VID |
26810 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for September 2017 is not installed.
- A race condition that could lead to a remote code execution vulnerability exists in NetBT Session Services when NetBT fails to maintain certain sequencing requirements. (CVE-2017-0161)
- A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. (CVE-2017-8628)
- An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. (CVE-2017-8675)
- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. (CVE-2017-8676)
- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2017-8678)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2017-8678, CVE-2017-8679)
- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680)
- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. (CVE-2017-8682)
- An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. (CVE-2017-8683)
- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, CVE-2017-8684)
- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, CVE-2017-8684, CVE-2017-8685)
- An Information disclosure vulnerability exists in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. (CVE-2017-8687)
- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface+ (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. (CVE-2017-8688)
- An information disclosure vulnerability exists when Windows Uniscribe improperly discloses the contents of its memory. (CVE-2017-8695)
- A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. (CVE-2017-8696)
- A remote code execution vulnerability exists when Windows Shell does not properly validate file copy destinations. (CVE-2017-8699)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2017-8707)
* references: https://support.microsoft.com/en-us/help/4038779/windows-7-update-kb4038779 https://support.microsoft.com/en-us/help/4038793/windows-8-1-update-kb4038793 https://support.microsoft.com/en-us/help/4038782/windows-10-update-kb4038782 https://support.microsoft.com/en-us/help/4038786
* Platforms Affected: Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows 7 SP1 Windows 7 x64 SP1 Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin September 2017 Microsoft security update at https://support.microsoft.com/en-us/help/4038779/windows-7-update-kb4038779 https://support.microsoft.com/en-us/help/4038793/windows-8-1-update-kb4038793 https://support.microsoft.com/en-us/help/4038782/windows-10-update-kb4038782 https://support.microsoft.com/en-us/help/4038786 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2017-0161,CVE-2017-8628,CVE-2017-8675,CVE-2017-8676,CVE-2017-8677,CVE-2017-8678,CVE-2017-8679,CVE-2017-8680,CVE-2017-8681,CVE-2017-8682 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|