VID |
26842 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for April 2020 is not installed.
- DirectX, Windows update stack, Hyper-V, WpcDesktopMonSvc, Windows kernel, graphics component, GDI component, User-Mode Power service, Windows Delivery Optimization service, and Windows Push Notification service incorrectly handle objects in memory to allow attackers elevated privileges Can be obtained.
- An attacker could gain elevated privileges by incorrectly handling file redirection in a Windows scheduled task.
- An information disclosure vulnerability exists due to improper handling of objects in memory in Windows kernel, graphic component, push notification service, and GDI component.
- Internet Explorer's script engine, VBScript engine, Windows Jet Database engine, codec library, graphics component, and GDI component handle objects in memory incorrectly, allowing an attacker to execute arbitrary code.
- An information disclosure vulnerability exists in win32k components, GDI, and Media Foundation.
- When processing fonts in Windows, arbitrary code may be executed due to incorrect handling.
- The Windows Media Foundation incorrectly handles objects in memory, so an attacker can install programs, modify data, or delete data.
- Windows Hyper-V does not process input values correctly, so arbitrary code may be executed.
- Windows does not properly handle token relationships, so attackers can bypass security settings.
- The Windwos Work Folder service does not handle files correctly, so an attacker can gain elevated privileges.
- Denial of service may occur due to improper handling of objects in memory in Windows.
- Denial of service may occur due to incorrect handling of queries in DNS.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.microsoft.com/en-us/help/4549951
* Platforms Affected: Windows Server 2008 SP2 Windows Server 2008 x64 SP2 Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin April 2020 Microsoft security update at https://support.microsoft.com/en-us/help/4549951 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2020-1009,CVE-2020-1011,CVE-2020-1014,CVE-2020-1015,CVE-2020-1016,CVE-2020-1017,CVE-2020-1020,CVE-2020-1027,CVE-2020-1029,CVE-2020-1094 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|