KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security Update
2019-01-08T00:00:00
ID SMB_NT_MS19_JAN_4480963.NASL Type nessus Reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
The remote Windows host is missing security update 4480964
or cumulative update 4480963. It is, therefore, affected by
multiple vulnerabilities :
An information disclosure vulnerability exists when the
Windows kernel improperly handles objects in memory. An
attacker who successfully exploited this vulnerability
could obtain information to further compromise the users
system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)
A remote code execution vulnerability exists when the
Windows Jet Database Engine improperly handles objects
in memory. An attacker who successfully exploited this
vulnerability could execute arbitrary code on a victim
system. An attacker could exploit this vulnerability by
enticing a victim to open a specially crafted file. The
update addresses the vulnerability by correcting the way
the Windows Jet Database Engine handles objects in
memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,
CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,
CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,
CVE-2019-0583, CVE-2019-0584)
An information disclosure vulnerability exists in .NET
Framework and .NET Core which allows bypassing Cross-
origin Resource Sharing (CORS) configurations. An
attacker who successfully exploited the vulnerability
could retrieve content, that is normally restricted,
from a web application. The security update addresses
the vulnerability by enforcing CORS configuration to
prevent its bypass. (CVE-2019-0545)
An elevation of privilege vulnerability exists in the
Microsoft XmlDocument class that could allow an attacker
to escape from the AppContainer sandbox in the browser.
An attacker who successfully exploited this
vulnerability could gain elevated privileges and break
out of the Edge AppContainer sandbox. The vulnerability
by itself does not allow arbitrary code to run. However,
this vulnerability could be used in conjunction with one
or more vulnerabilities (for example a remote code
execution vulnerability and another elevation of
privilege vulnerability) to take advantage of the
elevated privileges when running. The security update
addresses the vulnerability by modifying how the
Microsoft XmlDocument class enforces sandboxing.
(CVE-2019-0555)
An elevation of privilege vulnerability exists when the
Windows Runtime improperly handles objects in memory. An
attacker who successfully exploited this vulnerability
could run arbitrary code in an elevated context. An
attacker could exploit this vulnerability by running a
specially crafted application on the victim system. The
update addresses the vulnerability by correcting the way
the Windows Runtime handles objects in memory.
(CVE-2019-0570)
A remote code execution vulnerability exists in the way
that the MSHTML engine improperly validates input. An
attacker could execute arbitrary code in the context of
the current user. (CVE-2019-0541)
An elevation of privilege exists in Windows COM Desktop
Broker. An attacker who successfully exploited the
vulnerability could run arbitrary code with elevated
privileges. (CVE-2019-0552)
An elevation of privilege vulnerability exists when
Windows improperly handles authentication requests. An
attacker who successfully exploited this vulnerability
could run processes in an elevated context. An attacker
could exploit this vulnerability by running a specially
crafted application on the victim system. The update
addresses the vulnerability by correcting the way
Windows handles authentication requests. (CVE-2019-0543)
An information disclosure vulnerability exists when the
Windows kernel improperly handles objects in memory. An
attacker who successfully exploited this vulnerability
could obtain information to further compromise the users
system. An authenticated attacker could exploit this
vulnerability by running a specially crafted
application. The update addresses the vulnerability by
correcting how the Windows kernel handles objects in
memory. (CVE-2019-0569)
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Microsoft Security Updates API. The text
# itself is copyright (C) Microsoft Corporation.
#
include("compat.inc");
if (description)
{
script_id(121014);
script_version("1.9");
script_cvs_date("Date: 2019/04/30 14:30:16");
script_cve_id(
"CVE-2018-3639",
"CVE-2019-0536",
"CVE-2019-0538",
"CVE-2019-0541",
"CVE-2019-0543",
"CVE-2019-0545",
"CVE-2019-0549",
"CVE-2019-0552",
"CVE-2019-0554",
"CVE-2019-0555",
"CVE-2019-0569",
"CVE-2019-0570",
"CVE-2019-0575",
"CVE-2019-0576",
"CVE-2019-0577",
"CVE-2019-0578",
"CVE-2019-0579",
"CVE-2019-0580",
"CVE-2019-0581",
"CVE-2019-0582",
"CVE-2019-0583",
"CVE-2019-0584"
);
script_xref(name:"MSKB", value:"4480963");
script_xref(name:"MSKB", value:"4480964");
script_xref(name:"MSFT", value:"MS19-4480963");
script_xref(name:"MSFT", value:"MS19-4480964");
script_name(english:"KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security Update");
script_summary(english:"Checks for rollup.");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote Windows host is missing security update 4480964
or cumulative update 4480963. It is, therefore, affected by
multiple vulnerabilities :
- An information disclosure vulnerability exists when the
Windows kernel improperly handles objects in memory. An
attacker who successfully exploited this vulnerability
could obtain information to further compromise the users
system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)
- A remote code execution vulnerability exists when the
Windows Jet Database Engine improperly handles objects
in memory. An attacker who successfully exploited this
vulnerability could execute arbitrary code on a victim
system. An attacker could exploit this vulnerability by
enticing a victim to open a specially crafted file. The
update addresses the vulnerability by correcting the way
the Windows Jet Database Engine handles objects in
memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,
CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,
CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,
CVE-2019-0583, CVE-2019-0584)
- An information disclosure vulnerability exists in .NET
Framework and .NET Core which allows bypassing Cross-
origin Resource Sharing (CORS) configurations. An
attacker who successfully exploited the vulnerability
could retrieve content, that is normally restricted,
from a web application. The security update addresses
the vulnerability by enforcing CORS configuration to
prevent its bypass. (CVE-2019-0545)
- An elevation of privilege vulnerability exists in the
Microsoft XmlDocument class that could allow an attacker
to escape from the AppContainer sandbox in the browser.
An attacker who successfully exploited this
vulnerability could gain elevated privileges and break
out of the Edge AppContainer sandbox. The vulnerability
by itself does not allow arbitrary code to run. However,
this vulnerability could be used in conjunction with one
or more vulnerabilities (for example a remote code
execution vulnerability and another elevation of
privilege vulnerability) to take advantage of the
elevated privileges when running. The security update
addresses the vulnerability by modifying how the
Microsoft XmlDocument class enforces sandboxing.
(CVE-2019-0555)
- An elevation of privilege vulnerability exists when the
Windows Runtime improperly handles objects in memory. An
attacker who successfully exploited this vulnerability
could run arbitrary code in an elevated context. An
attacker could exploit this vulnerability by running a
specially crafted application on the victim system. The
update addresses the vulnerability by correcting the way
the Windows Runtime handles objects in memory.
(CVE-2019-0570)
- A remote code execution vulnerability exists in the way
that the MSHTML engine improperly validates input. An
attacker could execute arbitrary code in the context of
the current user. (CVE-2019-0541)
- An elevation of privilege exists in Windows COM Desktop
Broker. An attacker who successfully exploited the
vulnerability could run arbitrary code with elevated
privileges. (CVE-2019-0552)
- An elevation of privilege vulnerability exists when
Windows improperly handles authentication requests. An
attacker who successfully exploited this vulnerability
could run processes in an elevated context. An attacker
could exploit this vulnerability by running a specially
crafted application on the victim system. The update
addresses the vulnerability by correcting the way
Windows handles authentication requests. (CVE-2019-0543)
- An information disclosure vulnerability exists when the
Windows kernel improperly handles objects in memory. An
attacker who successfully exploited this vulnerability
could obtain information to further compromise the users
system. An authenticated attacker could exploit this
vulnerability by running a specially crafted
application. The update addresses the vulnerability by
correcting how the Windows kernel handles objects in
memory. (CVE-2019-0569)");
# https://support.microsoft.com/en-us/help/4480963/windows-8-1-update-kb4480963
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5fa9f1a3");
# https://support.microsoft.com/en-us/help/4480964/windows-8-1-update-kb4480964
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fd4ff768");
script_set_attribute(attribute:"solution", value:
"Apply Security Only update KB4480964 or Cumulative Update KB4480963.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0538");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/01/08");
script_set_attribute(attribute:"patch_publication_date", value:"2019/01/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, "Host/patch_management_checks");
exit(0);
}
include("audit.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("smb_func.inc");
include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
bulletin = "MS19-01";
kbs = make_list('4480964', '4480963');
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
if (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
# Windows 8 EOL
productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
if ("Windows 8" >< productname && "8.1" >!< productname)
audit(AUDIT_OS_SP_NOT_VULN);
share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
if (
smb_check_rollup(os:"6.3",
sp:0,
rollup_date:"01_2019",
bulletin:bulletin,
rollup_kb_list:[4480964, 4480963])
)
{
replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
hotfix_security_hole();
hotfix_check_fversion_end();
exit(0);
}
else
{
hotfix_check_fversion_end();
audit(AUDIT_HOST_NOT, hotfix_get_audit_report());
}
{"id": "SMB_NT_MS19_JAN_4480963.NASL", "bulletinFamily": "scanner", "title": "KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security Update", "description": "The remote Windows host is missing security update 4480964\nor cumulative update 4480963. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine improperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)", "published": "2019-01-08T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/121014", "reporter": "This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?fd4ff768", "http://www.nessus.org/u?5fa9f1a3"], "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580", "CVE-2018-3639"], "type": "nessus", "lastseen": "2021-01-01T05:46:01", "edition": 23, "viewCount": 91, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310814641", "OPENVAS:1361412562310814649", "OPENVAS:1361412562310814643", "OPENVAS:1361412562310814640", "OPENVAS:1361412562310814727", "OPENVAS:1361412562310814639", "OPENVAS:1361412562310814720", "OPENVAS:1361412562310814650", "OPENVAS:1361412562310814644", "OPENVAS:1361412562310814642"]}, {"type": "nessus", "idList": ["SMB_NT_MS19_JAN_4480961.NASL", "SMB_NT_MS19_JAN_4480116.NASL", "SMB_NT_MS19_JAN_4480962.NASL", "SMB_NT_MS19_JAN_4480978.NASL", "SMB_NT_MS19_JAN_4480966.NASL", "SMB_NT_MS19_JAN_4480968.NASL", "SMB_NT_MS19_JAN_4480975.NASL", "SMB_NT_MS19_JAN_4480970.NASL", "SMB_NT_MS19_JAN_DOTNET.NASL", "SMB_NT_MS19_JAN_4480973.NASL"]}, {"type": "kaspersky", "idList": ["KLA11881", "KLA11394"]}, {"type": "cve", "idList": ["CVE-2019-0579", "CVE-2019-0552", "CVE-2019-0577", "CVE-2019-0570", "CVE-2019-0555", "CVE-2019-0554", "CVE-2019-0576", "CVE-2019-0536", "CVE-2019-0575", "CVE-2019-0582"]}, {"type": "talosblog", "idList": ["TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F"]}, {"type": "symantec", "idList": ["SMNTC-106405", "SMNTC-106406", "SMNTC-106425", "SMNTC-106415", "SMNTC-106407", "SMNTC-106395", "SMNTC-106422", "SMNTC-106402", "SMNTC-106411", "SMNTC-106414"]}, {"type": "citrix", "idList": ["CTX235225"]}, {"type": "f5", "idList": ["F5:K29146534"]}, {"type": "virtuozzo", "idList": ["VZA-2018-034", "VZA-2018-032", "VZA-2018-033"]}, {"type": "mscve", "idList": ["MS:CVE-2019-0580", "MS:CVE-2019-0576", "MS:CVE-2019-0575", "MS:CVE-2019-0579", "MS:CVE-2019-0552", "MS:CVE-2019-0577", "MS:CVE-2019-0545", "MS:CVE-2019-0570"]}, {"type": "exploitdb", "idList": ["EDB-ID:46184", "EDB-ID:46162"]}, {"type": "zdt", "idList": ["1337DAY-ID-31971", "1337DAY-ID-31979"]}, {"type": "zdi", "idList": ["ZDI-19-012", "ZDI-19-006", "ZDI-19-011"]}, {"type": "mskb", "idList": ["KB4481481", "KB4480056", "KB4481480", "KB4481487", "KB4481485", "KB4481486", "KB4481482"]}], "modified": "2021-01-01T05:46:01", "rev": 2}, "score": {"value": 8.3, "vector": "NONE", "modified": "2021-01-01T05:46:01", "rev": 2}, "vulnersScore": 8.3}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121014);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/04/30 14:30:16\");\n\n script_cve_id(\n \"CVE-2018-3639\",\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0552\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480963\");\n script_xref(name:\"MSKB\", value:\"4480964\");\n script_xref(name:\"MSFT\", value:\"MS19-4480963\");\n script_xref(name:\"MSFT\", value:\"MS19-4480964\");\n\n script_name(english:\"KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480964\nor cumulative update 4480963. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine improperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\");\n # https://support.microsoft.com/en-us/help/4480963/windows-8-1-update-kb4480963\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5fa9f1a3\");\n # https://support.microsoft.com/en-us/help/4480964/windows-8-1-update-kb4480964\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4ff768\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4480964 or Cumulative Update KB4480963.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480964', '4480963');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"8.1\" >!< productname)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.3\",\n sp:0,\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480964, 4480963])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "naslFamily": "Windows : Microsoft Bulletins", "pluginID": "121014", "cpe": ["cpe:/o:microsoft:windows"], "scheme": null, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}}
{"openvas": [{"lastseen": "2020-01-08T12:52:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580", "CVE-2018-3639"], "description": "This host is missing an important security\n update according to Microsoft KB4480963", "modified": "2019-12-20T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814649", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814649", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480963)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480963)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814649\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0541\", \"CVE-2019-0543\",\n \"CVE-2019-0552\", \"CVE-2019-0554\", \"CVE-2019-0555\", \"CVE-2019-0569\",\n \"CVE-2019-0570\", \"CVE-2019-0575\", \"CVE-2019-0576\", \"CVE-2019-0577\",\n \"CVE-2019-0578\", \"CVE-2019-0579\", \"CVE-2019-0580\", \"CVE-2019-0581\",\n \"CVE-2019-0582\", \"CVE-2019-0583\", \"CVE-2019-0584\", \"CVE-2019-0549\",\n \"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 18:36:41 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480963)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4480963\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the\n target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists due to,\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows Runtime improperly handles objects in memory.\n\n - Windows kernel improperly handles objects in memory.\n\n - An error in the Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n\n - MSHTML engine improperly validates input.\n\n - Windows improperly handles authentication requests.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to execute arbitrary code on a victim system and gain elevated privileges\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8.1 for 32-bit/x64\n\n - Microsoft Windows Server 2012 R2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480963\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) <= 0){\n exit(0);\n}\n\ndllpath = smb_get_system32root();\nif(!dllpath){\n exit(0);\n}\n\nfileVer = fetch_file_version(sysPath:dllpath, file_name:\"Mshtml.dll\");\nif(!fileVer){\n exit(0);\n}\n\nif(version_is_less(version:fileVer, test_version:\"11.0.9600.19236\"))\n{\n report = report_fixed_ver(file_checked:dllpath + \"\\Mshtml.dll\",\n file_version:fileVer, vulnerable_range:\"Less than 11.0.9600.19236\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580", "CVE-2018-3639"], "description": "This host is missing an important security\n update according to Microsoft KB4480970", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814650", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814650", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480970)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480970)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814650\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0541\", \"CVE-2019-0543\",\n \"CVE-2019-0584\", \"CVE-2019-0554\", \"CVE-2019-0549\", \"CVE-2019-0569\",\n \"CVE-2019-0583\", \"CVE-2019-0575\", \"CVE-2019-0576\", \"CVE-2019-0577\",\n \"CVE-2019-0578\", \"CVE-2019-0579\", \"CVE-2019-0580\", \"CVE-2019-0581\",\n \"CVE-2019-0582\", \"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 18:36:41 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480970)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4480970\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the\n target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flawss exists due to,\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows Runtime improperly handles objects in memory.\n\n - Windows kernel improperly handles objects in memory.\n\n - An error in the Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n\n - MSHTML engine improperly validates input.\n\n - Windows improperly handles authentication requests.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow\n an attacker to execute arbitrary code on a victim system, obtain information\n to further compromise the user's system and gain elevated privileges.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1\n\n - Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480963\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) <= 0){\n exit(0);\n}\n\ndllPath = smb_get_system32root();\nif(!dllPath ){\n exit(0);\n}\n\nfileVer = fetch_file_version(sysPath:dllPath, file_name:\"Mshtml.dll\");\nif(!fileVer){\n exit(0);\n}\n\nif(version_is_less(version:fileVer, test_version:\"11.0.9600.19236\"))\n{\n report = report_fixed_ver(file_checked:dllPath + \"\\Mshtml.dll\",\n file_version:fileVer, vulnerable_range:\"Less than 11.0.9600.19236\");\n security_message(data:report);\n exit(0);\n}\nexit(99);", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "This host is missing a critical security\n update according to Microsoft KB4480962", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814642", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814642", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480962)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480962)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814642\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0539\", \"CVE-2019-0541\",\n \"CVE-2019-0543\", \"CVE-2019-0545\", \"CVE-2019-0552\", \"CVE-2019-0554\",\n \"CVE-2019-0555\", \"CVE-2019-0566\", \"CVE-2019-0567\", \"CVE-2019-0569\",\n \"CVE-2019-0570\", \"CVE-2019-0571\", \"CVE-2019-0572\", \"CVE-2019-0573\",\n \"CVE-2019-0574\", \"CVE-2019-0575\", \"CVE-2019-0576\", \"CVE-2019-0577\",\n \"CVE-2019-0578\", \"CVE-2019-0579\", \"CVE-2019-0580\", \"CVE-2019-0581\",\n \"CVE-2019-0582\", \"CVE-2019-0583\", \"CVE-2019-0584\", \"CVE-2019-0549\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 10:24:24 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480962)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4480962\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Windows kernel improperly handles objects in memory.\n\n - An error in the Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n\n - Chakra scripting engine improperly handles objects in memory in Microsoft Edge.\n\n - MSHTML engine improperly validates input.\n\n - Windows improperly handles authentication requests.\n\n - Windows Data Sharing Service improperly handles file operations.\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows Runtime improperly handles objects in memory.\n\n - A privilege elevation exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to obtain sensitive information to further compromise the user's system, gain\n elevated privileges and arbitrary code in the context of the current user.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 10 for 32-bit Systems\n\n - Microsoft Windows 10 for x64-based Systems\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480962\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.10240.0\", test_version2:\"11.0.10240.18093\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.10240.0 - 11.0.10240.18093\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T12:52:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "This host is missing a critical security\n update according to Microsoft KB4480961", "modified": "2019-12-20T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814641", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814641", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480961)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480961)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814641\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0539\", \"CVE-2019-0541\",\n \"CVE-2019-0543\", \"CVE-2019-0545\", \"CVE-2019-0552\", \"CVE-2019-0554\",\n \"CVE-2019-0555\", \"CVE-2019-0566\", \"CVE-2019-0567\", \"CVE-2019-0569\",\n \"CVE-2019-0570\", \"CVE-2019-0571\", \"CVE-2019-0572\", \"CVE-2019-0573\",\n \"CVE-2019-0574\", \"CVE-2019-0575\", \"CVE-2019-0576\", \"CVE-2019-0577\",\n \"CVE-2019-0578\", \"CVE-2019-0579\", \"CVE-2019-0580\", \"CVE-2019-0581\",\n \"CVE-2019-0582\", \"CVE-2019-0583\", \"CVE-2019-0584\", \"CVE-2019-0549\",\n \"CVE-2019-0551\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 10:08:10 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480961)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4480961\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on\n the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Windows kernel improperly handles objects in memory.\n\n - An error in the Microsoft XmlDocument class that could allow an attacker to\n escape from the AppContainer sandbox in the browser.\n\n - Chakra scripting engine improperly handles objects in memory in Microsoft Edge.\n\n - MSHTML engine improperly validates input.\n\n - Windows Hyper-V on a host server fails to properly validate input from an\n authenticated user on a guest operating system.\n\n - Windows improperly handles authentication requests.\n\n - Windows Data Sharing Service improperly handles file operations.\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows Runtime improperly handles objects in memory.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker to obtain sensitive information to further compromise the user's system,\n gain elevated privileges and execute arbitrary code on a victim system.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 10 Version 1607 x32/x64\n\n - Microsoft Windows Server 2016\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480961\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1, win2016:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.14393.0\", test_version2:\"11.0.14393.2723\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.14393.0 - 11.0.14393.2723\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "This host is missing a critical security\n update according to Microsoft KB4480973", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814640", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814640", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480973)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480973)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814640\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0539\", \"CVE-2019-0541\",\n \"CVE-2019-0543\", \"CVE-2019-0545\", \"CVE-2019-0551\", \"CVE-2019-0552\",\n \"CVE-2019-0553\", \"CVE-2019-0554\", \"CVE-2019-0555\", \"CVE-2019-0566\",\n \"CVE-2019-0567\", \"CVE-2019-0569\", \"CVE-2019-0570\", \"CVE-2019-0571\",\n \"CVE-2019-0572\", \"CVE-2019-0573\", \"CVE-2019-0574\", \"CVE-2019-0575\",\n \"CVE-2019-0576\", \"CVE-2019-0577\", \"CVE-2019-0578\", \"CVE-2019-0579\",\n \"CVE-2019-0580\", \"CVE-2019-0581\", \"CVE-2019-0582\", \"CVE-2019-0583\",\n \"CVE-2019-0584\", \"CVE-2019-0549\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 10:00:45 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480973)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4480973\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Windows kernel improperly handles objects in memory.\n\n - An error in Microsoft XmlDocument class that could allow an attacker to escape\n from the AppContainer sandbox in the browser.\n\n - Chakra scripting engine improperly handles objects in memory in Microsoft Edge.\n\n - MSHTML engine improperly validates input.\n\n - Windows Hyper-V on a host server fails to properly validate input from an\n authenticated user on a guest operating system.\n\n - Windows improperly handles authentication requests.\n\n - Windows Subsystem for Linux improperly handles objects in memory.\n\n - Windows Data Sharing Service improperly handles file operations.\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows Runtime improperly handles objects in memory.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to obtain information to further compromise the user's system, gain elevated\n privileges and execute arbitrary code on a victim system.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Windows 10 Version 1703 x32/x64 Systems.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480973\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.15063.0\", test_version2:\"11.0.15063.1562\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.15063.0 - 11.0.15063.1562\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "This host is missing a critical security\n update according to Microsoft KB4480978", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814644", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814644", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480978)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480978)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814644\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0539\", \"CVE-2019-0541\",\n \"CVE-2019-0543\", \"CVE-2019-0545\", \"CVE-2019-0551\", \"CVE-2019-0552\",\n \"CVE-2019-0553\", \"CVE-2019-0554\", \"CVE-2019-0555\", \"CVE-2019-0566\",\n \"CVE-2019-0567\", \"CVE-2019-0569\", \"CVE-2019-0570\", \"CVE-2019-0571\",\n \"CVE-2019-0572\", \"CVE-2019-0573\", \"CVE-2019-0574\", \"CVE-2019-0575\",\n \"CVE-2019-0576\", \"CVE-2019-0577\", \"CVE-2019-0578\", \"CVE-2019-0579\",\n \"CVE-2019-0580\", \"CVE-2019-0581\", \"CVE-2019-0582\", \"CVE-2019-0583\",\n \"CVE-2019-0584\", \"CVE-2019-0549\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 10:41:16 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480978)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4480978\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on\n the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Windows kernel improperly handles objects in memory.\n\n - An error in the Microsoft XmlDocument class that could allow an attacker to\n escape from the AppContainer sandbox in the browser.\n\n - Chakra scripting engine improperly handles objects in memory in Microsoft Edge.\n\n - MSHTML engine improperly validates input.\n\n - Windows Hyper-V on a host server fails to properly validate input from an\n authenticated user on a guest operating system.\n\n - Windows improperly handles authentication requests.\n\n - Windows Subsystem for Linux improperly handles objects in memory.\n\n - Windows Data Sharing Service improperly handles file operations.\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows Runtime improperly handles objects in memory.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to obtain information to further compromise the user's system, gain elevated\n privileges on an affected system and execute arbitrary code in the context of\n the current user.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 10 Version 1709 for 32-bit Systems\n\n - Microsoft Windows 10 Version 1709 for 64-based Systems\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480978\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.16299.0\", test_version2:\"11.0.16299.636\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.16299.0 - 11.0.16299.636\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0550", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0565", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0568", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0547", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "This host is missing a critical security\n update according to Microsoft KB4480966", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814643", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814643", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480966)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480966)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814643\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0539\", \"CVE-2019-0541\",\n \"CVE-2019-0543\", \"CVE-2019-0545\", \"CVE-2019-0551\", \"CVE-2019-0552\",\n \"CVE-2019-0553\", \"CVE-2019-0554\", \"CVE-2019-0555\", \"CVE-2019-0565\",\n \"CVE-2019-0566\", \"CVE-2019-0567\", \"CVE-2019-0568\", \"CVE-2019-0569\",\n \"CVE-2019-0570\", \"CVE-2019-0571\", \"CVE-2019-0572\", \"CVE-2019-0573\",\n \"CVE-2019-0574\", \"CVE-2019-0575\", \"CVE-2019-0576\", \"CVE-2019-0577\",\n \"CVE-2019-0578\", \"CVE-2019-0579\", \"CVE-2019-0580\", \"CVE-2019-0581\",\n \"CVE-2019-0582\", \"CVE-2019-0583\", \"CVE-2019-0584\", \"CVE-2019-0547\",\n \"CVE-2019-0549\", \"CVE-2019-0550\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 10:32:25 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480966)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4480966\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on\n the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Windows kernel improperly handles objects in memory.\n\n - Microsoft Edge improperly accesses objects in memory.\n\n - Chakra scripting engine handles objects in memory in Microsoft Edge.\n\n - Windows DHCP client when an attacker sends specially crafted DHCP responses\n to a client.\n\n - MSHTML engine improperly validates input.\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows improperly handles authentication requests.\n\n - Windows Subsystem for Linux improperly handles objects in memory.\n\n - Windows Data Sharing Service improperly handles file operations.\n\n - An error in the Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n\n - Windows Hyper-V on a host server fails to properly validate input from an\n authenticated user on a guest operating system.\n\n - Windows Runtime improperly handles objects in memory.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to obtain information to further compromise the user's system, elevate privileges\n on an affected system and execute arbitrary code in the context of the current\n user.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 10 Version 1803 for 32-bit Systems\n\n - Microsoft Windows 10 Version 1803 for x64-based Systems\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480966\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.17134.0\", test_version2:\"11.0.17134.522\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.17134.0 - 11.0.17134.522\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0550", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0565", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0568", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "This host is missing a critical security\n update according to Microsoft KB4480116", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814639", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814639", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4480116)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4480116)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814639\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0536\", \"CVE-2019-0538\", \"CVE-2019-0539\", \"CVE-2019-0541\",\n \"CVE-2019-0543\", \"CVE-2019-0551\", \"CVE-2019-0552\", \"CVE-2019-0553\",\n \"CVE-2019-0554\", \"CVE-2019-0555\", \"CVE-2019-0565\", \"CVE-2019-0566\",\n \"CVE-2019-0567\", \"CVE-2019-0568\", \"CVE-2019-0569\", \"CVE-2019-0570\",\n \"CVE-2019-0571\", \"CVE-2019-0572\", \"CVE-2019-0573\", \"CVE-2019-0574\",\n \"CVE-2019-0575\", \"CVE-2019-0576\", \"CVE-2019-0577\", \"CVE-2019-0578\",\n \"CVE-2019-0579\", \"CVE-2019-0580\", \"CVE-2019-0581\", \"CVE-2019-0582\",\n \"CVE-2019-0583\", \"CVE-2019-0584\", \"CVE-2019-0549\", \"CVE-2019-0550\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 09:52:03 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4480116)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4480116\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on\n the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Windows kernel improperly handles objects in memory.\n\n - Microsoft Edge improperly accesses objects in memory.\n\n - Chakra scripting engine improperly handles objects in memory in Microsoft Edge.\n\n - The MSHTML engine improperly validates input.\n\n - Windows Jet Database Engine improperly handles objects in memory.\n\n - Windows improperly handles authentication requests.\n\n - Windows Subsystem for Linux improperly handles objects in memory.\n\n - An elevation of privilege exists in Windows COM Desktop Broker.\n\n - An error in Microsoft XmlDocument class that could allow an attacker to escape\n from the AppContainer sandbox in the browser.\n\n - Windows Hyper-V on a host server fails to properly validate input from an\n authenticated user on a guest operating system.\n\n - Windows Data Sharing Service improperly handles file operations.\n\n - Windows Runtime improperly handles objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to obtain information to further compromise the user's system, gain the same\n user rights as the current user and execute arbitrary code in the context of the\n current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Windows 10 Version 1809 for 32-bit/x64 Systems.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480116\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.17763.0\", test_version2:\"11.0.17763.252\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.17763.0 - 11.0.17763.252\");\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T16:27:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0545"], "description": "This host is missing an important security\n update according to Microsoft KB4480063", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814722", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814722", "type": "openvas", "title": "Microsoft .NET Framework Information Disclosure Vulnerability (KB4480063)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Information Disclosure Vulnerability (KB4480063)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814722\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0545\");\n script_bugtraq_id(106405);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 11:24:16 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft .NET Framework Information Disclosure Vulnerability (KB4480063)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4480063\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error which allows\n to bypass CORS configuration.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n who successfully exploited the vulnerability to retrieve content, that is normally\n restricted, from a web application.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft .NET Framework 3.5.1 on Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1\n\n - Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480063\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) <= 0){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\Microsoft\\.NETFramework\")){\n if(!registry_key_exists(key:\"SOFTWARE\\Microsoft\\ASP.NET\")){\n exit(0);\n }\n}\n\nkey_list = make_list(\"SOFTWARE\\Microsoft\\.NETFramework\\\", \"SOFTWARE\\Microsoft\\ASP.NET\\\");\n\nforeach key(key_list)\n{\n if(\".NETFramework\" >< key)\n {\n foreach item (registry_enum_keys(key:key))\n {\n NetPath = registry_get_sz(key:key + item, item:\"InstallRoot\");\n if(NetPath && \"\\Microsoft.NET\\Framework\" >< NetPath)\n {\n foreach item (registry_enum_keys(key:key))\n {\n dotPath = NetPath + item;\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"system.dll\");\n if(dllVer)\n {\n if(version_in_range(version:dllVer, test_version:\"2.0.50727.5700\", test_version2:\"2.0.50727.8800\")){\n VULN = TRUE ;\n break;\n }\n }\n }\n }\n }\n }\n if((!VULN) && \"ASP.NET\" >< key)\n {\n foreach item (registry_enum_keys(key:key))\n {\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"system.dll\");\n if(dllVer)\n {\n if(version_in_range(version:dllVer, test_version:\"2.0.50727.5700\", test_version2:\"2.0.50727.8800\")){\n VULN = TRUE ;\n break;\n }\n }\n }\n }\n }\n if(VULN)\n {\n report = report_fixed_ver(file_checked:dotPath + \"\\system.dll\",\n file_version:dllVer, vulnerable_range:\"2.0.50727.5700 - 2.0.50727.8800\");\n security_message(data:report);\n exit(0);\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-06-05T16:27:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0545"], "description": "This host is missing an important security\n update according to Microsoft KB4480054", "modified": "2020-06-04T00:00:00", "published": "2019-01-09T00:00:00", "id": "OPENVAS:1361412562310814726", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310814726", "type": "openvas", "title": "Microsoft .NET Framework Information Disclosure Vulnerability (KB4480054)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Information Disclosure Vulnerability (KB4480054)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2019 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.814726\");\n script_version(\"2020-06-04T09:02:37+0000\");\n script_cve_id(\"CVE-2019-0545\");\n script_bugtraq_id(106405);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 09:02:37 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-01-09 12:10:27 +0530 (Wed, 09 Jan 2019)\");\n script_name(\"Microsoft .NET Framework Information Disclosure Vulnerability (KB4480054)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4480054\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error which allows\n to bypass CORS configuration.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n who successfully exploited the vulnerability to retrieve content, that is normally\n restricted, from a web application.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 on Microsoft Windows 8.1 for 32-bit/x64\n\n - Microsoft Windows Server 2012 R2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4480054\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) <= 0){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\Microsoft\\.NETFramework\")){\n if(!registry_key_exists(key:\"SOFTWARE\\Microsoft\\ASP.NET\")){\n exit(0);\n }\n}\n\nkey_list = make_list(\"SOFTWARE\\Microsoft\\.NETFramework\\\", \"SOFTWARE\\Microsoft\\ASP.NET\\\");\n\nforeach key(key_list)\n{\n if(\".NETFramework\" >< key)\n {\n foreach item (registry_enum_keys(key:key))\n {\n NetPath = registry_get_sz(key:key + item, item:\"InstallRoot\");\n if(NetPath && \"\\Microsoft.NET\\Framework\" >< NetPath)\n {\n foreach item (registry_enum_keys(key:key))\n {\n dotPath = NetPath + item;\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"system.dll\");\n if(dllVer)\n {\n if(version_in_range(version:dllVer, test_version:\"4.6\", test_version2:\"4.7.3313\")){\n VULN = TRUE ;\n break;\n }\n }\n }\n }\n }\n }\n if((!VULN) && \"ASP.NET\" >< key)\n {\n foreach item (registry_enum_keys(key:key))\n {\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"system.dll\");\n if(dllVer)\n {\n if(version_in_range(version:dllVer, test_version:\"4.6\", test_version2:\"4.7.3313\")){\n VULN = TRUE ;\n break;\n }\n }\n }\n }\n }\n\n if(VULN)\n {\n report = report_fixed_ver(file_checked:dotPath + \"system.dll\",\n file_version:dllVer, vulnerable_range:\"4.6 - 4.7.3313\");\n security_message(data:report);\n exit(0);\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-01T05:46:04", "description": "The remote Windows host is missing security update 4480972\nor cumulative update 4480975. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)", "edition": 22, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480972: Windows Server 2012 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS19_JAN_4480975.NASL", "href": "https://www.tenable.com/plugins/nessus/121019", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121019);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/04/30 14:30:16\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480972\");\n script_xref(name:\"MSKB\", value:\"4480975\");\n script_xref(name:\"MSFT\", value:\"MS19-4480972\");\n script_xref(name:\"MSFT\", value:\"MS19-4480975\");\n\n script_name(english:\"KB4480972: Windows Server 2012 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480972\nor cumulative update 4480975. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\");\n # https://support.microsoft.com/en-us/help/4480972/windows-server-2012-kb4480972\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?28d14e98\");\n # https://support.microsoft.com/en-us/help/4480975/windows-server-2012-update-kb4480975\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?14883957\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4480972 or Cumulative Update KB4480975.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480972', '4480975');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480972, 4480975])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:46:03", "description": "The remote Windows host is missing security update 4480960\nor cumulative update 4480970. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine improperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)", "edition": 23, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480960: Windows 7 and Windows Server 2008 R2 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580", "CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS19_JAN_4480970.NASL", "href": "https://www.tenable.com/plugins/nessus/121017", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121017);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/04/30 14:30:16\");\n\n script_cve_id(\n \"CVE-2018-3639\",\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0554\",\n \"CVE-2019-0569\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480960\");\n script_xref(name:\"MSKB\", value:\"4480970\");\n script_xref(name:\"MSFT\", value:\"MS19-4480960\");\n script_xref(name:\"MSFT\", value:\"MS19-4480970\");\n\n script_name(english:\"KB4480960: Windows 7 and Windows Server 2008 R2 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480960\nor cumulative update 4480970. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine improperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\");\n # https://support.microsoft.com/en-us/help/4480960/windows-server-2008-kb4480960\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6bb1666d\");\n # https://support.microsoft.com/en-us/help/4480970/windows-7-update-kb4480970\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?df36ff32\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4480960 or Cumulative Update KB4480970.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480960', '4480970');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.1\",\n sp:1,\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480960, 4480970])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:46:03", "description": "The remote Windows host is missing security update 4480957\nor cumulative update 4480968. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)", "edition": 22, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480957: Windows Server 2008 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS19_JAN_4480968.NASL", "href": "https://www.tenable.com/plugins/nessus/121016", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121016);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/04/30 14:30:16\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0554\",\n \"CVE-2019-0569\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480968\");\n script_xref(name:\"MSKB\", value:\"4480957\");\n script_xref(name:\"MSFT\", value:\"MS19-4480968\");\n script_xref(name:\"MSFT\", value:\"MS19-4480957\");\n\n script_name(english:\"KB4480957: Windows Server 2008 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480957\nor cumulative update 4480968. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\");\n # https://support.microsoft.com/en-us/help/4480968/windows-server-2008-update-kb4480968\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?be3b897d\");\n # https://support.microsoft.com/en-us/help/4480957/windows-server-2008-update-kb4480957\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?25cf74de\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4480957 or Cumulative Update KB4480968.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480957', '4480968');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Vista\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.0\",\n sp:2,\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480957, 4480968])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-18T02:52:16", "description": "The remote Windows host is missing security update 4480978. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0551)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)", "edition": 12, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480978: Windows 10 Version 1709 and Windows Server Version 1709 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0584", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2019-01-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS19_JAN_4480978.NASL", "href": "https://www.tenable.com/plugins/nessus/121020", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(121020);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/25\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0551\",\n \"CVE-2019-0552\",\n \"CVE-2019-0553\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0571\",\n \"CVE-2019-0572\",\n \"CVE-2019-0573\",\n \"CVE-2019-0574\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480978\");\n script_xref(name:\"MSFT\", value:\"MS19-4480978\");\n\n script_name(english:\"KB4480978: Windows 10 Version 1709 and Windows Server Version 1709 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480978. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0551)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)\");\n # https://support.microsoft.com/en-us/help/4480978/windows-10-update-kb4480978\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8aa7a1c6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4480978.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480978');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"16299\",\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480978])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:33", "description": "The remote Windows host is missing security update 4480961. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0551)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480961: Windows 10 Version 1607 and Windows Server 2016 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2019-01-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS19_JAN_4480961.NASL", "href": "https://www.tenable.com/plugins/nessus/121012", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121012);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0539\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0551\",\n \"CVE-2019-0552\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0566\",\n \"CVE-2019-0567\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0571\",\n \"CVE-2019-0572\",\n \"CVE-2019-0573\",\n \"CVE-2019-0574\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480961\");\n script_xref(name:\"MSFT\", value:\"MS19-4480961\");\n\n script_name(english:\"KB4480961: Windows 10 Version 1607 and Windows Server 2016 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480961. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0551)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)\");\n # https://support.microsoft.com/en-us/help/4480961/windows-10-update-kb4480961\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?108c06e5\");\n script_set_attribute(attribute:\"solution\", value:\n \"Apply Cumulative Update KB4480961.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480961');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"14393\",\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480961])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:33", "description": "The remote Windows host is missing security update 4480962. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480962: Windows 10 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2019-01-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS19_JAN_4480962.NASL", "href": "https://www.tenable.com/plugins/nessus/121013", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121013);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0539\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0552\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0566\",\n \"CVE-2019-0567\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0571\",\n \"CVE-2019-0572\",\n \"CVE-2019-0573\",\n \"CVE-2019-0574\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480962\");\n script_xref(name:\"MSFT\", value:\"MS19-4480962\");\n\n script_name(english:\"KB4480962: Windows 10 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480962. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)\");\n # https://support.microsoft.com/en-us/help/4480962/windows-10-update-kb4480962\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ed198bfb\");\n script_set_attribute(attribute:\"solution\", value:\n \"Apply Cumulative Update KB4480962.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480962');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"10240\",\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480962])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:34", "description": "The remote Windows host is missing security update 4480973. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567)\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0551)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480973: Windows 10 Version 1703 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2019-01-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS19_JAN_4480973.NASL", "href": "https://www.tenable.com/plugins/nessus/121018", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121018);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0539\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0551\",\n \"CVE-2019-0552\",\n \"CVE-2019-0553\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0566\",\n \"CVE-2019-0567\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0571\",\n \"CVE-2019-0572\",\n \"CVE-2019-0573\",\n \"CVE-2019-0574\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480973\");\n script_xref(name:\"MSFT\", value:\"MS19-4480973\");\n\n script_name(english:\"KB4480973: Windows 10 Version 1703 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480973. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567)\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0551)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)\");\n # https://support.microsoft.com/en-us/help/4480973/windows-10-update-kb4480973\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a8bd0dec\");\n script_set_attribute(attribute:\"solution\", value:\n \"Apply Cumulative Update KB4480973.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480973');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"15063\",\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480973])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-03-18T02:52:16", "description": "The remote Windows host is missing security update 4480966. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - A memory corruption vulnerability exists in the Windows\n DHCP client when an attacker sends specially crafted\n DHCP responses to a client. An attacker who successfully\n exploited the vulnerability could run arbitrary code on\n the client machine. (CVE-2019-0547)\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0550, CVE-2019-0551)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)", "edition": 12, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480966: Windows 10 Version 1803 and Windows Server Version 1803 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0550", "CVE-2019-0584", "CVE-2019-0545", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0547", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2019-01-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS19_JAN_4480966.NASL", "href": "https://www.tenable.com/plugins/nessus/121015", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(121015);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/25\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0547\",\n \"CVE-2019-0549\",\n \"CVE-2019-0550\",\n \"CVE-2019-0551\",\n \"CVE-2019-0552\",\n \"CVE-2019-0553\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0571\",\n \"CVE-2019-0572\",\n \"CVE-2019-0573\",\n \"CVE-2019-0574\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480966\");\n script_xref(name:\"MSFT\", value:\"MS19-4480966\");\n\n script_name(english:\"KB4480966: Windows 10 Version 1803 and Windows Server Version 1803 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480966. \nIt is, therefore, affected by multiple vulnerabilities :\n\n - A memory corruption vulnerability exists in the Windows\n DHCP client when an attacker sends specially crafted\n DHCP responses to a client. An attacker who successfully\n exploited the vulnerability could run arbitrary code on\n the client machine. (CVE-2019-0547)\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0550, CVE-2019-0551)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)\");\n # https://support.microsoft.com/en-us/help/4480966/windows-10-update-kb4480966\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f7193a7a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4480966.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480966');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"17134\",\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480966])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:33", "description": "The remote Windows host is missing security update 4480116.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567,\n CVE-2019-0568)\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0550, CVE-2019-0551)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2019-0565)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)", "edition": 19, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-01-08T00:00:00", "title": "KB4480116: Windows 10 Version 1809 and Windows Server 2019 January 2019 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0567", "CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0566", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0550", "CVE-2019-0584", "CVE-2019-0539", "CVE-2019-0545", "CVE-2019-0565", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0568", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "modified": "2019-01-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS19_JAN_4480116.NASL", "href": "https://www.tenable.com/plugins/nessus/121011", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121011);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2019-0536\",\n \"CVE-2019-0538\",\n \"CVE-2019-0539\",\n \"CVE-2019-0541\",\n \"CVE-2019-0543\",\n \"CVE-2019-0545\",\n \"CVE-2019-0549\",\n \"CVE-2019-0550\",\n \"CVE-2019-0551\",\n \"CVE-2019-0552\",\n \"CVE-2019-0553\",\n \"CVE-2019-0554\",\n \"CVE-2019-0555\",\n \"CVE-2019-0565\",\n \"CVE-2019-0566\",\n \"CVE-2019-0567\",\n \"CVE-2019-0568\",\n \"CVE-2019-0569\",\n \"CVE-2019-0570\",\n \"CVE-2019-0571\",\n \"CVE-2019-0572\",\n \"CVE-2019-0573\",\n \"CVE-2019-0574\",\n \"CVE-2019-0575\",\n \"CVE-2019-0576\",\n \"CVE-2019-0577\",\n \"CVE-2019-0578\",\n \"CVE-2019-0579\",\n \"CVE-2019-0580\",\n \"CVE-2019-0581\",\n \"CVE-2019-0582\",\n \"CVE-2019-0583\",\n \"CVE-2019-0584\"\n );\n script_xref(name:\"MSKB\", value:\"4480116\");\n script_xref(name:\"MSFT\", value:\"MS19-4480116\");\n\n script_name(english:\"KB4480116: Windows 10 Version 1809 and Windows Server 2019 January 2019 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4480116.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2019-0539, CVE-2019-0567,\n CVE-2019-0568)\n\n - An information disclosure vulnerability exists when\n Windows Subsystem for Linux improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. A attacker could exploit\n this vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how Windows Subsystem for Linux handles\n objects in memory. (CVE-2019-0553)\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2019-0550, CVE-2019-0551)\n\n - A remote code execution vulnerability exists when the\n Windows Jet Database Engine improperly handles objects\n in memory. An attacker who successfully exploited this\n vulnerability could execute arbitrary code on a victim\n system. An attacker could exploit this vulnerability by\n enticing a victim to open a specially crafted file. The\n update addresses the vulnerability by correcting the way\n the Windows Jet Database Engine handles objects in\n memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576,\n CVE-2019-0577, CVE-2019-0578, CVE-2019-0579,\n CVE-2019-0580, CVE-2019-0581, CVE-2019-0582,\n CVE-2019-0583, CVE-2019-0584)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2019-0565)\n\n - An elevation of privilege vulnerability exists in the\n Microsoft XmlDocument class that could allow an attacker\n to escape from the AppContainer sandbox in the browser.\n An attacker who successfully exploited this\n vulnerability could gain elevated privileges and break\n out of the Edge AppContainer sandbox. The vulnerability\n by itself does not allow arbitrary code to run. However,\n this vulnerability could be used in conjunction with one\n or more vulnerabilities (for example a remote code\n execution vulnerability and another elevation of\n privilege vulnerability) to take advantage of the\n elevated privileges when running. The security update\n addresses the vulnerability by modifying how the\n Microsoft XmlDocument class enforces sandboxing.\n (CVE-2019-0555)\n\n - An elevation of privilege vulnerability exists when\n Windows improperly handles authentication requests. An\n attacker who successfully exploited this vulnerability\n could run processes in an elevated context. An attacker\n could exploit this vulnerability by running a specially\n crafted application on the victim system. The update\n addresses the vulnerability by correcting the way\n Windows handles authentication requests. (CVE-2019-0543)\n\n - An elevation of privilege vulnerability exists when the\n Windows Runtime improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could run arbitrary code in an elevated context. An\n attacker could exploit this vulnerability by running a\n specially crafted application on the victim system. The\n update addresses the vulnerability by correcting the way\n the Windows Runtime handles objects in memory.\n (CVE-2019-0570)\n\n - A remote code execution vulnerability exists in the way\n that the MSHTML engine inproperly validates input. An\n attacker could execute arbitrary code in the context of\n the current user. (CVE-2019-0541)\n\n - An elevation of privilege exists in Windows COM Desktop\n Broker. An attacker who successfully exploited the\n vulnerability could run arbitrary code with elevated\n privileges. (CVE-2019-0552)\n\n - An elevation of privilege vulnerability exists in\n Microsoft Edge Browser Broker COM object. An attacker\n who successfully exploited the vulnerability could use\n the Browser Broker COM object to elevate privileges on\n an affected system. This vulnerability by itself does\n not allow arbitrary code execution; however, it could\n allow arbitrary code to be run if the attacker uses it\n in combination with another vulnerability (such as a\n remote code execution vulnerability or another elevation\n of privilege vulnerability) that is capable of\n leveraging the elevated privileges when code execution\n is attempted. (CVE-2019-0566)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. An authenticated attacker could exploit this\n vulnerability by running a specially crafted\n application. The update addresses the vulnerability by\n correcting how the Windows kernel handles objects in\n memory. (CVE-2019-0569)\n\n - An elevation of privilege vulnerability exists when the\n Windows Data Sharing Service improperly handles file\n operations. An attacker who successfully exploited this\n vulnerability could run processes in an elevated\n context. An attacker could exploit this vulnerability by\n running a specially crafted application on the victim\n system. The update addresses the vulnerability by\n correcting the way the Windows Data Sharing Service\n handles file operations. (CVE-2019-0571, CVE-2019-0572,\n CVE-2019-0573, CVE-2019-0574)\");\n # https://support.microsoft.com/en-us/help/4480116/windows-10-update-kb4480116\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b3a1f686\");\n script_set_attribute(attribute:\"solution\", value:\n \"Apply Cumulative Update KB4480116.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0538\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS19-01\";\nkbs = make_list('4480116');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"17763\",\n rollup_date:\"01_2019\",\n bulletin:bulletin,\n rollup_kb_list:[4480116])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:46:04", "description": "The Microsoft .NET Framework installation on the remote host\nis missing a security update. It is, therefore, affected by\nthe following vulnerability :\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)", "edition": 23, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2019-01-08T00:00:00", "title": "Security Updates for Microsoft .NET Framework (January 2019)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-0545"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:.net_framework"], "id": "SMB_NT_MS19_JAN_DOTNET.NASL", "href": "https://www.tenable.com/plugins/nessus/121021", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121021);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/10/31 15:18:52\");\n\n script_cve_id(\"CVE-2019-0545\");\n script_xref(name:\"MSKB\", value:\"4480051\");\n script_xref(name:\"MSKB\", value:\"4480054\");\n script_xref(name:\"MSKB\", value:\"4480055\");\n script_xref(name:\"MSKB\", value:\"4480056\");\n script_xref(name:\"MSKB\", value:\"4480057\");\n script_xref(name:\"MSKB\", value:\"4480058\");\n script_xref(name:\"MSKB\", value:\"4480059\");\n script_xref(name:\"MSKB\", value:\"4480061\");\n script_xref(name:\"MSKB\", value:\"4480062\");\n script_xref(name:\"MSKB\", value:\"4480063\");\n script_xref(name:\"MSKB\", value:\"4480064\");\n script_xref(name:\"MSKB\", value:\"4480070\");\n script_xref(name:\"MSKB\", value:\"4480071\");\n script_xref(name:\"MSKB\", value:\"4480072\");\n script_xref(name:\"MSKB\", value:\"4480074\");\n script_xref(name:\"MSKB\", value:\"4480075\");\n script_xref(name:\"MSKB\", value:\"4480076\");\n script_xref(name:\"MSKB\", value:\"4480083\");\n script_xref(name:\"MSKB\", value:\"4480084\");\n script_xref(name:\"MSKB\", value:\"4480085\");\n script_xref(name:\"MSKB\", value:\"4480086\");\n script_xref(name:\"MSKB\", value:\"4480961\");\n script_xref(name:\"MSKB\", value:\"4480962\");\n script_xref(name:\"MSKB\", value:\"4480966\");\n script_xref(name:\"MSKB\", value:\"4480973\");\n script_xref(name:\"MSKB\", value:\"4480978\");\n script_xref(name:\"MSFT\", value:\"MS19-4480051\");\n script_xref(name:\"MSFT\", value:\"MS19-4480054\");\n script_xref(name:\"MSFT\", value:\"MS19-4480055\");\n script_xref(name:\"MSFT\", value:\"MS19-4480056\");\n script_xref(name:\"MSFT\", value:\"MS19-4480057\");\n script_xref(name:\"MSFT\", value:\"MS19-4480058\");\n script_xref(name:\"MSFT\", value:\"MS19-4480059\");\n script_xref(name:\"MSFT\", value:\"MS19-4480061\");\n script_xref(name:\"MSFT\", value:\"MS19-4480062\");\n script_xref(name:\"MSFT\", value:\"MS19-4480063\");\n script_xref(name:\"MSFT\", value:\"MS19-4480064\");\n script_xref(name:\"MSFT\", value:\"MS19-4480070\");\n script_xref(name:\"MSFT\", value:\"MS19-4480071\");\n script_xref(name:\"MSFT\", value:\"MS19-4480072\");\n script_xref(name:\"MSFT\", value:\"MS19-4480074\");\n script_xref(name:\"MSFT\", value:\"MS19-4480075\");\n script_xref(name:\"MSFT\", value:\"MS19-4480076\");\n script_xref(name:\"MSFT\", value:\"MS19-4480083\");\n script_xref(name:\"MSFT\", value:\"MS19-4480084\");\n script_xref(name:\"MSFT\", value:\"MS19-4480085\");\n script_xref(name:\"MSFT\", value:\"MS19-4480086\");\n script_xref(name:\"MSFT\", value:\"MS19-4480961\");\n script_xref(name:\"MSFT\", value:\"MS19-4480962\");\n script_xref(name:\"MSFT\", value:\"MS19-4480966\");\n script_xref(name:\"MSFT\", value:\"MS19-4480973\");\n script_xref(name:\"MSFT\", value:\"MS19-4480978\");\n\n script_name(english:\"Security Updates for Microsoft .NET Framework (January 2019)\");\n script_summary(english:\"Checks for Microsoft security updates.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft .NET Framework installation on the remote host is\nmissing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft .NET Framework installation on the remote host\nis missing a security update. It is, therefore, affected by\nthe following vulnerability :\n\n - An information disclosure vulnerability exists in .NET\n Framework and .NET Core which allows bypassing Cross-\n origin Resource Sharing (CORS) configurations. An\n attacker who successfully exploited the vulnerability\n could retrieve content, that is normally restricted,\n from a web application. The security update addresses\n the vulnerability by enforcing CORS configuration to\n prevent its bypass. (CVE-2019-0545)\");\n # https://support.microsoft.com/en-us/help/4480961/windows-10-update-kb4480961\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?108c06e5\");\n # https://support.microsoft.com/en-us/help/4480962/windows-10-update-kb4480962\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ed198bfb\");\n # https://support.microsoft.com/en-us/help/4480966/windows-10-update-kb4480966\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f7193a7a\");\n # https://support.microsoft.com/en-us/help/4480072/description-of-security-only-update-for-net-framework-4-6-to-4-7-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dd77a736\");\n # https://support.microsoft.com/en-us/help/4480070/description-of-security-only-update-for-net-framework-4-6-to-4-7-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7ce18754\");\n # https://support.microsoft.com/en-us/help/4480071/description-of-security-only-update-for-net-framework-4-6-to-4-7-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3d86e600\");\n # https://support.microsoft.com/en-us/help/4480076/description-of-security-only-update-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3b934049\");\n # https://support.microsoft.com/en-us/help/4480074/description-of-security-only-update-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3b2464f5\");\n # https://support.microsoft.com/en-us/help/4480075/description-of-security-only-update-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?55d97d9f\");\n # https://support.microsoft.com/en-us/help/4480058/description-of-security-and-quality-rollup-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?2d3f019a\");\n # https://support.microsoft.com/en-us/help/4480059/description-of-security-and-quality-rollup-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0d50458c\");\n # https://support.microsoft.com/en-us/help/4480051/description-security-and-quality-rollup-for-net-framework-4-6-to-4-7-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?99cd605a\");\n # https://support.microsoft.com/en-us/help/4480054/description-security-and-quality-rollup-for-net-framework-4-6-to-4-7-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?24688942\");\n # https://support.microsoft.com/en-us/help/4480055/description-of-security-and-quality-rollup-for-net-framework-4-6\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c30a330a\");\n # https://support.microsoft.com/en-us/help/4480056/january-8-2018-kb4480056\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9348fa78\");\n # https://support.microsoft.com/en-us/help/4480057/description-of-security-and-quality-rollup-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4d06d714\");\n # https://support.microsoft.com/en-us/help/4480973/windows-10-update-kb4480973\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a8bd0dec\");\n # https://support.microsoft.com/en-us/help/4480978/windows-10-update-kb4480978\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8aa7a1c6\");\n # https://support.microsoft.com/en-us/help/4480064/description-of-security-and-quality-rollup-for-net-framework-3-5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?035a9903\");\n # https://support.microsoft.com/en-us/help/4480061/description-of-security-and-quality-rollup-for-net-framework-3-5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fb3b1b47\");\n # https://support.microsoft.com/en-us/help/4480063/description-of-security-and-quality-rollup-for-net-framework-3-5-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?355994f6\");\n # https://support.microsoft.com/en-us/help/4480062/description-of-security-and-quality-rollup-for-net-framework-2-0-and-3\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ba6bb054\");\n # https://support.microsoft.com/en-us/help/4480086/description-of-security-only-update-for-net-framework-3-5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5bc42785\");\n # https://support.microsoft.com/en-us/help/4480085/description-of-security-only-update-for-net-framework-3-5-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?70f483ef\");\n # https://support.microsoft.com/en-us/help/4480084/description-of-security-only-update-for-net-framework-2-0-and-3-0\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6c2a08ec\");\n # https://support.microsoft.com/en-us/help/4480083/description-of-security-only-update-for-net-framework-3-5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?82c64296\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released security updates for Microsoft .NET Framework.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-0545\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:.net_framework\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_dotnet_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\", \"microsoft_net_framework_installed.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"install_func.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = \"MS19-01\";\nkbs = make_list(\n \"4480051\",\n \"4480054\",\n \"4480055\",\n \"4480056\",\n \"4480057\",\n \"4480058\",\n \"4480059\",\n \"4480061\",\n \"4480062\",\n \"4480063\",\n \"4480064\",\n \"4480070\",\n \"4480071\",\n \"4480072\",\n \"4480074\",\n \"4480075\",\n \"4480076\",\n \"4480083\",\n \"4480084\",\n \"4480085\",\n \"4480086\",\n \"4480961\",\n \"4480962\",\n \"4480966\",\n \"4480973\",\n \"4480978\"\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2', win7:'1', win8:'0', win81:'0', win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"Windows 8.1\" >!< productname) audit(AUDIT_OS_SP_NOT_VULN);\nelse if (\"Vista\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\napp = 'Microsoft .NET Framework';\nget_install_count(app_name:app, exit_if_zero:TRUE);\ninstalls = get_combined_installs(app_name:app);\n\nvuln = 0;\n\nif (installs[0] == 0)\n{\n foreach install (installs[1])\n {\n version = install['version'];\n if( version != UNKNOWN_VER &&\n smb_check_dotnet_rollup(rollup_date:\"01_2019\", dotnet_ver:version))\n vuln++;\n }\n}\nif(vuln)\n{\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, \"affected\");\n} \n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "kaspersky": [{"lastseen": "2020-09-02T11:56:20", "bulletinFamily": "info", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0541", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0584", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0578", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "### *Detect date*:\n01/08/2019\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:\n\n### *Affected products*:\nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2019 \nWindows 10 for 32-bit Systems \nWindows Server, version 1803 (Server Core Installation) \nMicrosoft Office 2019 for 64-bit editions \nInternet Explorer 9 \nWindows 10 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows Server 2016 (Server Core installation) \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 8.1 for 32-bit systems \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 8.1 for x64-based systems \nWindows Server 2012 \nMicrosoft Office 2010 Service Pack 2 (32-bit editions) \nOffice 365 ProPlus for 64-bit Systems \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2013 RT Service Pack 1 \nInternet Explorer 11 \nMicrosoft Office 2010 Service Pack 2 (64-bit editions) \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows 10 Version 1803 for ARM64-based Systems \nOffice 365 ProPlus for 32-bit Systems \nWindows Server 2016 \nWindows 10 Version 1709 for x64-based Systems \nWindows RT 8.1 \nWindows Server 2008 for Itanium-Based Systems Service Pack 2 \nWindows 10 Version 1703 for x64-based Systems \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1709 for ARM64-based Systems \nWindows 10 Version 1809 for ARM64-based Systems \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1 \nWindows Server 2019 (Server Core installation) \nMicrosoft Office Word Viewer \nMicrosoft Office 2016 (32-bit edition) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows 10 Version 1803 for x64-based Systems \nMicrosoft Office 2019 for 32-bit editions \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nMicrosoft Excel Viewer 2007 Service Pack 3 \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows Server, version 1709 (Server Core Installation) \nMicrosoft Office 2016 (64-bit edition) \nWindows 10 Version 1607 for x64-based Systems \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 Version 1709 for 32-bit Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 10 Version 1703 for 32-bit Systems \nInternet Explorer 10 \nWindows Server 2012 R2 \nWindows 10 Version 1803 for 32-bit Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2019-0538](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0538>) \n[CVE-2019-0543](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0543>) \n[CVE-2019-0536](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0536>) \n[CVE-2019-0554](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0554>) \n[CVE-2019-0569](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0569>) \n[CVE-2019-0579](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0579>) \n[CVE-2019-0578](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0578>) \n[CVE-2019-0584](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0584>) \n[CVE-2019-0549](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0549>) \n[CVE-2019-0582](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0582>) \n[CVE-2019-0583](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0583>) \n[CVE-2019-0580](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0580>) \n[CVE-2019-0581](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0581>) \n[CVE-2019-0577](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0577>) \n[CVE-2019-0576](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0576>) \n[CVE-2019-0575](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0575>) \n[CVE-2019-0541](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2019-0541>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Internet Explorer](<https://threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/>)\n\n### *CVE-IDS*:\n[CVE-2019-0549](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0549>)0.0Unknown \n[CVE-2019-0583](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0583>)0.0Unknown \n[CVE-2019-0543](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0543>)0.0Unknown \n[CVE-2019-0580](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0580>)0.0Unknown \n[CVE-2019-0569](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0569>)0.0Unknown \n[CVE-2019-0577](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0577>)0.0Unknown \n[CVE-2019-0554](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0554>)0.0Unknown \n[CVE-2019-0581](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0581>)0.0Unknown \n[CVE-2019-0582](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0582>)0.0Unknown \n[CVE-2019-0579](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0579>)0.0Unknown \n[CVE-2019-0536](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0536>)0.0Unknown \n[CVE-2019-0578](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0578>)0.0Unknown \n[CVE-2019-0584](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0584>)0.0Unknown \n[CVE-2019-0538](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0538>)0.0Unknown \n[CVE-2019-0576](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0576>)0.0Unknown \n[CVE-2019-0575](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0575>)0.0Unknown \n[CVE-2019-0541](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0541>)0.0Unknown\n\n### *KB list*:\n[4480960](<http://support.microsoft.com/kb/4480960>) \n[4480968](<http://support.microsoft.com/kb/4480968>) \n[4480957](<http://support.microsoft.com/kb/4480957>) \n[4480970](<http://support.microsoft.com/kb/4480970>) \n[4480965](<http://support.microsoft.com/kb/4480965>)\n\n### *Microsoft official advisories*:", "edition": 1, "modified": "2020-07-22T00:00:00", "published": "2019-01-08T00:00:00", "id": "KLA11881", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11881", "title": "\r KLA11881Multiple vulnerabilities in Microsoft Products (ESU) ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:59:44", "bulletinFamily": "info", "cvelist": ["CVE-2019-0583", "CVE-2019-0577", "CVE-2019-0582", "CVE-2019-0554", "CVE-2019-0571", "CVE-2019-0573", "CVE-2019-0549", "CVE-2019-0579", "CVE-2019-0551", "CVE-2019-0550", "CVE-2019-0584", "CVE-2019-0575", "CVE-2019-0543", "CVE-2019-0574", "CVE-2019-0578", "CVE-2019-0572", "CVE-2019-0552", "CVE-2019-0538", "CVE-2019-0581", "CVE-2019-0536", "CVE-2019-0553", "CVE-2019-0555", "CVE-2019-0547", "CVE-2019-0570", "CVE-2019-0576", "CVE-2019-0569", "CVE-2019-0580"], "description": "### *Detect date*:\n01/08/2019\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.\n\n### *Affected products*:\nWindows 10 for 32-bit Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows Server 2016 (Server Core installation) \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1709 for ARM64-based Systems \nWindows 10 Version 1803 for x64-based Systems \nWindows Server 2019 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server, version 1709 (Server Core Installation) \nWindows Server, version 1803 (Server Core Installation) \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 1703 for x64-based Systems \nWindows 10 Version 1709 for 32-bit Systems \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 1709 for 64-based Systems \nWindows Server 2019 (Server Core installation) \nWindows Server 2016 \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 1703 for 32-bit Systems \nWindows 8.1 for x64-based systems \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows RT 8.1 \nWindows Server 2008 for Itanium-Based Systems Service Pack 2 \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows 8.1 for 32-bit systems \nWindows Server 2012 \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 R2 \nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows Server 2012 (Server Core installation)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2019-0572](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0572>) \n[CVE-2019-0549](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0549>) \n[CVE-2019-0570](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0570>) \n[CVE-2019-0583](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0583>) \n[CVE-2019-0555](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0555>) \n[CVE-2019-0543](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543>) \n[CVE-2019-0580](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0580>) \n[CVE-2019-0571](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0571>) \n[CVE-2019-0547](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0547>) \n[CVE-2019-0574](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0574>) \n[CVE-2019-0550](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0550>) \n[CVE-2019-0569](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0569>) \n[CVE-2019-0551](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0551>) \n[CVE-2019-0553](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0553>) \n[CVE-2019-0573](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0573>) \n[CVE-2019-0577](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0577>) \n[CVE-2019-0554](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0554>) \n[CVE-2019-0581](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0581>) \n[CVE-2019-0582](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0582>) \n[CVE-2019-0579](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0579>) \n[CVE-2019-0536](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0536>) \n[CVE-2019-0578](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0578>) \n[CVE-2019-0584](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0584>) \n[CVE-2019-0552](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0552>) \n[CVE-2019-0538](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0538>) \n[CVE-2019-0576](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0576>) \n[CVE-2019-0575](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0575>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2019-0572](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0572>)0.0Unknown \n[CVE-2019-0549](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0549>)0.0Unknown \n[CVE-2019-0570](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0570>)0.0Unknown \n[CVE-2019-0583](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0583>)0.0Unknown \n[CVE-2019-0555](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0555>)0.0Unknown \n[CVE-2019-0543](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0543>)0.0Unknown \n[CVE-2019-0580](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0580>)0.0Unknown \n[CVE-2019-0571](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0571>)0.0Unknown \n[CVE-2019-0547](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0547>)0.0Unknown \n[CVE-2019-0574](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0574>)0.0Unknown \n[CVE-2019-0550](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0550>)0.0Unknown \n[CVE-2019-0569](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0569>)0.0Unknown \n[CVE-2019-0551](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0551>)0.0Unknown \n[CVE-2019-0553](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0553>)0.0Unknown \n[CVE-2019-0573](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0573>)0.0Unknown \n[CVE-2019-0577](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0577>)0.0Unknown \n[CVE-2019-0554](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0554>)0.0Unknown \n[CVE-2019-0581](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0581>)0.0Unknown \n[CVE-2019-0582](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0582>)0.0Unknown \n[CVE-2019-0579](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0579>)0.0Unknown \n[CVE-2019-0536](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0536>)0.0Unknown \n[CVE-2019-0578](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0578>)0.0Unknown \n[CVE-2019-0584](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0584>)0.0Unknown \n[CVE-2019-0552](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0552>)0.0Unknown \n[CVE-2019-0538](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0538>)0.0Unknown \n[CVE-2019-0576](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0576>)0.0Unknown \n[CVE-2019-0575](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0575>)0.0Unknown\n\n### *KB list*:\n[4480978](<http://support.microsoft.com/kb/4480978>) \n[4480962](<http://support.microsoft.com/kb/4480962>) \n[4480966](<http://support.microsoft.com/kb/4480966>) \n[4480116](<http://support.microsoft.com/kb/4480116>) \n[4480961](<http://support.microsoft.com/kb/4480961>) \n[4480973](<http://support.microsoft.com/kb/4480973>) \n[4480963](<http://support.microsoft.com/kb/4480963>) \n[4480964](<http://support.microsoft.com/kb/4480964>) \n[4480972](<http://support.microsoft.com/kb/4480972>) \n[4480975](<http://support.microsoft.com/kb/4480975>) \n[4487020](<http://support.microsoft.com/kb/4487020>) \n[4487017](<http://support.microsoft.com/kb/4487017>) \n[4486996](<http://support.microsoft.com/kb/4486996>) \n[4487026](<http://support.microsoft.com/kb/4487026>) \n[4487025](<http://support.microsoft.com/kb/4487025>) \n[4487044](<http://support.microsoft.com/kb/4487044>) \n[4487018](<http://support.microsoft.com/kb/4487018>) \n[4487028](<http://support.microsoft.com/kb/4487028>) \n[4487000](<http://support.microsoft.com/kb/4487000>) \n[4486993](<http://support.microsoft.com/kb/4486993>)\n\n### *Microsoft official advisories*:\n\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 9, "modified": "2020-07-22T00:00:00", "published": "2019-01-08T00:00:00", "id": "KLA11394", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11394", "title": "\r KLA11394Multiple vulnerabilities in Microsoft Windows ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2020-10-03T13:38:36", "description": "An elevation of privilege exists in Windows COM Desktop Broker, aka \"Windows COM Elevation of Privilege Vulnerability.\" This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.", "edition": 4, "cvss3": {"exploitabilityScore": 2.0, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 6.0}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0552", "type": "cve", "cwe": ["CWE-863"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0552"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2019-0552", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0552", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka \"Windows Runtime Elevation of Privilege Vulnerability.\" This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0570", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0570"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2019-0570", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0570", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka \"Jet Database Engine Remote Code Execution Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0575", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0575"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0575", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0575", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka \"Jet Database Engine Remote Code Execution Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0579", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0579"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0579", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0579", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka \"Jet Database Engine Remote Code Execution Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0576", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0576"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0576", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0576", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka \"Jet Database Engine Remote Code Execution Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0583, CVE-2019-0584.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0582", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0582"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0582", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0582", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka \"Jet Database Engine Remote Code Execution Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0538", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0538"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0538", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0538", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka \"Windows Kernel Information Disclosure Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0549, CVE-2019-0569.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0554", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0554"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0554", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0554", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka \"Jet Database Engine Remote Code Execution Vulnerability.\" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0577", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0577"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2008:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-"], "id": "CVE-2019-0577", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0577", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:38:36", "description": "An elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser, aka \"Microsoft XmlDocument Elevation of Privilege Vulnerability.\" This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.", "edition": 4, "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 6.0}, "published": "2019-01-08T21:29:00", "title": "CVE-2019-0555", "type": "cve", "cwe": ["CWE-862"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.4, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-0555"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1803", "cpe:/o:microsoft:windows_10:1703", "cpe:/o:microsoft:windows_server_2016:1803", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2016:1709", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1709", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_server_2016:-"], "id": "CVE-2019-0555", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0555", "cvss": {"score": 4.4, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}], "talosblog": [{"lastseen": "2019-01-16T10:42:39", "bulletinFamily": "blog", "cvelist": ["CVE-2019-0536", "CVE-2019-0537", "CVE-2019-0538", "CVE-2019-0539", "CVE-2019-0541", "CVE-2019-0542", "CVE-2019-0543", "CVE-2019-0545", "CVE-2019-0546", "CVE-2019-0547", "CVE-2019-0548", "CVE-2019-0549", "CVE-2019-0550", "CVE-2019-0551", "CVE-2019-0552", "CVE-2019-0553", "CVE-2019-0554", "CVE-2019-0555", "CVE-2019-0556", "CVE-2019-0557", "CVE-2019-0558", "CVE-2019-0559", "CVE-2019-0560", "CVE-2019-0561", "CVE-2019-0562", "CVE-2019-0564", "CVE-2019-0565", "CVE-2019-0566", "CVE-2019-0567", "CVE-2019-0568", "CVE-2019-0569", "CVE-2019-0570", "CVE-2019-0571", "CVE-2019-0572", "CVE-2019-0573", "CVE-2019-0574", "CVE-2019-0575", "CVE-2019-0576", "CVE-2019-0577", "CVE-2019-0578", "CVE-2019-0579", "CVE-2019-0580", "CVE-2019-0581", "CVE-2019-0582", "CVE-2019-0583", "CVE-2019-0584", "CVE-2019-0585", "CVE-2019-0586", "CVE-2019-0588"], "description": "[](<http://2.bp.blogspot.com/-ANFCKlpBiis/XDT4w08wP6I/AAAAAAAAFEg/aBxDQqabS3sVdRQE2DZDBJnMFcZIxf7hgCK4BGAYYCw/s1600/recurring%2Bblog%2Bimages_patch%2Btuesday.jpg>)\n\n \nMicrosoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, seven of which are rated \u201ccritical,\u201d 40 that are considered \u201cimportant\u201d and one that is \u201cmoderate.\u201d This release also includes a critical security advisory for multiple bugs in Adobe Flash Player. \n \nThis month\u2019s security update covers security issues in a variety of Microsoft\u2019s products, including the Jet Database Engine, Office SharePoint and the Chakra Scripting Engine. For coverage of these vulnerabilities, read the SNORT\u24c7 blog post [here](<https://blog.snort.org/2019/01/snort-rule-update-for-jan-8-2019.html>). \n\n\n### Critical vulnerabilities\n\n \nMicrosoft disclosed seven critical vulnerabilities this month, which we will highlight below. \n \n[CVE-2019-0550](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0550>) and [CVE-2019-0551](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0551>) are remote code execution vulnerabilities in Windows Hyper-V, a native hypervisor that can create virtual machines. These bugs exist due to the way a host server fails to properly validate input from an authenticated user on a guest operating system. An attacker could exploit these vulnerabilities by running a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. \n \n[CVE-2019-0539](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0539>), [CVE-2019-0567](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0567>) and [CVE-2019-0568](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0568>) are memory corruption vulnerabilities in the way the Chakra Scripting Engine handles objects in memory on the Microsoft Edge web browser. An attacker could corrupt memory in a way that would allow them to execute code in the context of the current user. In order to trigger this vulnerability, a user would have to visit a specially crafted, malicious web page in Edge. \n \n[CVE-2019-0547](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0547>) is a memory corruption vulnerability in the Windows DHCP client that exists when an attacker sends specially crafted DHCP responses to a client. An attacker could gain the ability to run arbitrary code on the client machine if they successfully exploit this vulnerability. \n \n[CVE-2019-0565](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0565>) is a memory corruption vulnerability in Microsoft Edge that occurs when the web browser improperly handles objects in memory. An attacker could corrupt memory in a way that would allow them to execute arbitrary code in the context of the current user. A user would trigger this vulnerability if they visited a specially crafted, malicious web page in Edge. \n\n\n### Important vulnerabilities\n\nThis release also contains 40 important vulnerabilities, four of which we will highlight below. \n \n[CVE-2019-0555](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0555>) is an escalation of privilege vulnerability in the Microsoft XmlDocument class that could allow an attacker to escape the AppContainer sandbox. An attacker could exploit this flaw to gain elevated privileges and break out of the Microsoft Edge AppContainer sandbox. While this vulnerability does not allow arbitrary code to run explicitly, it could be combined with other vulnerabilities to take advantage fo the elevated privileges while running. \n \n[CVE-2019-0572](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0572>), [CVE-2019-0573](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0573>) and [CVE-2019-0574](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0574>) are elevation of privilege vulnerabilities in Windows Data Sharing that lie in the way the service improperly handles file operations. An attacker could exploit this vulnerability by running a specially crafted application to gain the ability to run processes in an elevated context. \n \n\n\n * [CVE-2019-0536](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0536>)\n * [CVE-2019-0537](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0537>)\n * [CVE-2019-0538](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0538>)\n * [CVE-2019-0541](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541>)\n * [CVE-2019-0542](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0542>)\n * [CVE-2019-0543](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0543>)\n * [CVE-2019-0545](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0545>)\n * [CVE-2019-0548](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0548>)\n * [CVE-2019-0549](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0549>)\n * [CVE-2019-0552](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0552>)\n * [CVE-2019-0553](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0553>)\n * [CVE-2019-0554](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0554>)\n * [CVE-2019-0556](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0556>)\n * [CVE-2019-0557](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0557>)\n * [CVE-2019-0558](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0558>)\n * [CVE-2019-0559](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0559>)\n * [CVE-2019-0560](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0560>)\n * [CVE-2019-0561](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0561>)\n * [CVE-2019-0562](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0562>)\n * [CVE-2019-0564](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0564>)\n * [CVE-2019-0566](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0566>)\n * [CVE-2019-0569](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0570>)\n * [CVE-2019-0570](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0570>)\n * [CVE-2019-0571](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0571>)\n * [CVE-2019-0575](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0575>)\n * [CVE-2019-0576](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0576>)\n * [CVE-2019-0577](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0577>)\n * [CVE-2019-0578](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0578>)\n * [CVE-2019-0579](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0579>)\n * [CVE-2019-0580](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0580>)\n * [CVE-2019-0581](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0581>)\n * [CVE-2019-0582](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0582>)\n * [CVE-2019-0583](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0583>)\n * [CVE-2019-0584](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0584>)\n * [CVE-2019-0585](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0585>)\n * [CVE-2019-0586](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0586>)\n * [CVE-2019-0588](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0588>)\n \n\n\n### Moderate\n\nThe only moderate vulnerability in this release is [CVE-2019-0546](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0546>), a remote code execution vulnerability in Microsoft Visual Studio. \n\n\n### Coverage \n\nIn response to these vulnerability disclosures, Talos is releasing the following SNORT\u24c7 rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org. \n \nSnort rules: 48768 - 48770, 48773 - 48780, 48783, 48787 - 48790, 48793 - 48795, 48798, 48807 - 48810, 48876 \n\n\n \n\n\n", "modified": "2019-01-08T20:24:36", "published": "2019-01-08T11:40:00", "id": "TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F", "href": "http://feedproxy.google.com/~r/feedburner/Talos/~3/ytwyhglUyOk/microsoft-patch-tuesday-january-2019.html", "type": "talosblog", "title": "Microsoft Patch Tuesday \u2014 January 2019: Vulnerability disclosures and Snort coverage", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "symantec": [{"lastseen": "2019-01-09T01:37:07", "bulletinFamily": "software", "cvelist": ["CVE-2019-0552"], "description": "### Description\n\nMicrosoft Windows is prone to a local privilege-escalation vulnerability. An attackers may exploit this issue to gain elevated privileges.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nTo exploit this vulnerability, an attacker requires local access to an affected computer. Grant local access for trusted and accountable users only.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106407", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106407", "type": "symantec", "title": "Microsoft Windows COM CVE-2019-0552 Local Privilege Escalation Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:04", "bulletinFamily": "software", "cvelist": ["CVE-2019-0555"], "description": "### Description\n\nMicrosoft Windows is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nTo exploit this vulnerability, an attacker requires local access to an affected computer. Grant local access for trusted and accountable users only. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106395", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106395", "type": "symantec", "title": "Microsoft Windows CVE-2019-0555 Local Privilege Escalation Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:04", "bulletinFamily": "software", "cvelist": ["CVE-2019-0570"], "description": "### Description\n\nMicrosoft Windows is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges in the context of the affected system.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nEnsure that only trusted users have local, interactive access to affected computers.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106415", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106415", "type": "symantec", "title": "Microsoft Windows Runtime CVE-2019-0570 Local Privilege Escalation Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:07", "bulletinFamily": "software", "cvelist": ["CVE-2019-0545"], "description": "### Description\n\nMicrosoft ASP.NET Core is prone to an information disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks.\n\n### Technologies Affected\n\n * Microsoft .NET Core 2.1 \n * Microsoft .NET Core 2.2 \n * Microsoft .NET Core 2.3 \n * Microsoft .NET Framework 2.0 \n * Microsoft .NET Framework 3.0 \n * Microsoft .NET Framework 3.5 \n * Microsoft .NET Framework 3.5.1 \n * Microsoft .NET Framework 4.5.2 \n * Microsoft .NET Framework 4.6 \n * Microsoft .NET Framework 4.6.2 \n * Microsoft .NET Framework 4.7 \n * Microsoft .NET Framework 4.7.1 \n * Microsoft .NET Framework 4.7.2 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106405", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106405", "type": "symantec", "title": "Microsoft ASP.NET Core CVE-2019-0545 Information Disclosure Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:03", "bulletinFamily": "software", "cvelist": ["CVE-2019-0554"], "description": "### Description\n\nMicrosoft Windows is prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information that may lead to further attacks.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for Itanium-based Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nEnsure that only trusted users have local, interactive access to affected computers.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106411", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106411", "type": "symantec", "title": "Microsoft Windows Kernel CVE-2019-0554 Local Information Disclosure Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:08", "bulletinFamily": "software", "cvelist": ["CVE-2019-0536"], "description": "### Description\n\nMicrosoft Windows is prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information that may lead to further attacks.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for Itanium-based Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nEnsure that only trusted users have local, interactive access to affected computers.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106406", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106406", "type": "symantec", "title": "Microsoft Windows Kernel CVE-2019-0536 Local Information Disclosure Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:07", "bulletinFamily": "software", "cvelist": ["CVE-2019-0569"], "description": "### Description\n\nMicrosoft Windows is prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information that may lead to further attacks.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for Itanium-based Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nEnsure that only trusted users have local, interactive access to affected computers.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106414", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106414", "type": "symantec", "title": "Microsoft Windows Kernel CVE-2019-0569 Local Information Disclosure Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T15:34:57", "bulletinFamily": "software", "cvelist": ["CVE-2019-0541"], "description": "### Description\n\nMicrosoft Internet Explorer is prone to a remote code-execution vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Failed exploit attempts may result in a denial of service condition.\n\n### Technologies Affected\n\n * Microsoft Excel Viewer 2007 Service Pack 3 \n * Microsoft Internet Explorer 10 \n * Microsoft Internet Explorer 11 \n * Microsoft Office 2010 Service Pack 2 (32-bit editions) \n * Microsoft Office 2010 Service Pack 2 (64-bit editions) \n * Microsoft Office 2013 RT Service Pack 1 \n * Microsoft Office 2013 Service Pack 1 (32-bit editions) \n * Microsoft Office 2013 Service Pack 1 (64-bit editions) \n * Microsoft Office 2016 (32-bit edition) \n * Microsoft Office 2016 (64-bit edition) \n * Microsoft Office 2019 for 32-bit editions \n * Microsoft Office 2019 for 64-bit editions \n * Microsoft Office 365 ProPlus for 32-bit Systems \n * Microsoft Office 365 ProPlus for 64-bit Systems \n * Microsoft Office Word Viewer \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits\n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo reduce the likelihood of successful exploits, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Implement multiple redundant layers of security.** \nSince this issue may be leveraged to execute code, we recommend memory-protection schemes, such as nonexecutable stack/heap configurations and randomly mapped memory segments. This tactic may complicate exploits of memory-corruption vulnerabilities.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106402", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106402", "type": "symantec", "title": "Microsoft Internet Explorer CVE-2019-0541 Remote Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:09", "bulletinFamily": "software", "cvelist": ["CVE-2019-0579"], "description": "### Description\n\nMicrosoft Windows JET Database Engine is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of an affected system.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for Itanium-based Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Implement multiple redundant layers of security.** \nMemory-protection schemes (such as nonexecutable stack and heap configurations and randomly mapped memory segments) will complicate exploits of memory-corruption vulnerabilities.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106425", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106425", "type": "symantec", "title": "Microsoft Windows JET Database Engine CVE-2019-0579 Remote Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-01-09T01:37:04", "bulletinFamily": "software", "cvelist": ["CVE-2019-0576"], "description": "### Description\n\nMicrosoft Windows JET Database Engine is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of an affected system.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1709 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for ARM64-based Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 Version 1809 for 32-bit Systems \n * Microsoft Windows 10 Version 1809 for ARM64-based Systems \n * Microsoft Windows 10 Version 1809 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for Itanium-based Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Microsoft Windows Server 2019 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Implement multiple redundant layers of security.** \nMemory-protection schemes (such as nonexecutable stack and heap configurations and randomly mapped memory segments) will complicate exploits of memory-corruption vulnerabilities.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2019-01-08T00:00:00", "published": "2019-01-08T00:00:00", "id": "SMNTC-106422", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/106422", "type": "symantec", "title": "Microsoft Windows JET Database Engine CVE-2019-0576 Remote Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}], "f5": [{"lastseen": "2020-04-06T22:40:24", "bulletinFamily": "software", "cvelist": ["CVE-2018-3639"], "description": "\nF5 Product Development has assigned IDs 721319, 721555, and 721556 (BIG-IP), ID 721949 (BIG-IQ), ID 721945 (Enterprise Manager), and CPF-24903 and CPF-24904 (Traffix) to this vulnerability.\n\nTo determine if your product and version have been evaluated for this vulnerability, refer to the **Applies to (see versions)** box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>).\n\nProduct | Branch | Versions known to be vulnerable | Fixes introduced in | Severity | CVSSv3 score1 | Vulnerable component or feature \n---|---|---|---|---|---|--- \nBIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) | 14.x | 14.0.0 - 14.1.0 | None | Medium | [5.6](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N>) | F5 hardware platforms* \n13.x | 13.0.0 - 13.1.1 | None \n12.x | 12.1.0 - 12.1.4 | None \n11.x | 11.2.1 - 11.6.3 | None \nARX | 6.x | None | Not applicable | Not vulnerable | None | None \nEnterprise Manager | 3.x | 3.1.1 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \nBIG-IQ Centralized Management | 6.x | 6.0.0 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \n5.x | 5.0.0 - 5.4.0 | None \n4.x | 4.6.0 | None \nBIG-IQ Cloud and Orchestration | 1.x | 1.0.0 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \nF5 iWorkflow | 2.x | 2.1.0 - 2.3.0 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \nTraffix SDC | 5.x | 5.0.0 - 5.1.0 | None | Medium | [5.6](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N>) | F5 hardware platforms* \n4.x | 4.4.0 | None \n \n1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.\n\n*For information about the affected hardware platforms, refer to the **Vulnerable platforms** section.\n\nVulnerable platforms\n\nSome platforms may have processors from multiple vendors and may have a vulnerable ARM processor in one or more subsystems. F5 investigated the use of ARM processors and, while vulnerable processors are used, those processors do not handle privileged information; they are limited to running signed firmware from F5 with no capability to execute user-specified code.\n\nThe following tables list only one entry for platform models that have several variants. For example, BIG-IP 11000, BIG-IP 11050, BIG-IP 11050F, and BIG-IP 11050N are all vulnerable and included in the table as \"BIG-IP 110x0.\" \n\nBIG-IP \n\nModel | Processor types | Vulnerable \n---|---|--- \nVIPRION B21x0 | Intel | Y \nVIPRION B2250 | Intel | Y \nVIPRION B4100 | AMD | Y* \nVIPRION B4200 | AMD | Y* \nVIPRION B43x0 | Intel | Y \nVIPRION B44x0 | Intel | Y \nBIG-IP 2xx0 | Intel | Y \nBIG-IP 4xx0 | Intel | Y \nBIG-IP 5xx0 | Intel | Y \nBIG-IP 7xx0 | Intel | Y \nBIG-IP 10xxx | Intel | Y \nBIG-IP 12xx0 | Intel | Y \nBIG-IP i2x00 | Intel, ARM | Y \nBIG-IP i4x00 | Intel, ARM | Y \nBIG-IP i5x00 | Intel, ARM | Y \nBIG-IP i7x00 | Intel, ARM | Y \nBIG-IP i10x00 | Intel, ARM | Y \nBIG-IP 800 | Intel | Y \nBIG-IP 1600 | Intel | Y \nBIG-IP 3600 | Intel | Y \nBIG-IP 3900 | Intel | Y \nBIG-IP 6900 | AMD | Y* \nBIG-IP 89x0 | AMD | Y* \nBIG-IP 110x0 | AMD | Y* \nBIG-IP 6400 | AMD | Y* \n \n*F5 believes these platforms are vulnerable, but AMD has yet to confirm. AMD has not published plans to provide fixes for these CPUs.\n\nBIG-IQ, Enterprise Manager, FirePass, and ARX\n\nModel | Processor type | Vulnerable \n---|---|--- \nBIG-IQ 7000 | Intel | Y \nEnterprise Manager 4000 | Intel | Y \nFirePass 12xx | Intel | N \nFirePass 41xx | AMD | Y* \nFirePass 43xx | AMD | Y* \nARX 1500+ | Intel | Y \nARX 2500 | Intel | Y \nARX 4000/4000+ | Intel | Y \n \n*Intel and AMD have not responded to repeated requests for information about the processors in these platforms. Therefore, based on their general public statements, we must assume that they are vulnerable.\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Fixes introduced in** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nNone\n\n * [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>)\n * [K41942608: Overview of Security Advisory articles](<https://support.f5.com/csp/article/K41942608>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K9502: BIG-IP hotfix and point release matrix](<https://support.f5.com/csp/article/K9502>)\n * [K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM systems (11.4.x and later)](<https://support.f5.com/csp/article/K48955220>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>)\n", "edition": 1, "modified": "2019-07-01T18:29:00", "published": "2018-07-10T21:22:00", "id": "F5:K29146534", "href": "https://support.f5.com/csp/article/K29146534", "title": "SSB Variant 4 vulnerability CVE-2018-3639", "type": "f5", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "citrix": [{"lastseen": "2020-12-24T11:42:50", "bulletinFamily": "software", "cvelist": ["CVE-2018-3639"], "description": "<section class=\"article-content\" data-swapid=\"ArticleContent\">\n<div class=\"content-block\" data-swapid=\"ContentBlock\"><div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"DescriptionofProblem\"> Description of Problem</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<p>CVE-2018-3639 Speculative Store Bypass Disable is an issue that may affect third-party software that runs in guest VMs on Citrix XenServer. This is not an issue caused by Citrix XenServer and Citrix is unaware of any means of exploiting this issue against XenServer itself.<br/> Third-party software can mitigate this issue by restructuring of the code; for Intel CPUs, third-party software may instead choose to mitigate this issue by selectively enabling and disabling a CPU feature known as memory disambiguation. This requires both new host firmware and the new functionality of that firmware to be exposed to guest VMs. To expose this firmware functionality, Citrix is releasing hotfixes for supported versions of Citrix XenServer 7.x.<br/> </p>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"WhatCustomersShouldDo\"> What Customers Should Do</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<p>Customers wishing to expose the new host firmware functionality to their guest VMs should install both the Citrix XenServer hotfixes and updated host firmware or BIOS code. The locations of the Citrix XenServer hotfixes are listed below; Citrix recommends following your hardware supplier\u2019s guidance for firmware updates.</p>\n<p>Citrix XenServer 7.4: CTX235133 \u2013 <a href=\"https://support.citrix.com/article/CTX235133\">https://support.citrix.com/article/CTX235133</a></p>\n<p>Citrix XenServer 7.3: CTX235132 \u2013 <a href=\"https://support.citrix.com/article/CTX235132\">https://support.citrix.com/article/CTX235132</a></p>\n<p>Citrix XenServer 7.1 LTSR CU1: CTX235131 \u2013 <a href=\"https://support.citrix.com/article/CTX235131\">https://support.citrix.com/article/CTX235131</a></p>\n<p>Citrix XenServer 7.0: CTX235130 \u2013 <a href=\"https://support.citrix.com/article/CTX235130\">https://support.citrix.com/article/CTX235130</a><br/> </p>\n<p>Note that, in line with previous issues that were not vulnerabilities in Citrix XenServer, mitigations are not available for versions 6.x of Citrix XenServer.<br/> </p>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"WhatCitrixIsDoing\"> What Citrix Is Doing</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=\"http://support.citrix.com/\">http://support.citrix.com/</a></u>.</p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"ObtainingSupportonThisIssue\"> Obtaining Support on This Issue</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=\"https://www.citrix.com/support/open-a-support-case.html\">https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"ReportingSecurityVulnerabilities\"> Reporting Security Vulnerabilities</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 \u2013 <a href=\"http://support.citrix.com/article/CTX081743\">Reporting Security Issues to Citrix</a></p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"Changelog\"> Changelog</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<table border=\"1\" cellpadding=\"1\" cellspacing=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td>Date </td>\n<td>Change</td>\n</tr>\n<tr>\n<td>22nd May 2018</td>\n<td>Initial Publication</td>\n</tr>\n</tbody>\n</table>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n</div></div>\n</section>", "modified": "2019-08-15T04:00:00", "published": "2018-05-22T04:00:00", "id": "CTX235225", "href": "https://support.citrix.com/article/CTX235225", "type": "citrix", "title": "CVE-2018-3639 - Citrix XenServer Security Update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "virtuozzo": [{"lastseen": "2019-11-05T11:28:22", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab130.1 for Virtuozzo 6.0 that is a rebase to the Red Hat Enterprise Linux 6.9 kernel 2.6.32-696.30.1.el6. The new kernel introduces security and stability fixes.\n**Vulnerability id:** CVE-2018-3639\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n", "edition": 1, "modified": "2018-05-23T00:00:00", "published": "2018-05-23T00:00:00", "id": "VZA-2018-033", "href": "https://help.virtuozzo.com/customer/portal/articles/2940774", "title": "Important kernel security update: CVE-2018-3639; new kernel 2.6.32-042stab130.1; Virtuozzo 6.0 Update 12 Hotfix 25 (6.0.12-3705)", "type": "virtuozzo", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-05T11:27:58", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab130.1 for Virtuozzo Containers for Linux 4.7 and Server Bare Metal 5.0 that is a rebase to the Red Hat Enterprise Linux 6.9 kernel 2.6.32-696.30.1.el6. The new kernel introduces security and stability fixes.\n**Vulnerability id:** CVE-2018-3639\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n", "edition": 1, "modified": "2018-05-23T00:00:00", "published": "2018-05-23T00:00:00", "id": "VZA-2018-032", "href": "https://help.virtuozzo.com/customer/portal/articles/2940773", "title": "Important kernel security update: CVE-2018-3639; new kernel 2.6.32-042stab130.1 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0", "type": "virtuozzo", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-05T11:27:54", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1087", "CVE-2018-3639"], "description": "This hotfix provides security fixes for the hypervisor part of Virtuozzo 6.0 Update 12.\n**Vulnerability id:** CVE-2018-1087\nA flaw was found in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.\n\n**Vulnerability id:** CVE-2018-3639\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n", "edition": 1, "modified": "2018-05-28T00:00:00", "published": "2018-05-28T00:00:00", "id": "VZA-2018-034", "href": "https://help.virtuozzo.com/customer/portal/articles/2941425", "title": "Important product update: Fixes for CVE-2018-3639 and CVE-2018-1087 in virtual machines; Virtuozzo 6.0 Update 12 Hotfix 26 (6.0.12-3707)", "type": "virtuozzo", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-05T11:27:51", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1120", "CVE-2018-10872", "CVE-2018-3665", "CVE-2018-8897", "CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab132.1 for Virtuozzo 6.0 that is a rebase to the Red Hat Enterprise Linux 6.10 kernel 2.6.32-754.2.1.el6. The new kernel introduces security fixes.\n**Vulnerability id:** CVE-2018-3639\n[x86 AMD] An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n**Vulnerability id:** CVE-2018-1120\nBy mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).\n\n**Vulnerability id:** CVE-2018-3665\nA Floating Point Unit (FPU) state information leakage flaw was found in the way the Linux kernel saved and restored the FPU state during task switch. Linux kernels that follow the 'Lazy FPU Restore' scheme are vulnerable to the FPU state information leakage issue. An unprivileged local attacker could use this flaw to read FPU state bits by conducting targeted cache side-channel attacks, similar to the Meltdown vulnerability disclosed earlier this year.\n\n**Vulnerability id:** CVE-2018-10872\nA flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897.\n\n", "edition": 1, "modified": "2018-07-16T00:00:00", "published": "2018-07-16T00:00:00", "id": "VZA-2018-048", "href": "https://help.virtuozzo.com/customer/portal/articles/2948376", "title": "Important kernel security update: CVE-2018-3639 (x86 AMD) and other issues; new kernel 2.6.32-042stab132.1; Virtuozzo 6.0 Update 12 Hotfix 29 (6.0.12-3710)", "type": "virtuozzo", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2020-08-07T11:48:30", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0576"], "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.\n\nAn attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.\n\nThe update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0576", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0576", "published": "2019-01-08T08:00:00", "title": "Jet Database Engine Remote Code Execution Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-07T11:48:23", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0579"], "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.\n\nAn attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.\n\nThe update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0579", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0579", "published": "2019-01-08T08:00:00", "title": "Jet Database Engine Remote Code Execution Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-07T11:48:23", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0552"], "description": "An elevation of privilege exists in Windows COM Desktop Broker. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.\n\nTo exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.\n\nThe update addresses the vulnerability by correcting how Windows COM Desktop Broker processes interface requests.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0552", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0552", "published": "2019-01-08T08:00:00", "title": "Windows COM Elevation of Privilege Vulnerability", "type": "mscve", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-07T11:45:33", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0575"], "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.\n\nAn attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.\n\nThe update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0575", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0575", "published": "2019-01-08T08:00:00", "title": "Jet Database Engine Remote Code Execution Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-07T11:48:32", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0570"], "description": "An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.\n\nAn attacker could exploit this vulnerability by running a specially crafted application on the victim system.\n\nThe update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0570", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0570", "published": "2019-01-08T08:00:00", "title": "Windows Runtime Elevation of Privilege Vulnerability", "type": "mscve", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-07T11:48:29", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0577"], "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.\n\nAn attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.\n\nThe update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0577", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0577", "published": "2019-01-08T08:00:00", "title": "Jet Database Engine Remote Code Execution Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-07T11:45:30", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0580"], "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.\n\nAn attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.\n\nThe update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0580", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0580", "published": "2019-01-08T08:00:00", "title": "Jet Database Engine Remote Code Execution Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-07T11:48:17", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0536"], "description": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user\u2019s system.\n\nTo exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.\n\nThe update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0536", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0536", "published": "2019-01-08T08:00:00", "title": "Windows Kernel Information Disclosure Vulnerability", "type": "mscve", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-08-07T11:48:30", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0538"], "description": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.\n\nAn attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.\n\nThe update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.\n", "edition": 2, "modified": "2019-02-12T08:00:00", "id": "MS:CVE-2019-0538", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0538", "published": "2019-02-12T08:00:00", "title": "Jet Database Engine Remote Code Execution Vulnerability", "type": "mscve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-07T11:48:23", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0569"], "description": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user\u2019s system.\n\nAn authenticated attacker could exploit this vulnerability by running a specially crafted application.\n\nThe update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.\n", "edition": 2, "modified": "2019-01-08T08:00:00", "id": "MS:CVE-2019-0569", "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0569", "published": "2019-01-08T08:00:00", "title": "Windows Kernel Information Disclosure Vulnerability", "type": "mscve", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}], "exploitdb": [{"lastseen": "2019-01-14T18:59:12", "description": "", "published": "2019-01-14T00:00:00", "type": "exploitdb", "title": "Microsoft Windows 10 - COM Desktop Broker Privilege Escalation", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-0552"], "modified": "2019-01-14T00:00:00", "id": "EDB-ID:46162", "href": "https://www.exploit-db.com/exploits/46162", "sourceData": "Windows: COM Desktop Broker Elevation of Privilege\r\nPlatform: Windows 10 1809 (almost certainly earlier versions as well).\r\nClass: Elevation of Privilege\r\nSecurity Boundary (per Windows Security Service Criteria): AppContainer Sandbox\r\n\r\nSummary: \r\n\r\nThe COM Desktop Broker doesn\u2019t correctly check permissions resulting in elevation of privilege and sandbox escape.\r\n\r\nDescription:\r\nWindows 10 introduced \u201cBrokered Windows Runtime Components for side-loaded applications\u201d which allows a UWP application to interact with privileged components by allowing developers to write a custom broker in .NET. Rather than handling this with the existing Runtime Broker a new \u201cDesktop Broker\u201d was created and plumbed into the COM infrastructure. This required changes in COMBASE to instantiate the broker class and RPCSS to control access to the broker.\r\n\r\nThe stated purpose is only for use by sideloaded enterprise applications, specifically .NET based ones. Looking at the checks in RPCSS for the activation of the broker we can see the check as follows:\r\n\r\nHRESULT IsSideLoadedPackage(LPCWSTR *package_name, bool *is_sideloaded) {\r\n PackageOrigin origin;\r\n *is_sideloaded = false;\r\n HRESULT hr = GetStagedPackageOrigin(package_name, &origin);\r\n if (FAILED(hr))\r\n return hr;\r\n \r\n *is_sideloaded = origin != PackageOrigin_Store;\r\n return S_OK;\r\n}\r\n\r\nThis check is interesting because it considered anything to be sideloaded that hasn\u2019t come from the Store. Looking at the PackageOrigin enumeration this includes Inbox applications such as Cortana and Edge both of which process potentially untrusted content from the network. Of course this isn\u2019t an issue if the broker is secure, but\u2026\r\n\r\nFor a start, as long as RPCSS thinks the current package is side-loaded this feature doesn\u2019t require any further capability to use, or at least nothing checks for one during the process. Even in the side loading case this isn\u2019t ideal, it means that even though a side loaded application is in the sandbox this would allow the application to escape without giving the installer of the application any notice that it has effectively full trust. Contrast this with Desktop Bridge UWP applications which require the \u201cfullTrust\u201d capability to invoke a Win32 application outside the sandbox. This is even more important for a sandbox escape from an Inbox application as you can\u2019t change the capabilities at all without having privileged access. Now, technically you\u2019re supposed to have the appropriate configuration inside the application\u2019s manifest to use this, but that only applies if you\u2019re activating through standard COM Runtime activation routes, instead you can just create an instance of the broker\u2019s class (which is stored in the registry, but at least seems to always be C8FFC414-946D-4E61-A302-9B9713F84448). This class is running in a DLL surrogate at normal user privileges. Therefore any issue with this interface is a sandbox escape. The call implements a single interface, IWinRTDesktopBroker, which looks like:\r\n\r\nclass IWinRTDesktopBroker : public IUnknown {\r\n HRESULT GetClassActivatorForApplication(HSTRING dir, IWinRTClassActivator** ppv);\r\n};\r\n\r\nThis interface has only one method, GetClassActivatorForApplication which takes the path to the brokered components directory. No verification of this directory takes place, it can be anywhere you specify. I\u2019d have assumed it might have at least been limited to a special subdirectory of the package installation, but I\u2019d clearly be wrong. Passing an arbitrary directory to this method, you get back the following interface:\r\n\r\nclass IWinRTClassActivator : public IUnknown {\r\n HRESULT ActivateInstance(HSTRING activatableClassId, IInspectable** ppv);\r\n HRESULT GetActivationFactory(HSTRING activatableClassId, REFIID riid, IUnknown** ppv);\r\n};\r\n\r\nSo to escape the sandbox with this you can create directory somewhere, copy in a WinRT component winmd file then activate it. The activation process will run class constructors and give you arbitrary code execution outside the sandbox. \r\n\r\nHowever, even if the directory was checked in some way as long as you can get back the IWinRTClassActivator interface you could still escape the sandbox as the object is actually an instance of the System.Runtime.InteropServices.WindowsRuntime.WinRTClassActivator class which is implemented by the .NET BCL. This means that it exposes a managed DCOM object to a low-privileged caller which is pretty simple to exploit using my old serialization attacks (e.g. MSRC case 37122). The funny thing is MSRC wrote a blog post [1] about not using Managed DCOM across security boundaries almost certainly before this code was implemented but clearly it wasn\u2019t understood.\r\n[1] https://blogs.technet.microsoft.com/srd/2014/10/14/more-details-about-cve-2014-4073-elevation-of-privilege-vulnerability/\r\n\r\nThere are some caveats, as far as I can tell you can\u2019t create this broker from an LPAC Edge content process, more because the connection to the broker fails rather than any activation permissions check. Therefore to exploit from Edge you\u2019d need to get into the MicrosoftEdge process (or another process outside of LPAC). This is left as an exercise for the reader.\r\n\r\nFixing wise, I\u2019d guess unless you\u2019re actually using this for Inbox applications at a minimum you probably should only Developer and LOB origins. Ideally you\u2019d probably want to require a capability for its use but the horse may have bolted on that one. Anyway you might not consider this an issue as it can\u2019t easily be used from LPAC and side-loading is an issue unto itself.\r\n\r\nProof of Concept:\r\n\r\nI\u2019ve provided a PoC as a solution containing the C# PoC and Brokered Component as well as a DLL which can be injected into Edge to demonstrate the issue. The PoC will inject the DLL into a running MicrosoftEdge process and run the attack. Note that the PoC needs to know the relative location of the ntdll!LdrpKnownDllDirectoryHandle symbol for x64 in order to work. It should be set up for the initial release of RS5 (17763.1) but if you need to run it on another machine you\u2019ll need to modify GetHandleAddress in the PoC to check the version string from NTDLL and return the appropriate location (you can get the offset in WinDBG using \u2018? ntdll!LdrpKnownDllDirectoryHandle-ntdll). Also before you ask, the injection isn\u2019t a CIG bypass you need to be able to create an image section from an arbitrary file to perform the injection which you can do inside a process running with CIG.\r\n\r\n1) Compile the solution in \u201cRelease\u201d mode for \u201cAny CPU\u201d. It\u2019ll need to pull NtApiDotNet from NuGet to build.\r\n2) Start a copy of Edge.\r\n3) Execute the PoC from the x64\\Release directory.\r\n\r\nExpected Result:\r\nCreating the broker fails.\r\n\r\nObserved Result:\r\nThe broker creation succeeds and notepad executes outside the sandbox.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46162.zip", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/46162"}, {"lastseen": "2019-01-16T16:58:23", "description": "", "published": "2019-01-16T00:00:00", "type": "exploitdb", "title": "Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-0570"], "modified": "2019-01-16T00:00:00", "id": "EDB-ID:46184", "href": "https://www.exploit-db.com/exploits/46184", "sourceData": "Windows: RestrictedErrorInfo Unmarshal Section Handle UAF EoP\r\nPlatform: Windows 10 1709/1809\r\nClass: Elevation of Privilege\r\nSecurity Boundary (per Windows Security Service Criteria): User boundary\r\n\r\nSummary:\r\nThe WinRT RestrictedErrorInfo doesn\u2019t correctly check the validity of a handle to a section object which results in closing an unrelated handle which can lead to EoP.\r\n\r\nDescription:\r\nThe RestrictedErrorInfo class is a COM object implemented internal to the COM runtime. It\u2019s used to pass structured error information across WinRT apartment and process boundaries. For that reason it supports a custom marshaling protocol and as it\u2019s part of the system infrastructure it also marked a system trusted marshaler. It can be sent to processes which explicitly prevent custom marshaling such as many system services as well as AppContainer processes. \r\n\r\nTo send larger amounts of information such as the stack trace (and perhaps for security reasons) the marshaler will insert the name of a section object as well as a handle to that object into the marshaled stream. As COM marshaling doesn\u2019t directly support passing handles, at least without additional help, the unmarshal code opens the client process and duplicates a SYNCHRONIZE only handle to the section into that process. The presumed idea behind passing this handle is it can be used to verify the section name is not some arbitrary section object. This validation takes place in the following code:\r\n\r\nHRESULT CRestrictedError::ValidateHandle(\r\n HANDLE hSection, const wchar_t *pszSectionName, unsigned int cchSectionName)\r\n{\r\n if ( !hSection && !*pszSectionName )\r\n return S_OK;\r\n ULONG length;\r\n NTSTATUS status = NtQueryObject(hSection, ObjectNameInformation, NULL, NULL, &length);\r\n if (status == STATUS_INFO_LENGTH_MISMATCH )\r\n {\r\n PUNICODE_STRING name = malloc(length);\r\n NtQueryObject(hSection, ObjectNameInformation, name, length, NULL);\r\n ULONG total_length = name->Length / 2;\r\n if (length < 60)\r\n return E_INVALID_ARG;\r\n LPWSTR str = name.Buffer[name->Length - 60 * 2];\r\n if (wmemcmp(L\"RestrictedErrorObject-\", str, 22))\r\n return E_INVALID_ARG;\r\n size_t name_length = wcslen(pszSectionName);\r\n if (wmemcmp(pszSectionName, str, name_length))\r\n return E_INVALID_ARG;\r\n return S_OK;\r\n }\r\n return E_ERROR;\r\n}\r\n\r\nValidateHandle takes the handle from the marshaled data and uses NtQueryObject to get its object name. This name, minus any leading name information is then compared against the passed in section name. If they\u2019re not equal then this function fails and the section information is ignored. There\u2019s two issues with this code, firstly it just checks the last 60 characters of the string matches \u201cRestrictedErrorObject-\u201d plus an arbitrary suffix. Secondly, and most importantly, it doesn\u2019t verify that the handle is a section object, it just verifies the name. \r\n\r\nThis might not be a major issue except that once the handle is validated the code assumes ownership of the handle. Therefore once the code is finished with the handle, which can be in the unmarshaler or when the RestrictedErrorInfo object is released, the handle will be closed. If the handle is set to a pre-existing handle inside the unmarshaling process, as long as it meets the name requirements the handle will be closed and the handle entry opened for reuse. This can lead to a UAF on an arbitrary handle.\r\n\r\nOne way of exploiting this would be to attack the BITS service which as demonstrated many times is a good privileged target for these sorts of attacks:\r\n\r\n1) Create a job writing a file to the path \u201cC:\\RestrictedErrorObject-PADDING\\OUTPUT.TXT\u201d. This results in BITS creating a temporary file \u201cC:\\RestrictedErrorObject-PADDING\\BITSXXXX.tmp\u201d. \r\n2) Start the job and stall the GET request for the HTTP data, this is easy to do by requesting BITS downloads a URL from localhost and setting up a simple HTTP server.\r\n3) BITS now has an open, writable handle to the temporary file which the last 60 characters is of the form \u201cRestrictedErrorObject-PADDING\\BITSXXXX.tmp\u201d.\r\n4 ) Marshal an error object, specifying the handle value for the temporary file (might have to brute force) and the section name using the name from 3. Send it to the BITS service using whatever mechanism is most appropriate. As the downloading is happening in a background thread the COM service is still accessible.\r\n5) The unmarshaler will verify the handle then close the handle. This results in the stalled download thread having a stale handle to the temporary file.\r\n6) Perform actions to replace the handle value with a different writable file, one which the user can\u2019t normally write to.\r\n7) Complete the GET request to unblock the download thread, the BITS service will now write arbitrary data to the handle. \r\n\r\nAs the download thread will close the arbitrary handle, instead of 6 and 7 you could replace the handle with some other resource such as a token object and then get a UAF on a completely arbitrary handle type leading to other ways of exploiting the same bug.\r\n\r\nFrom a fixing perspective you really should do a better job of verifying that the handle is a section object, although even that wouldn\u2019t be foolproof.\r\n\r\nProof of Concept:\r\n\r\nI\u2019ve provided a PoC as a C# project. Note that this doesn\u2019t do an end to end exploit, it just demonstrates the bug in the same process as it\u2019s a more reliable demonstration. This shouldn\u2019t be a problem but if you really can\u2019t see this is a security issue then\u2026 The PoC will create a file which will match the required naming pattern, then insert that into the marshaled data. The data will then be unmarshaled and the handle checked. Note that I release the COM object explicitly rather than waiting for the garbage collector as the handle is only released when the underlying COM object is released. For an attack on a native service this would not be necessary, but it\u2019s mostly a quirk of using C#.\r\n\r\n1) Compile the C# project. It will need to grab the NtApiDotNet from NuGet to work.\r\n2) Run the PoC.\r\n\r\nExpected Result:\r\nThe unmarshal process should fail, or the handle is valid after the unmarshal process.\r\n\r\nObserved Result:\r\nThe unmarshal process succeeds and the second call to obj.FullPath fails with an STATUS_INVALID_HANDLE error.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46184.zip", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/46184"}, {"lastseen": "2019-01-16T16:58:23", "description": "", "published": "2019-01-16T00:00:00", "type": "exploitdb", "title": "Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-0555"], "modified": "2019-01-16T00:00:00", "id": "EDB-ID:46185", "href": "https://www.exploit-db.com/exploits/46185", "sourceData": "Windows: XmlDocument Insecure Sharing Elevation of Privilege\r\nPlatform: Windows 10 1809 (almost certainly earlier versions as well).\r\nClass: Elevation of Privilege\r\nSecurity Boundary (per Windows Security Service Criteria): AppContainer Sandbox\r\n\r\nSummary: \r\n\r\nA number of Partial Trust Windows Runtime classes expose the XmlDocument class across process boundaries to less privileged callers which in its current form can be used to elevate privileges and escape the Edge Content LPAC sandbox.\r\n\r\nDescription:\r\n\r\nWhen an AppContainer sandboxed application creates a partial trust class it\u2019s instantiated inside a Runtime Broker running at the normal user privilege. While Windows.Data.Xml.Dom.XmlDocument is marked as Base Trust so would be instantiated inside the same process as the creator, there\u2019s a number of partial trust classes which expose a XmlDocument object.\r\n\r\nAn example of this is the ToastNotificationManager class which expose a XmlDocument through the GetTemplateContent static method. This is exposed to all normal AC and also has explicit permissions to allow lpacAppExperience capability to access it which all Edge Content LPAC processes have.\r\n\r\nThe problem with XmlDocument is it doesn\u2019t custom marshal the object over process boundaries, this means that the XmlDocument which is created by ToastNotificationManager stays in the Runtime Broker. If there\u2019s any security issues with the use of XmlDocument interface then that\u2019s a problem.\r\n\r\nLooking at the class it\u2019s implemented inside msxml6.dll and is basically a MSXML.DOMDocument.6.0 class in all but name. Checking what interfaces the class supports you find the following (partial list):\r\n\r\nIPersistMoniker\r\nIPersistStream\r\nIPersistStreamInit\r\nIServiceProvider\r\nIStream\r\nIXMLDOMDocument\r\nIXMLDOMDocument2\r\nIXMLDOMDocument3\r\nIXMLDOMNode\r\nWindows::Xml::Dom::IXmlDocument\r\nWindows::Xml::Dom::IXmlDocumentIO\r\nWindows::Xml::Dom::IXmlDocumentIO2\r\nWindows::Xml::Dom::IXmlNode\r\nWindows::Xml::Dom::IXmlNodeSelector\r\nWindows::Xml::Dom::IXmlNodeSerializer\r\n\r\nWhat sticks out is it supports IXMLDOMDocument* which is the normal MSXML interfaces. Even if the underlying implementation was based on the existing MSXML DOM Document I\u2019d have expected that creating this object as a runtime object would wrap the MSXML object and only expose those interfaces needed for its use as a runtime object. However, it exposes everything. \r\n\r\nPotential issues with this are:\r\nIPersistMoniker could be used to save to a file with normal user privileges.\r\nIXMLDOMDocument supports a save method which can do the same thing.\r\nYou can access the transformNode method to execute an XSLT template including arbitrary WSH script code (this is the _really_ bad one).\r\n\r\nSo the easiest way to escape the sandbox would be to execute the XSLT script. As the script is running in the Runtime Broker it runs with full user privileges and so can trivially escape the sandbox including the Edge Content LPAC sandbox.\r\n\r\nThe other classes which expose an XmlDocument:\r\n\r\nToastNotification via the get_Content method.\r\nBadgeUpdateManager via the GetTemplateContent method.\r\nTileFlyoutUpdateManager again via GetTemplateContent.\r\nTileUpdateManager...\r\n\r\nYou can work out the rest, I\u2019ve got better things to do.\r\n\r\nNote that I think even if you remove all non-runtime interfaces exposed from XmlDocument just the built in functionality might be dangerous. For example you can call XmlDocument::loadXML with the ResolveExternals load setting which would likely allow you to steal files from the local system (a local XXE attack basically). Also I\u2019m not entirely convinced that SaveToFileAsync is 100% safe when used OOP. It just calls StorageFile::OpenAsync method, in theory if you could get a StorageFile object for a file you can\u2019t write to, if there\u2019s normally a check in OpenAsync then that could result it an arbitrary file being overwritten.\r\n\r\nFixing wise at the least I\u2019d wrap XmlDocument better so that it only exposes runtime interfaces. In the general case I\u2019d also consider exposing XmlDocument over a process boundary to be dangerous so you might want to try and do something about that. And alternative would be to implement IMarshal on the object to custom marshal the XML document across the process boundary so that any calls would only affect the local process, but that\u2019d almost certainly introduce perf regressions as well as appcompat issues. But that\u2019s not my problem.\r\n\r\nProof of Concept:\r\n\r\nI\u2019ve provided a PoC as a solution containing the C# PoC as well as a DLL which can be injected into Edge to demonstrate the issue. The PoC will inject the DLL into a running MicrosoftEdgeCP process and run the attack. Note that the PoC needs to know the relative location of the ntdll!LdrpKnownDllDirectoryHandle symbol for x64 in order to work. It should be set up for the initial release of RS5 (17763.1) but if you need to run it on another machine you\u2019ll need to modify GetHandleAddress in the PoC to check the version string from NTDLL and return the appropriate location (you can get the offset in WinDBG using \u2018? ntdll!LdrpKnownDllDirectoryHandle-ntdll). Also before you ask, the injection isn\u2019t a CIG bypass you need to be able to create an image section from an arbitrary file to perform the injection which you can do inside a process running with CIG.\r\n\r\n1) Compile the solution in \u201cRelease\u201d mode for \u201cAny CPU\u201d. It\u2019ll need to pull NtApiDotNet from NuGet to build.\r\n2) Start a copy of Edge (ensure it\u2019s not suspended).\r\n3) Execute the PoC from the x64\\Release directory.\r\n\r\nExpected Result:\r\nAccessing the XmlDocument provides no elevated privileges.\r\n\r\nObserved Result:\r\nNotepad executes outside the sandbox.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46185.zip", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/46185"}], "zdt": [{"lastseen": "2019-02-06T07:20:51", "description": "Exploit for windows platform in category local exploits", "edition": 1, "published": "2019-01-15T00:00:00", "title": "Microsoft Windows 10 - COM Desktop Broker Privilege Escalation Exploit", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-0552"], "modified": "2019-01-15T00:00:00", "id": "1337DAY-ID-31971", "href": "https://0day.today/exploit/description/31971", "sourceData": "Windows: COM Desktop Broker Elevation of Privilege\r\nPlatform: Windows 10 1809 (almost certainly earlier versions as well).\r\nClass: Elevation of Privilege\r\nSecurity Boundary (per Windows Security Service Criteria): AppContainer Sandbox\r\n\r\nSummary: \r\n\r\nThe COM Desktop Broker doesn\u2019t correctly check permissions resulting in elevation of privilege and sandbox escape.\r\n\r\nDescription:\r\nWindows 10 introduced \u201cBrokered Windows Runtime Components for side-loaded applications\u201d which allows a UWP application to interact with privileged components by allowing developers to write a custom broker in .NET. Rather than handling this with the existing Runtime Broker a new \u201cDesktop Broker\u201d was created and plumbed into the COM infrastructure. This required changes in COMBASE to instantiate the broker class and RPCSS to control access to the broker.\r\n\r\nThe stated purpose is only for use by sideloaded enterprise applications, specifically .NET based ones. Looking at the checks in RPCSS for the activation of the broker we can see the check as follows:\r\n\r\nHRESULT IsSideLoadedPackage(LPCWSTR *package_name, bool *is_sideloaded) {\r\n PackageOrigin origin;\r\n *is_sideloaded = false;\r\n HRESULT hr = GetStagedPackageOrigin(package_name, &origin);\r\n if (FAILED(hr))\r\n return hr;\r\n \r\n *is_sideloaded = origin != PackageOrigin_Store;\r\n return S_OK;\r\n}\r\n\r\nThis check is interesting because it considered anything to be sideloaded that hasn\u2019t come from the Store. Looking at the PackageOrigin enumeration this includes Inbox applications such as Cortana and Edge both of which process potentially untrusted content from the network. Of course this isn\u2019t an issue if the broker is secure, but\u2026\r\n\r\nFor a start, as long as RPCSS thinks the current package is side-loaded this feature doesn\u2019t require any further capability to use, or at least nothing checks for one during the process. Even in the side loading case this isn\u2019t ideal, it means that even though a side loaded application is in the sandbox this would allow the application to escape without giving the installer of the application any notice that it has effectively full trust. Contrast this with Desktop Bridge UWP applications which require the \u201cfullTrust\u201d capability to invoke a Win32 application outside the sandbox. This is even more important for a sandbox escape from an Inbox application as you can\u2019t change the capabilities at all without having privileged access. Now, technically you\u2019re supposed to have the appropriate configuration inside the application\u2019s manifest to use this, but that only applies if you\u2019re activating through standard COM Runtime activation routes, instead you can just create an instance of the broker\u2019s class (which is stored in the registry, but at least seems to always be C8FFC414-946D-4E61-A302-9B9713F84448). This class is running in a DLL surrogate at normal user privileges. Therefore any issue with this interface is a sandbox escape. The call implements a single interface, IWinRTDesktopBroker, which looks like:\r\n\r\nclass IWinRTDesktopBroker : public IUnknown {\r\n HRESULT GetClassActivatorForApplication(HSTRING dir, IWinRTClassActivator** ppv);\r\n};\r\n\r\nThis interface has only one method, GetClassActivatorForApplication which takes the path to the brokered components directory. No verification of this directory takes place, it can be anywhere you specify. I\u2019d have assumed it might have at least been limited to a special subdirectory of the package installation, but I\u2019d clearly be wrong. Passing an arbitrary directory to this method, you get back the following interface:\r\n\r\nclass IWinRTClassActivator : public IUnknown {\r\n HRESULT ActivateInstance(HSTRING activatableClassId, IInspectable** ppv);\r\n HRESULT GetActivationFactory(HSTRING activatableClassId, REFIID riid, IUnknown** ppv);\r\n};\r\n\r\nSo to escape the sandbox with this you can create directory somewhere, copy in a WinRT component winmd file then activate it. The activation process will run class constructors and give you arbitrary code execution outside the sandbox. \r\n\r\nHowever, even if the directory was checked in some way as long as you can get back the IWinRTClassActivator interface you could still escape the sandbox as the object is actually an instance of the System.Runtime.InteropServices.WindowsRuntime.WinRTClassActivator class which is implemented by the .NET BCL. This means that it exposes a managed DCOM object to a low-privileged caller which is pretty simple to exploit using my old serialization attacks (e.g. MSRC case 37122). The funny thing is MSRC wrote a blog post [1] about not using Managed DCOM across security boundaries almost certainly before this code was implemented but clearly it wasn\u2019t understood.\r\n[1] https://blogs.technet.microsoft.com/srd/2014/10/14/more-details-about-cve-2014-4073-elevation-of-privilege-vulnerability/\r\n\r\nThere are some caveats, as far as I can tell you can\u2019t create this broker from an LPAC Edge content process, more because the connection to the broker fails rather than any activation permissions check. Therefore to exploit from Edge you\u2019d need to get into the MicrosoftEdge process (or another process outside of LPAC). This is left as an exercise for the reader.\r\n\r\nFixing wise, I\u2019d guess unless you\u2019re actually using this for Inbox applications at a minimum you probably should only Developer and LOB origins. Ideally you\u2019d probably want to require a capability for its use but the horse may have bolted on that one. Anyway you might not consider this an issue as it can\u2019t easily be used from LPAC and side-loading is an issue unto itself.\r\n\r\nProof of Concept:\r\n\r\nI\u2019ve provided a PoC as a solution containing the C# PoC and Brokered Component as well as a DLL which can be injected into Edge to demonstrate the issue. The PoC will inject the DLL into a running MicrosoftEdge process and run the attack. Note that the PoC needs to know the relative location of the ntdll!LdrpKnownDllDirectoryHandle symbol for x64 in order to work. It should be set up for the initial release of RS5 (17763.1) but if you need to run it on another machine you\u2019ll need to modify GetHandleAddress in the PoC to check the version string from NTDLL and return the appropriate location (you can get the offset in WinDBG using \u2018? ntdll!LdrpKnownDllDirectoryHandle-ntdll). Also before you ask, the injection isn\u2019t a CIG bypass you need to be able to create an image section from an arbitrary file to perform the injection which you can do inside a process running with CIG.\r\n\r\n1) Compile the solution in \u201cRelease\u201d mode for \u201cAny CPU\u201d. It\u2019ll need to pull NtApiDotNet from NuGet to build.\r\n2) Start a copy of Edge.\r\n3) Execute the PoC from the x64\\Release directory.\r\n\r\nExpected Result:\r\nCreating the broker fails.\r\n\r\nObserved Result:\r\nThe broker creation succeeds and notepad executes outside the sandbox.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46162.zip\n\n# 0day.today [2019-02-06] #", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/31971"}, {"lastseen": "2019-01-22T00:43:14", "description": "Exploit for windows platform in category dos / poc", "edition": 1, "published": "2019-01-17T00:00:00", "title": "Microsoft Windows 10 - RestrictedErrorInfo Unmarshal Section Handle Use-After-Free Exploit", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-0570"], "modified": "2019-01-17T00:00:00", "id": "1337DAY-ID-31979", "href": "https://0day.today/exploit/description/31979", "sourceData": "Windows: RestrictedErrorInfo Unmarshal Section Handle UAF EoP\r\nPlatform: Windows 10 1709/1809\r\nClass: Elevation of Privilege\r\nSecurity Boundary (per Windows Security Service Criteria): User boundary\r\n\r\nSummary:\r\nThe WinRT RestrictedErrorInfo doesn\u2019t correctly check the validity of a handle to a section object which results in closing an unrelated handle which can lead to EoP.\r\n\r\nDescription:\r\nThe RestrictedErrorInfo class is a COM object implemented internal to the COM runtime. It\u2019s used to pass structured error information across WinRT apartment and process boundaries. For that reason it supports a custom marshaling protocol and as it\u2019s part of the system infrastructure it also marked a system trusted marshaler. It can be sent to processes which explicitly prevent custom marshaling such as many system services as well as AppContainer processes. \r\n\r\nTo send larger amounts of information such as the stack trace (and perhaps for security reasons) the marshaler will insert the name of a section object as well as a handle to that object into the marshaled stream. As COM marshaling doesn\u2019t directly support passing handles, at least without additional help, the unmarshal code opens the client process and duplicates a SYNCHRONIZE only handle to the section into that process. The presumed idea behind passing this handle is it can be used to verify the section name is not some arbitrary section object. This validation takes place in the following code:\r\n\r\nHRESULT CRestrictedError::ValidateHandle(\r\n HANDLE hSection, const wchar_t *pszSectionName, unsigned int cchSectionName)\r\n{\r\n if ( !hSection && !*pszSectionName )\r\n return S_OK;\r\n ULONG length;\r\n NTSTATUS status = NtQueryObject(hSection, ObjectNameInformation, NULL, NULL, &length);\r\n if (status == STATUS_INFO_LENGTH_MISMATCH )\r\n {\r\n PUNICODE_STRING name = malloc(length);\r\n NtQueryObject(hSection, ObjectNameInformation, name, length, NULL);\r\n ULONG total_length = name->Length / 2;\r\n if (length < 60)\r\n return E_INVALID_ARG;\r\n LPWSTR str = name.Buffer[name->Length - 60 * 2];\r\n if (wmemcmp(L\"RestrictedErrorObject-\", str, 22))\r\n return E_INVALID_ARG;\r\n size_t name_length = wcslen(pszSectionName);\r\n if (wmemcmp(pszSectionName, str, name_length))\r\n return E_INVALID_ARG;\r\n return S_OK;\r\n }\r\n return E_ERROR;\r\n}\r\n\r\nValidateHandle takes the handle from the marshaled data and uses NtQueryObject to get its object name. This name, minus any leading name information is then compared against the passed in section name. If they\u2019re not equal then this function fails and the section information is ignored. There\u2019s two issues with this code, firstly it just checks the last 60 characters of the string matches \u201cRestrictedErrorObject-\u201d plus an arbitrary suffix. Secondly, and most importantly, it doesn\u2019t verify that the handle is a section object, it just verifies the name. \r\n\r\nThis might not be a major issue except that once the handle is validated the code assumes ownership of the handle. Therefore once the code is finished with the handle, which can be in the unmarshaler or when the RestrictedErrorInfo object is released, the handle will be closed. If the handle is set to a pre-existing handle inside the unmarshaling process, as long as it meets the name requirements the handle will be closed and the handle entry opened for reuse. This can lead to a UAF on an arbitrary handle.\r\n\r\nOne way of exploiting this would be to attack the BITS service which as demonstrated many times is a good privileged target for these sorts of attacks:\r\n\r\n1) Create a job writing a file to the path \u201cC:\\RestrictedErrorObject-PADDING\\OUTPUT.TXT\u201d. This results in BITS creating a temporary file \u201cC:\\RestrictedErrorObject-PADDING\\BITSXXXX.tmp\u201d. \r\n2) Start the job and stall the GET request for the HTTP data, this is easy to do by requesting BITS downloads a URL from localhost and setting up a simple HTTP server.\r\n3) BITS now has an open, writable handle to the temporary file which the last 60 characters is of the form \u201cRestrictedErrorObject-PADDING\\BITSXXXX.tmp\u201d.\r\n4 ) Marshal an error object, specifying the handle value for the temporary file (might have to brute force) and the section name using the name from 3. Send it to the BITS service using whatever mechanism is most appropriate. As the downloading is happening in a background thread the COM service is still accessible.\r\n5) The unmarshaler will verify the handle then close the handle. This results in the stalled download thread having a stale handle to the temporary file.\r\n6) Perform actions to replace the handle value with a different writable file, one which the user can\u2019t normally write to.\r\n7) Complete the GET request to unblock the download thread, the BITS service will now write arbitrary data to the handle. \r\n\r\nAs the download thread will close the arbitrary handle, instead of 6 and 7 you could replace the handle with some other resource such as a token object and then get a UAF on a completely arbitrary handle type leading to other ways of exploiting the same bug.\r\n\r\nFrom a fixing perspective you really should do a better job of verifying that the handle is a section object, although even that wouldn\u2019t be foolproof.\r\n\r\nProof of Concept:\r\n\r\nI\u2019ve provided a PoC as a C# project. Note that this doesn\u2019t do an end to end exploit, it just demonstrates the bug in the same process as it\u2019s a more reliable demonstration. This shouldn\u2019t be a problem but if you really can\u2019t see this is a security issue then\u2026 The PoC will create a file which will match the required naming pattern, then insert that into the marshaled data. The data will then be unmarshaled and the handle checked. Note that I release the COM object explicitly rather than waiting for the garbage collector as the handle is only released when the underlying COM object is released. For an attack on a native service this would not be necessary, but it\u2019s mostly a quirk of using C#.\r\n\r\n1) Compile the C# project. It will need to grab the NtApiDotNet from NuGet to work.\r\n2) Run the PoC.\r\n\r\nExpected Result:\r\nThe unmarshal process should fail, or the handle is valid after the unmarshal process.\r\n\r\nObserved Result:\r\nThe unmarshal process succeeds and the second call to obj.FullPath fails with an STATUS_INVALID_HANDLE error.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46184.zip\n\n# 0day.today [2019-01-21] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/31979"}, {"lastseen": "2019-02-06T07:35:57", "description": "Exploit for windows platform in category local exploits", "edition": 1, "published": "2019-01-17T00:00:00", "title": "Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation Exploit", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2019-0555"], "modified": "2019-01-17T00:00:00", "id": "1337DAY-ID-31980", "href": "https://0day.today/exploit/description/31980", "sourceData": "Windows: XmlDocument Insecure Sharing Elevation of Privilege\r\nPlatform: Windows 10 1809 (almost certainly earlier versions as well).\r\nClass: Elevation of Privilege\r\nSecurity Boundary (per Windows Security Service Criteria): AppContainer Sandbox\r\n\r\nSummary: \r\n\r\nA number of Partial Trust Windows Runtime classes expose the XmlDocument class across process boundaries to less privileged callers which in its current form can be used to elevate privileges and escape the Edge Content LPAC sandbox.\r\n\r\nDescription:\r\n\r\nWhen an AppContainer sandboxed application creates a partial trust class it\u2019s instantiated inside a Runtime Broker running at the normal user privilege. While Windows.Data.Xml.Dom.XmlDocument is marked as Base Trust so would be instantiated inside the same process as the creator, there\u2019s a number of partial trust classes which expose a XmlDocument object.\r\n\r\nAn example of this is the ToastNotificationManager class which expose a XmlDocument through the GetTemplateContent static method. This is exposed to all normal AC and also has explicit permissions to allow lpacAppExperience capability to access it which all Edge Content LPAC processes have.\r\n\r\nThe problem with XmlDocument is it doesn\u2019t custom marshal the object over process boundaries, this means that the XmlDocument which is created by ToastNotificationManager stays in the Runtime Broker. If there\u2019s any security issues with the use of XmlDocument interface then that\u2019s a problem.\r\n\r\nLooking at the class it\u2019s implemented inside msxml6.dll and is basically a MSXML.DOMDocument.6.0 class in all but name. Checking what interfaces the class supports you find the following (partial list):\r\n\r\nIPersistMoniker\r\nIPersistStream\r\nIPersistStreamInit\r\nIServiceProvider\r\nIStream\r\nIXMLDOMDocument\r\nIXMLDOMDocument2\r\nIXMLDOMDocument3\r\nIXMLDOMNode\r\nWindows::Xml::Dom::IXmlDocument\r\nWindows::Xml::Dom::IXmlDocumentIO\r\nWindows::Xml::Dom::IXmlDocumentIO2\r\nWindows::Xml::Dom::IXmlNode\r\nWindows::Xml::Dom::IXmlNodeSelector\r\nWindows::Xml::Dom::IXmlNodeSerializer\r\n\r\nWhat sticks out is it supports IXMLDOMDocument* which is the normal MSXML interfaces. Even if the underlying implementation was based on the existing MSXML DOM Document I\u2019d have expected that creating this object as a runtime object would wrap the MSXML object and only expose those interfaces needed for its use as a runtime object. However, it exposes everything. \r\n\r\nPotential issues with this are:\r\nIPersistMoniker could be used to save to a file with normal user privileges.\r\nIXMLDOMDocument supports a save method which can do the same thing.\r\nYou can access the transformNode method to execute an XSLT template including arbitrary WSH script code (this is the _really_ bad one).\r\n\r\nSo the easiest way to escape the sandbox would be to execute the XSLT script. As the script is running in the Runtime Broker it runs with full user privileges and so can trivially escape the sandbox including the Edge Content LPAC sandbox.\r\n\r\nThe other classes which expose an XmlDocument:\r\n\r\nToastNotification via the get_Content method.\r\nBadgeUpdateManager via the GetTemplateContent method.\r\nTileFlyoutUpdateManager again via GetTemplateContent.\r\nTileUpdateManager...\r\n\r\nYou can work out the rest, I\u2019ve got better things to do.\r\n\r\nNote that I think even if you remove all non-runtime interfaces exposed from XmlDocument just the built in functionality might be dangerous. For example you can call XmlDocument::loadXML with the ResolveExternals load setting which would likely allow you to steal files from the local system (a local XXE attack basically). Also I\u2019m not entirely convinced that SaveToFileAsync is 100% safe when used OOP. It just calls StorageFile::OpenAsync method, in theory if you could get a StorageFile object for a file you can\u2019t write to, if there\u2019s normally a check in OpenAsync then that could result it an arbitrary file being overwritten.\r\n\r\nFixing wise at the least I\u2019d wrap XmlDocument better so that it only exposes runtime interfaces. In the general case I\u2019d also consider exposing XmlDocument over a process boundary to be dangerous so you might want to try and do something about that. And alternative would be to implement IMarshal on the object to custom marshal the XML document across the process boundary so that any calls would only affect the local process, but that\u2019d almost certainly introduce perf regressions as well as appcompat issues. But that\u2019s not my problem.\r\n\r\nProof of Concept:\r\n\r\nI\u2019ve provided a PoC as a solution containing the C# PoC as well as a DLL which can be injected into Edge to demonstrate the issue. The PoC will inject the DLL into a running MicrosoftEdgeCP process and run the attack. Note that the PoC needs to know the relative location of the ntdll!LdrpKnownDllDirectoryHandle symbol for x64 in order to work. It should be set up for the initial release of RS5 (17763.1) but if you need to run it on another machine you\u2019ll need to modify GetHandleAddress in the PoC to check the version string from NTDLL and return the appropriate location (you can get the offset in WinDBG using \u2018? ntdll!LdrpKnownDllDirectoryHandle-ntdll). Also before you ask, the injection isn\u2019t a CIG bypass you need to be able to create an image section from an arbitrary file to perform the injection which you can do inside a process running with CIG.\r\n\r\n1) Compile the solution in \u201cRelease\u201d mode for \u201cAny CPU\u201d. It\u2019ll need to pull NtApiDotNet from NuGet to build.\r\n2) Start a copy of Edge (ensure it\u2019s not suspended).\r\n3) Execute the PoC from the x64\\Release directory.\r\n\r\nExpected Result:\r\nAccessing the XmlDocument provides no elevated privileges.\r\n\r\nObserved Result:\r\nNotepad executes outside the sandbox.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46185.zip\n\n# 0day.today [2019-02-06] #", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/31980"}], "zdi": [{"lastseen": "2020-06-22T11:41:42", "bulletinFamily": "info", "cvelist": ["CVE-2019-0575"], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the JET database engine. Crafted data in an MDB file can trigger a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-01-09T00:00:00", "id": "ZDI-19-011", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-011/", "title": "Microsoft Windows JET Database Engine Out-Of-Bounds Read Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-22T11:41:53", "bulletinFamily": "info", "cvelist": ["CVE-2019-0577"], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the JET database engine. Crafted data in an MDB file can trigger a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-01-09T00:00:00", "id": "ZDI-19-012", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-012/", "title": "Microsoft Windows JET Database Engine Out-Of-Bounds Read Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-22T11:41:22", "bulletinFamily": "info", "cvelist": ["CVE-2019-0580"], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the JET database engine. Crafted data in an MDB file can trigger a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-01-09T00:00:00", "id": "ZDI-19-006", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-006/", "title": "Microsoft Windows JET Database Engine Out-Of-Bounds Write Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-22T11:41:59", "bulletinFamily": "info", "cvelist": ["CVE-2019-0582"], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the JET database engine. Crafted data in an MDB file can trigger access to a pointer prior to initialization.. An attacker can leverage this vulnerability to execute code in the context of the current process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-01-09T00:00:00", "id": "ZDI-19-008", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-008/", "title": "Microsoft Windows JET Database Engine Uninitialized Pointer Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-01-01T22:41:34", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0538"], "description": "<html><body><p>Resolves a vulnerability in Windows Embedded POSReady 2009 and Windows Embedded Standard 2009.</p><h2>Summary</h2><div class=\"kb-summary-section section\">A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.<br/><br/>To learn more about the vulnerability, go to <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0538\" id=\"kb-link-2\" managed-link=\"\" target=\"_blank\"> CVE-2019-0538</a>.</div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/12373/windows-update-faqx\" id=\"kb-link-13\" managed-link=\"\" target=\"_blank\">Windows Update: FAQ</a>.</div><h3 class=\"sbody-h3\">Method 2: Microsoft Update Catalog</h3><div class=\"kb-collapsible kb-collapsible-expanded\">To get the standalone package for this update, go to the <a data-content-id=\"\" data-content-type=\"\" href=\"http://catalog.update.microsoft.com/v7/site/search.aspx?q=4481275\" id=\"kb-link-14\" managed-link=\"\" target=\"_blank\">Microsoft Update Catalog</a> website.</div></div><p><strong class=\"sbody-strong\">Important\u00a0</strong>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/library/hh825699\" id=\"kb-link-5\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</p><h2>Deployment information</h2><p>For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:</p><div class=\"indent\"><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/20190108\" id=\"kb-link-9\" managed-link=\"\" target=\"_blank\">Security update deployment information: January 8, 2019</a></div><h2>More information</h2><div class=\"kb-moreinformation-section section\"><table class=\"faq-section\" faq-section=\"\"><tbody class=\"faq-panel\"><tr><td faq-panel-heading=\"\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></td></tr><tr><td faq-panel-body=\"\"><div class=\"kb-collapsible kb-collapsible-collapsed\"><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://www.microsoft.com/safety/pc-security/updates.aspx\" managed-link=\"\" target=\"_blank\">Protect yourself online</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-17\" managed-link=\"\" target=\"_blank\">Microsoft Security</a><br/><br/>Local support according to your country: <a data-content-id=\"\" data-content-type=\"\" href=\"https://www.microsoft.com/locale.aspx\" id=\"kb-link-18\" managed-link=\"\" target=\"_blank\">International Support</a></span></div><span> </span></td></tr></tbody></table><a class=\"bookmark\" id=\"fileinfo\"></a></div><h2>File Information</h2><table class=\"faq-section\" faq-section=\"\"><tbody class=\"faq-panel\"><tr><td faq-panel-heading=\"\">File hash information</td></tr><tr><td faq-panel-body=\"\"><table class=\"table\"><tbody><tr><th>File name</th><th>SHA1 hash</th><th>SHA256 hash</th></tr><tr><td>WindowsXP-KB4481275-x86-Embedded-ENU.exe</td><td>5160CF8226E525F266F39E7279CE39E6176CECE9</td><td>8F3EF8090B1E90C740DD143F186C1AE7F6F812E8350D83ED28388EDD0D511BF8</td></tr></tbody></table></td></tr></tbody></table><p><br/><strong>File information</strong><br/><br/><span>The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and\u00a0times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.</span><br/><br/><strong>Windows XP file information</strong></p><table class=\"faq-section\" faq-section=\"\"><tbody class=\"faq-panel\"><tr><td faq-panel-heading=\"\">For all supported x86-based versions</td></tr><tr><td faq-panel-body=\"\"><table class=\"table\"><tbody><tr><td><strong class=\"sbody-strong\">File name</strong></td><td><strong class=\"sbody-strong\">File version</strong></td><td><strong class=\"sbody-strong\">File size</strong></td><td><strong class=\"sbody-strong\">Date</strong></td><td><strong class=\"sbody-strong\">Time</strong></td><td><strong class=\"sbody-strong\">Platform</strong></td></tr><tr><td>Msrd3x40.dll</td><td>4.0.9801.7</td><td>352,768</td><td>07-Dec-2018</td><td>14:58</td><td>x86</td></tr><tr><td>Updspapi.dll</td><td>6.3.13.0</td><td>382,840</td><td>01-Feb-2018</td><td>21:28</td><td>x86</td></tr></tbody></table></td></tr></tbody></table><p>\u00a0</p></body></html>", "edition": 2, "modified": "2019-01-08T18:02:54", "id": "KB4481275", "href": "https://support.microsoft.com/en-us/help/4481275/", "published": "2019-01-08T00:00:00", "title": "Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009 and Windows Embedded Standard 2009: January 8, 2019", "type": "mskb", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:42:35", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0545"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that may cause information disclosure.</p><h2></h2><div class=\"alert-band\"><div class=\"alert alert-info\" role=\"alert\"><p class=\"alert-title\">Applies to:</p><div class=\"row\"><div class=\"col-xs-24\"><p>Microsoft .NET Framework 3.5, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6.1, Microsoft .NET Framework 4.6.2, Microsoft .NET Framework 4.7, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.7.2</p></div></div></div></div><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves a vulnerability in Microsoft .NET Framework that may cause an information disclosure that allows bypassing Cross-origin Resource Sharing (CORS) configurations.</p><p>An attacker who successfully exploits this vulnerability could retrieve from a web application content that is usually restricted.</p><p>This security update addresses the vulnerability by enforcing CORS configuration to prevent it from being bypassed.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0545\" id=\"kb-link-2\" managed-link=\"\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2019-0545</a>.<br/>\u00a0</div><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/4019990\" managed-link=\"\" target=\"_blank\">KB 4019990</a>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4480083\" managed-link=\"\">4480083</a> Description of the Security Only update for .NET Framework 3.5 for Windows Server 2012 (KB 4480083)</span></li><li><a href=\"https://support.microsoft.com/help/4480075\" managed-link=\"\">4480075</a> Description of the Security Only update for .NET Framework 4.5.2 for Windows Server 2012 (KB 4480075)</li><li><a href=\"https://support.microsoft.com/help/4480070\" managed-link=\"\">4480070</a> Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4480070)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li>Protect yourself online and at home: <a href=\"https://support.microsoft.com/hub/4099151/windows-security-help\" managed-link=\"\" target=\"_blank\">Windows Security support</a></li><li>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></li></ul></body></html>", "edition": 3, "modified": "2019-01-22T20:50:48", "id": "KB4481483", "href": "https://support.microsoft.com/en-us/help/4481483/", "published": "2019-01-22T20:50:48", "title": "Security Only updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4481483)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:44:50", "bulletinFamily": "microsoft", "cvelist": ["CVE-2019-0545"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that may cause information disclosure.</p><h2></h2><div class=\"alert-band\"><div class=\"alert alert-info\" role=\"alert\"><p class=\"alert-title\">Applies to:</p><div class=\"row\"><div class=\"col-xs-24\"><p>Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6.1, Microsoft .NET Framework 4.6.2, Microsoft .NET Framework 4.7, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.7.2</p></div></div></div></div><h2>Summary</h2><div class=\"kb-summary-section section\"><p><span><span><span></span></span></span>This security update resolves a vulnerability in Microsoft .NET Framework that may cause an information disclosure that allows bypassing Cross-origin Resource Sharing (CORS) configurations.</p><p>An attacker who successfully exploits this vulnerability could retrieve from a web application content that is usually restricted.</p><p>This security update addresses the vulnerability by enforcing CORS configuration to prevent it from being bypassed.</p><p><span><span><span></span></span></span><span style=\"font-size:0.9375rem\">To learn more about this vulnerability, see </span><a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0545\" id=\"kb-link-2\" managed-link=\"\" style=\"background-color: rgb(255, 255, 255); font-size: 0.9375rem;\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2019-0545</a><span style=\"font-size:0.9375rem\">.</span><br/>\u00a0</p></div><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see <a href=\"https://support.microsoft.com/en-us/help/4019990\">KB 4019990</a>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4480085\" managed-link=\"\">4480085</a> Description of the Security Only update for .NET Framework 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4480085)</span></li><li><a href=\"https://support.microsoft.com/help/4480076\" managed-link=\"\">4480076</a> Description of the Security Only update for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB 4480076)</li><li><a href=\"https://support.microsoft.com/help/4480072\" managed-link=\"\">4480072</a> Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 and for .NET Framework 4.6 for Server 2008 SP2 (KB 4480072)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li>Protect yourself online and at home: <a href=\"https://support.microsoft.com/hub/4099151/windows-security-help\" managed-link=\"\" target=\"_blank\">Windows Security support</a></li><li>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></li></ul></body></html>", "edition": 3, "modified": "2019-01-22T20:50:50", "id": "KB4481481", "href": "https://support.microsoft.com/en-us/help/4481481/", "published": "2019-01-22T20:50:50", "title": "Security Only updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4481481)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}