Korean
<< Back
VID 26841
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description Microsoft Security Update for March 2020 is not installed.

- An attacker could execute arbitrary code by accessing an object in memory incorrectly in Internet Explorer.

- An elevation of privilege vulnerability occurs because the Windows installer incorrectly handles the file system.

- Information disclosure vulnerabilities exist in Media Foundation, Windows Module Installer, Windows Network Connections, Windows Error Reporting service, Windows Imaging component, and GDI.

- DirectX, Universal Plug and Play (UPnP) service, Windows Network List service, GDI, Windows Error Reporting, Windows Network Connections service, graphic component, public photo folder, Win32k component, VBScript engine, Windows CSC, Windows Language Pack installer, indows An attacker can gain elevated privileges by incorrectly handling objects in memory in the ActiveX installer and Windows Search Indexer.

- A tampering vulnerability exists in the IIS server.

- Denial of service occurs when processing a link in Windows Tile Object service.

- Internet Explorer and Microsoft browser's script engine handle memory incorrectly, allowing an attacker to execute arbitrary code.

- The erroneous handling of symbolic links in the Windows kernel, the MSI package of the Windows installer, and the Windows Background Intelligent Transfer service can allow an attacker to gain elevated privileges.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://support.microsoft.com/en-us/help/4540693

* Platforms Affected:
Windows Server 2008 SP2
Windows Server 2008 x64 SP2
Windows Server 2008 R2 SP1
Windows Server 2008 R2 x64 SP1
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows Server 2016
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin March 2020 Microsoft security update at
https://support.microsoft.com/en-us/help/4540693
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2020-0877,CVE-2020-0879,CVE-2020-0880,CVE-2020-0881,CVE-2020-0882,CVE-2020-0883,CVE-2020-0885,CVE-2020-0887,CVE-2020-0896,CVE-2020-0897 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)