Korean
<< Back
VID 26814
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description Microsoft Security Update(Meltdown, Spectre) for January 2018 is not installed.

- An vulnerability exists within microprocessors utilizing speculative execution and indirect branch prediction (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)

- An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) (CVE-2018-0788)

- An information disclosure vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) (CVE-2018-0754)

- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. (CVE-2018-0762, CVE-2018-0772)

- An information disclosure vulnerability exists in the way that the Color Management Module (ICM32.dll) handles objects in memory. (CVE-2018-0741)

- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. (CVE-2018-0747)

- An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server. (CVE-2018-0749)

- An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. (CVE-2018-0748)

- A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. (CVE-2018-0750)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://support.microsoft.com/en-us/help/4009469
https://support.microsoft.com/en-us/help/4009470
https://support.microsoft.com/en-us/help/4009471
https://support.microsoft.com/en-us/help/4000825

* Platforms Affected:
Windows Server 2008 SP2
Windows Server 2008 x64 SP2
Windows 7 SP1
Windows 7 x64 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 R2 x64 SP1
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows Server 2016
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin Jan 2018 Microsoft security update at
https://support.microsoft.com/en-us/help/4009469
https://support.microsoft.com/en-us/help/4009470
https://support.microsoft.com/en-us/help/4009471
https://support.microsoft.com/en-us/help/4000825
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2017-5715,CVE-2017-5753,CVE-2017-5754,CVE-2018-0741,CVE-2018-0747,CVE-2018-0748,CVE-2018-0749,CVE-2018-0750,CVE-2018-0754,CVE-2018-0762 (CVE)
Related URL 102378 (SecurityFocus)
Related URL (ISS)