VID |
26822 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for September 2018 is not installed.
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. (CVE-2018-8457)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. (CVE-2018-8424)
- An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. (CVE-2018-8410)
- An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). (CVE-2018-8440)
- A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. (CVE-2018-8392, CVE-2018-8393)
- A remote code execution vulnerability exists when Windows does not properly handle specially crafted image files. (CVE-2018-8475)
- A remote code execution vulnerability exists when Microsoft .NET Framework processes input. (CVE-2018-8421)
- An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. (CVE-2018-8433)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. (CVE-2018-8447)
- A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. (CVE-2018-8420)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft browsers. (CVE-2018-8452)
- An elevation of privilege vulnerability exists in Windows that allows a sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system. (CVE-2018-8468)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2018-8442, CVE-2018-8443)
- An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. (CVE-2018-8419)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2018-8434)
- An information disclosure vulnerability exists in Windows when the Windows bowser.sys kernel-mode driver fails to properly handle objects in memory. (CVE-2018-8271)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. (CVE-2018-8332)
- An information disclosure vulnerability exists when the browser scripting engine improperly handle object types. (CVE-2018-8315)
- A security feature bypass vulnerability exists in Internet Explorer due to how scripts are handled that allows a universal cross-site scripting (UXSS) condition. (CVE-2018-8470)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2018-8336, CVE-2018-8446)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.microsoft.com/en-us/help/4457144/ https://support.microsoft.com/en-us/help/4457145/
* Platforms Affected: Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows 7 SP1 Windows 7 x64 SP1 Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin September 2018 Microsoft security update at https://support.microsoft.com/en-us/help/4457144 https://support.microsoft.com/en-us/help/4457145 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2018-8271,CVE-2018-8315,CVE-2018-8332,CVE-2018-8336,CVE-2018-8392,CVE-2018-8393,CVE-2018-8410,CVE-2018-8419,CVE-2018-8420,CVE-2018-8421 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|