VID |
26876 |
Severity |
40 |
Port |
139.445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for February 2023 is not installed. The emote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities
- Windows iSCSI Discovery Service Remote Code Execution Vulnerability (CVE-2023-21803) - Microsoft PostScript Printer Driver Remote Code Execution Vulnerability (CVE-2023-21684, CVE-2023-21801) - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability (CVE-2023-21685,CVE-2023-21686, CVE-2023-21799)
* References: https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825
* Platforms Affected: Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows 11 Windows Server 2016 Windows Server 2019 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin February 2023 Microsoft security update at
https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2023-21685,CVE-2023-21686,CVE-2023-21799,CVE-2023-21684,CVE-2023-21801,CVE-2023-21803,CVE-2023-23376,CVE-2023-21823,CVE-2023-21802 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|