Microsoft Windows Multiple Vulnerabilities (KB4041676)

2017-10-11T00:00:00
ID OPENVAS:1361412562310811865
Type openvas
Reporter Copyright (C) 2017 Greenbone Networks GmbH
Modified 2018-08-15T00:00:00

Description

This host is missing a critical security update according to Microsoft KB4041676

                                        
                                            ###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ms_kb4041676.nasl 10967 2018-08-15 05:53:29Z cfischer $
#
# Microsoft Windows Multiple Vulnerabilities (KB4041676)
#
# Authors:
# Rinu Kuriakose <krinu@secpod.com>
#
# Copyright:
# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.811865");
  script_version("$Revision: 10967 $");
  script_cve_id("CVE-2017-8694", "CVE-2017-8703", "CVE-2017-8715", "CVE-2017-11780",
                "CVE-2017-8717", "CVE-2017-11762", "CVE-2017-11763", "CVE-2017-11765",
                "CVE-2017-8718", "CVE-2017-8726", "CVE-2017-8727", "CVE-2017-11769",
                "CVE-2017-11771", "CVE-2017-11772", "CVE-2017-11781", "CVE-2017-11783",
                "CVE-2017-11785", "CVE-2017-11790", "CVE-2017-11792", "CVE-2017-11793",
                "CVE-2017-11794", "CVE-2017-11796", "CVE-2017-11798", "CVE-2017-11799",
                "CVE-2017-11802", "CVE-2017-11804", "CVE-2017-11805", "CVE-2017-11806",
                "CVE-2017-11807", "CVE-2017-11808", "CVE-2017-11809", "CVE-2017-11810",
                "CVE-2017-11811", "CVE-2017-11812", "CVE-2017-11814", "CVE-2017-11815",
                "CVE-2017-11816", "CVE-2017-11817", "CVE-2017-11818", "CVE-2017-11821",
                "CVE-2017-11822", "CVE-2017-11823", "CVE-2017-11824", "CVE-2017-11829",
                "CVE-2017-8689", "CVE-2017-8693", "CVE-2017-11779", "CVE-2017-13080");
  script_bugtraq_id(101100, 101164, 101163, 101161, 101108, 101109, 101111, 101162,
                    101084, 101142, 101112, 101114, 101116, 101140, 101144, 101149,
                    101077, 101078, 101141, 101079, 101080, 101125, 101126, 101130,
                    101131, 101132, 101133, 101134, 101135, 101137, 101081, 101138,
                    101139, 101093, 101136, 101094, 101095, 101101, 101123, 101122,
                    101102, 101099, 101213, 101128, 101096, 101166, 101110, 101274);
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"$Date: 2018-08-15 07:53:29 +0200 (Wed, 15 Aug 2018) $");
  script_tag(name:"creation_date", value:"2017-10-11 11:02:49 +0530 (Wed, 11 Oct 2017)");
  script_name("Microsoft Windows Multiple Vulnerabilities (KB4041676)");

  script_tag(name:"summary", value:"This host is missing a critical security
  update according to Microsoft KB4041676");

  script_tag(name:"vuldetect", value:"Get the vulnerable file version and
  check appropriate patch is applied or not.");

  script_tag(name:"insight", value:"Multiple flaws exists, please refer the link
  mentioned in reference for more information.");

  script_tag(name:"impact", value:"Successful exploitation will allow an attacker
  who successfully exploited these vulnerabilities to run arbitrary code in the
  security context of the local system, cause the affected system to crash, gain
  access to potentially sensitive information, take control of an affected system
  and gain the same user rights as the current user.

  Impact Level: System");

  script_tag(name:"affected", value:"Microsoft Windows 10 Version 1703 x32/x64");

  script_tag(name:"solution", value:"Run Windows Update and update the
  listed hotfixes or download and update mentioned hotfixes in the advisory
  from the below link,
  https://support.microsoft.com/en-us/help/4041676");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4041676");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("smb_reg_service_pack.nasl");
  script_require_ports(139, 445);
  script_mandatory_keys("SMB/WindowsVersion");
  exit(0);
}


include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

if(hotfix_check_sp(win10:1, win10x64:1) <= 0){
  exit(0);
}

sysPath = smb_get_system32root();
if(!sysPath ){
  exit(0);
}

##Fetch the version of 'edgehtml.dll'
edgeVer = fetch_file_version(sysPath, file_name:"edgehtml.dll");
if(!edgeVer){
  exit(0);
}

if(version_in_range(version:edgeVer, test_version:"11.0.15063.0", test_version2:"11.0.15063.673"))
{
  report = 'File checked:     ' + sysPath + "\Edgehtml.dll" + '\n' +
           'File version:     ' + edgeVer  + '\n' +
           'Vulnerable range: 11.0.15063.0 - 11.0.15063.673\n' ;
  security_message(data:report);
  exit(0);
}
exit(0);