Lucene search

K

Microsoft Windows Multiple Vulnerabilities (KB4048968)

🗓️ 15 Nov 2017 00:00:00Reported by Copyright (C) 2017 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 37 Views

This host is missing an important security update for Microsoft Windows Multiple Vulnerabilities (KB4048968). The vulnerabilities exist due to the way the Microsoft Windows Embedded OpenType (EOT) font engine parses embedded fonts, and can potentially allow an attacker to read unintended data

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
NVD
CVE-2017-11835
15 Nov 201703:29
–nvd
NVD
CVE-2017-11832
15 Nov 201703:29
–nvd
CVE
CVE-2017-11832
15 Nov 201703:29
–cve
CVE
CVE-2017-11835
15 Nov 201703:29
–cve
Cvelist
CVE-2017-11832
15 Nov 201703:00
–cvelist
Cvelist
CVE-2017-11835
15 Nov 201703:00
–cvelist
Microsoft KB
Description of the security update for the Windows EOT font engine information disclosure vulnerability in Windows Server 2008: November 14, 2017
14 Nov 201708:00
–mskb
Microsoft KB
November 14, 2017—KB4048960 (Security-only update)
14 Nov 201708:00
–mskb
Microsoft KB
November 14, 2017—KB4048957 (Monthly Rollup)
14 Nov 201708:00
–mskb
Microsoft KB
November 14, 2017—KB4048962 (Security-only update)
14 Nov 201708:00
–mskb
Rows per page
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.812126");
  script_version("2023-07-25T05:05:58+0000");
  script_cve_id("CVE-2017-11835", "CVE-2017-11832");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2017-11-30 19:44:00 +0000 (Thu, 30 Nov 2017)");
  script_tag(name:"creation_date", value:"2017-11-15 00:30:17 +0530 (Wed, 15 Nov 2017)");
  script_name("Microsoft Windows Multiple Vulnerabilities (KB4048968)");

  script_tag(name:"summary", value:"This host is missing an important security
  update according to Microsoft KB4048968");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to the way that the
  Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted
  embedded fonts.");

  script_tag(name:"impact", value:"Successful exploitation will allow an attacker
  to potentially read data that was not intended to be disclosed.");

  script_tag(name:"affected", value:"Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2.");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4048968");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101736");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101726");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("smb_reg_service_pack.nasl");
  script_require_ports(139, 445);
  script_mandatory_keys("SMB/WindowsVersion");
  exit(0);
}

include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

if(hotfix_check_sp(win2008:3, win2008x64:3) <= 0){
  exit(0);
}

sysPath = smb_get_system32root();
if(!sysPath ){
  exit(0);
}

fileVer = fetch_file_version(sysPath:sysPath, file_name:"t2embed.dll");
if(!fileVer){
  exit(0);
}

if(version_is_less(version:fileVer, test_version:"6.0.6002.24215"))
{
  report = report_fixed_ver(file_checked:sysPath + "\t2embed.dll",
                            file_version:fileVer, vulnerable_range:"Less than 6.0.6002.24215");
  security_message(data:report);
  exit(0);
}
exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
15 Nov 2017 00:00Current
5.1Medium risk
Vulners AI Score5.1
CVSS22.1
CVSS35.5
EPSS0.009
37
.json
Report