-update-kb4038793
https://support.microsoft.com/en-us/help/4038782/windows-10-update-kb4038782
https://support.microsoft.com/en-us/help/4038786

* Platforms Affected:
Windows Server 2008 SP2
Windows Server 2008 x64 SP2
Windows 7 SP1
Windows 7 x64 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 R2 x64 SP1
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows Server 2016
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin September 2017 Microsoft security update at
https://support.microsoft.com/en-us/help/4038779/windows-7-update-kb4038779
https://support.microsoft.com/en-us/help/4038793/windows-8-1-update-kb4038793
https://support.microsoft.com/en-us/help/4038782/windows-10-update-kb4038782
https://support.microsoft.com/en-us/help/4038786
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2017-0161,CVE-2017-8628,CVE-2017-8675,CVE-2017-8676,CVE-2017-8677,CVE-2017-8678,CVE-2017-8679,CVE-2017-8680,CVE-2017-8681,CVE-2017-8682 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)