VID |
26814 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update(Meltdown, Spectre) for January 2018 is not installed.
- An vulnerability exists within microprocessors utilizing speculative execution and indirect branch prediction (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)
- An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) (CVE-2018-0788)
- An information disclosure vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) (CVE-2018-0754)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. (CVE-2018-0762, CVE-2018-0772)
- An information disclosure vulnerability exists in the way that the Color Management Module (ICM32.dll) handles objects in memory. (CVE-2018-0741)
- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. (CVE-2018-0747)
- An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server. (CVE-2018-0749)
- An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. (CVE-2018-0748)
- A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. (CVE-2018-0750)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825
* Platforms Affected: Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows 7 SP1 Windows 7 x64 SP1 Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin Jan 2018 Microsoft security update at https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2017-5715,CVE-2017-5753,CVE-2017-5754,CVE-2018-0741,CVE-2018-0747,CVE-2018-0748,CVE-2018-0749,CVE-2018-0750,CVE-2018-0754,CVE-2018-0762 (CVE) |
Related URL |
102378 (SecurityFocus) |
Related URL |
(ISS) |
|