Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095875)
2018-05-09T00:00:00
ID OPENVAS:1361412562310812881 Type openvas Reporter Copyright (C) 2018 Greenbone Networks GmbH Modified 2019-05-03T00:00:00
Description
This host is missing an important security
update according to Microsoft KB4095875
###############################################################################
# OpenVAS Vulnerability Test
#
# Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095875)
#
# Authors:
# Shakeel <bshakeel@secpod.com>
#
# Copyright:
# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.812881");
script_version("2019-05-03T08:55:39+0000");
script_cve_id("CVE-2018-0765", "CVE-2018-1039");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_tag(name:"last_modification", value:"2019-05-03 08:55:39 +0000 (Fri, 03 May 2019)");
script_tag(name:"creation_date", value:"2018-05-09 14:53:54 +0530 (Wed, 09 May 2018)");
script_name("Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095875)");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft KB4095875");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to,
- .NET, and .NET core, improperly process XML documents.
- An error .Net Framework which could allow an attacker to bypass Device Guard");
script_tag(name:"impact", value:"Successful exploitation will allow an
attacker who successfully exploited this vulnerability to cause a denial
of service against a .NET application and also to bypass security.");
script_tag(name:"affected", value:".NET Framework 3.5 SP1 for Windows 8.1 and Server 2012 R2");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4095875");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) <= 0){
exit(0);
}
key = "SOFTWARE\Microsoft\ASP.NET\";
if(!registry_key_exists(key:key)){
exit(0);
}
foreach item (registry_enum_keys(key:key))
{
dotPath = registry_get_sz(key:key + item, item:"Path");
if(dotPath && "\Microsoft.NET\Framework" >< dotPath)
{
sysdllVer = fetch_file_version(sysPath:dotPath, file_name:"mscorlib.dll");
if(!sysdllVer){
continue;
}
if(version_in_range(version:sysdllVer, test_version:"2.0.50727.5700", test_version2:"2.0.50727.8783"))
{
report = report_fixed_ver(file_checked:dotPath + "\mscorlib.dll",
file_version:sysdllVer, vulnerable_range:"2.0.50727.5700 - 2.0.50727.8783");
security_message(data:report);
exit(0);
}
}
}
exit(99);
{"id": "OPENVAS:1361412562310812881", "type": "openvas", "bulletinFamily": "scanner", "title": "Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095875)", "description": "This host is missing an important security\n update according to Microsoft KB4095875", "published": "2018-05-09T00:00:00", "modified": "2019-05-03T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812881", "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "references": ["https://support.microsoft.com/en-us/help/4095875"], "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "lastseen": "2019-05-29T18:33:12", "viewCount": 154, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-1039", "CVE-2018-0765"]}, {"type": "symantec", "idList": ["SMNTC-104060", "SMNTC-104072"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310813188", "OPENVAS:1361412562310813184", "OPENVAS:1361412562310812876", "OPENVAS:1361412562310813342", "OPENVAS:1361412562310813190", "OPENVAS:1361412562310813185", "OPENVAS:1361412562310813226", "OPENVAS:1361412562310813189", "OPENVAS:1361412562310813186", "OPENVAS:1361412562310812877"]}, {"type": "mskb", "idList": ["KB4099635", "KB4099636", "KB4099638", "KB4099633", "KB4099634", "KB4099639", "KB4099637", "KB4099640"]}, {"type": "nessus", "idList": ["SMB_NT_MS18_MAY_ASP_DOTNET_CORE.NASL", "SMB_NT_MS18_MAY_4103716.NASL", "SMB_NT_MS18_MAY_4103730.NASL", "SMB_NT_MS18_MAY_4103718.NASL", "SMB_NT_MS18_MAY_4103723.NASL", "SMB_NT_MS18_MAY_4103721.NASL", "SMB_NT_MS18_MAY_4096418.NASL", "SMB_NT_MS18_MAY_4103731.NASL", "SMB_NT_MS18_MAY_DOTNET_CORE_SDK.NASL", "SMB_NT_MS18_MAY_4103725.NASL"]}, {"type": "kaspersky", "idList": ["KLA11248"]}, {"type": "github", "idList": ["GHSA-35HC-X2CW-2J4V"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:0CB92F2EE8EC7EB60BEEAFE3A0B1926F"]}, {"type": "talosblog", "idList": ["TALOSBLOG:C19AB95C902B2507E8156BE7B09BE73B"]}], "modified": "2019-05-29T18:33:12", "rev": 2}, "score": {"value": 6.7, "vector": "NONE", "modified": "2019-05-29T18:33:12", "rev": 2}, "vulnersScore": 6.7}, "pluginID": "1361412562310812881", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095875)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812881\");\n script_version(\"2019-05-03T08:55:39+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-03 08:55:39 +0000 (Fri, 03 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 14:53:54 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095875)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4095875\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - .NET, and .NET core, improperly process XML documents.\n\n - An error .Net Framework which could allow an attacker to bypass Device Guard\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker who successfully exploited this vulnerability to cause a denial\n of service against a .NET application and also to bypass security.\");\n\n script_tag(name:\"affected\", value:\".NET Framework 3.5 SP1 for Windows 8.1 and Server 2012 R2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4095875\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n sysdllVer = fetch_file_version(sysPath:dotPath, file_name:\"mscorlib.dll\");\n if(!sysdllVer){\n continue;\n }\n\n if(version_in_range(version:sysdllVer, test_version:\"2.0.50727.5700\", test_version2:\"2.0.50727.8783\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"\\mscorlib.dll\",\n file_version:sysdllVer, vulnerable_range:\"2.0.50727.5700 - 2.0.50727.8783\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "naslFamily": "Windows : Microsoft Bulletins"}
{"cve": [{"lastseen": "2020-10-03T13:20:07", "description": "A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka \".NET and .NET Core Denial of Service Vulnerability.\" This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.", "edition": 3, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-05-09T19:29:00", "title": "CVE-2018-0765", "type": "cve", "cwe": ["CWE-611"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-0765"], "modified": "2018-06-14T18:01:00", "cpe": ["cpe:/a:microsoft:.net_framework:3.5.1", "cpe:/a:microsoft:.net_framework:3.5", "cpe:/a:microsoft:.net_framework:4.6.1", "cpe:/a:microsoft:.net_framework:4.7", "cpe:/a:microsoft:.net_core:2.0", "cpe:/a:microsoft:.net_framework:2.0", "cpe:/a:microsoft:.net_framework:4.6.2", "cpe:/a:microsoft:.net_framework:4.7.2", "cpe:/a:microsoft:.net_framework:4.5.2", "cpe:/a:microsoft:.net_framework:4.7.1", "cpe:/a:microsoft:.net_framework:3.0", "cpe:/a:microsoft:.net_framework:4.6"], "id": "CVE-2018-0765", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0765", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:20:08", "description": "A security feature bypass vulnerability exists in .Net Framework which could allow an attacker to bypass Device Guard, aka \".NET Framework Device Guard Security Feature Bypass Vulnerability.\" This affects Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 3.0, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 2.0, Microsoft .NET Framework 4.6/4.6.1/4.6.2.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-05-09T19:29:00", "title": "CVE-2018-1039", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-1039"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/a:microsoft:.net_framework:3.5.1", "cpe:/a:microsoft:.net_framework:3.5", "cpe:/a:microsoft:.net_framework:4.6.1", "cpe:/a:microsoft:.net_framework:4.7", "cpe:/a:microsoft:.net_framework:2.0", "cpe:/a:microsoft:.net_framework:4.6.2", "cpe:/a:microsoft:.net_framework:4.5.2", "cpe:/a:microsoft:.net_framework:4.7.1", "cpe:/a:microsoft:.net_framework:3.0", "cpe:/a:microsoft:.net_framework:4.6"], "id": "CVE-2018-1039", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1039", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*"]}], "symantec": [{"lastseen": "2018-05-08T23:57:18", "bulletinFamily": "software", "cvelist": ["CVE-2018-0765"], "description": "### Description\n\nMicrosoft .NET is prone to denial-of-service vulnerability. Successful exploits will attackers to cause a denial of service condition.\n\n### Technologies Affected\n\n * Microsoft .NET Framework 2.0 \n * Microsoft .NET Framework 3.0 \n * Microsoft .NET Framework 3.5 \n * Microsoft .NET Framework 3.5.1 \n * Microsoft .NET Framework 4.5.2 \n * Microsoft .NET Framework 4.6 \n * Microsoft .NET Framework 4.6.1 \n * Microsoft .NET Framework 4.6.2 \n * Microsoft .NET Framework 4.7 \n * Microsoft .NET Framework 4.7.1 \n * Microsoft .NET Framework 4.7.2 \n * Microsoft ASP.NET Core 2.0 \n\n### Recommendations\n\n**Block external access at the network boundary, unless external parties require service.** \nIf global access isn't needed, filter access to the affected computer at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This may indicate exploit attempts or activity that results from successful exploits.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-05-08T00:00:00", "published": "2018-05-08T00:00:00", "id": "SMNTC-104060", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/104060", "type": "symantec", "title": "Microsoft .NET CVE-2018-0765 Denial Of Service Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-05-08T23:57:07", "bulletinFamily": "software", "cvelist": ["CVE-2018-1039"], "description": "### Description\n\nMicrosoft .NET Framework Device Guard is prone to a local security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks.\n\n### Technologies Affected\n\n * Microsoft .NET Framework 2.0 SP2 \n * Microsoft .NET Framework 3.0 SP2 \n * Microsoft .NET Framework 3.5 \n * Microsoft .NET Framework 3.5.1 \n * Microsoft .NET Framework 4.5.2 \n * Microsoft .NET Framework 4.6 \n * Microsoft .NET Framework 4.6.1 \n * Microsoft .NET Framework 4.6.2 \n * Microsoft .NET Framework 4.7 \n * Microsoft .NET Framework 4.7.1 \n\n### Recommendations\n\n**Configure webservers to serve only specific, defined file types.** \nTo exploit this vulnerability, an attacker requires local access to an affected computer. Grant local access for trusted and accountable users only.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-05-08T00:00:00", "published": "2018-05-08T00:00:00", "id": "SMNTC-104072", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/104072", "type": "symantec", "title": "Microsoft .NET Framework Device Guard CVE-2018-1039 Local Security Bypass Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}], "nessus": [{"lastseen": "2021-01-01T05:45:18", "description": "The Microsoft .NET Framework installation on the remote host\nis missing security updates. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-05-09T00:00:00", "title": "Security Updates for Microsoft .NET Framework (May 2018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:.net_framework"], "id": "SMB_NT_MS18_MAY_4096418.NASL", "href": "https://www.tenable.com/plugins/nessus/109652", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109652);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_bugtraq_id(104060, 104072);\n script_xref(name:\"MSKB\", value:\"4095512\");\n script_xref(name:\"MSKB\", value:\"4095513\");\n script_xref(name:\"MSKB\", value:\"4095514\");\n script_xref(name:\"MSKB\", value:\"4095515\");\n script_xref(name:\"MSKB\", value:\"4095517\");\n script_xref(name:\"MSKB\", value:\"4095518\");\n script_xref(name:\"MSKB\", value:\"4095519\");\n script_xref(name:\"MSKB\", value:\"4095872\");\n script_xref(name:\"MSKB\", value:\"4095873\");\n script_xref(name:\"MSKB\", value:\"4095874\");\n script_xref(name:\"MSKB\", value:\"4095875\");\n script_xref(name:\"MSKB\", value:\"4095876\");\n script_xref(name:\"MSKB\", value:\"4096235\");\n script_xref(name:\"MSKB\", value:\"4096236\");\n script_xref(name:\"MSKB\", value:\"4096237\");\n script_xref(name:\"MSKB\", value:\"4096416\");\n script_xref(name:\"MSKB\", value:\"4096417\");\n script_xref(name:\"MSKB\", value:\"4096418\");\n script_xref(name:\"MSKB\", value:\"4096494\");\n script_xref(name:\"MSKB\", value:\"4096495\");\n script_xref(name:\"MSKB\", value:\"4103716\");\n script_xref(name:\"MSKB\", value:\"4103721\");\n script_xref(name:\"MSKB\", value:\"4103723\");\n script_xref(name:\"MSKB\", value:\"4103727\");\n script_xref(name:\"MSKB\", value:\"4103731\");\n script_xref(name:\"MSFT\", value:\"MS18-4095512\");\n script_xref(name:\"MSFT\", value:\"MS18-4095513\");\n script_xref(name:\"MSFT\", value:\"MS18-4095514\");\n script_xref(name:\"MSFT\", value:\"MS18-4095515\");\n script_xref(name:\"MSFT\", value:\"MS18-4095517\");\n script_xref(name:\"MSFT\", value:\"MS18-4095518\");\n script_xref(name:\"MSFT\", value:\"MS18-4095519\");\n script_xref(name:\"MSFT\", value:\"MS18-4095872\");\n script_xref(name:\"MSFT\", value:\"MS18-4095873\");\n script_xref(name:\"MSFT\", value:\"MS18-4095874\");\n script_xref(name:\"MSFT\", value:\"MS18-4095875\");\n script_xref(name:\"MSFT\", value:\"MS18-4095876\");\n script_xref(name:\"MSFT\", value:\"MS18-4096235\");\n script_xref(name:\"MSFT\", value:\"MS18-4096236\");\n script_xref(name:\"MSFT\", value:\"MS18-4096237\");\n script_xref(name:\"MSFT\", value:\"MS18-4096416\");\n script_xref(name:\"MSFT\", value:\"MS18-4096417\");\n script_xref(name:\"MSFT\", value:\"MS18-4096418\");\n script_xref(name:\"MSFT\", value:\"MS18-4096494\");\n script_xref(name:\"MSFT\", value:\"MS18-4096495\");\n script_xref(name:\"MSFT\", value:\"MS18-4103716\");\n script_xref(name:\"MSFT\", value:\"MS18-4103721\");\n script_xref(name:\"MSFT\", value:\"MS18-4103723\");\n script_xref(name:\"MSFT\", value:\"MS18-4103727\");\n script_xref(name:\"MSFT\", value:\"MS18-4103731\");\n\n script_name(english:\"Security Updates for Microsoft .NET Framework (May 2018)\");\n script_summary(english:\"Checks for Microsoft security updates.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft .NET Framework installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft .NET Framework installation on the remote host\nis missing security updates. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\");\n # https://support.microsoft.com/en-us/help/4096237/description-of-the-security-only-update-for-net-framework-4-6-4-6-1-4\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1c09ca2b\");\n # https://support.microsoft.com/en-us/help/4096236/description-of-the-security-only-update-for-net-framework-4-6-4-6-1-4\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7a7d72d3\");\n # https://support.microsoft.com/en-us/help/4095872/description-of-the-security-and-quality-rollup-for-net-framework-3-5-f\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3fe33cd0\");\n # https://support.microsoft.com/en-us/help/4095873/description-of-the-security-and-quality-rollup-for-net-framework-2-0-s\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3396f0cc\");\n # https://support.microsoft.com/en-us/help/4095874/description-of-the-security-and-quality-rollup-for-net-framework-3-5-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0dcf45ad\");\n # https://support.microsoft.com/en-us/help/4095875/description-of-the-security-and-quality-rollup-for-net-framework-3-5-f\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d006f874\");\n # https://support.microsoft.com/en-us/help/4095876/description-of-the-security-and-quality-rollup-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?01808ffe\");\n # https://support.microsoft.com/en-us/help/4096495/description-of-the-security-and-quality-rollup-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c0b4dd6d\");\n # https://support.microsoft.com/en-us/help/4096494/description-of-the-security-and-quality-rollup-for-net-framework-4-5-2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5483f9b8\");\n # https://support.microsoft.com/en-us/help/4103731/windows-10-update-kb4103731\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e6fc001a\");\n # https://support.microsoft.com/en-us/help/4103716/windows-10-update-kb4103716\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fb504ab5\");\n # https://support.microsoft.com/en-us/help/4096418/description-of-the-security-and-quality-rollup-for-net-framework-4-6-4\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8a34215b\");\n # https://support.microsoft.com/en-us/help/4095519/description-of-the-security-only-update-for-net-framework-4-5-2-for-wi\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c30e2b96\");\n # https://support.microsoft.com/en-us/help/4095518/description-of-the-security-only-update-for-net-framework-4-5-2-for-wi\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6c6f6f2b\");\n # https://support.microsoft.com/en-us/help/4095517/description-of-the-security-only-update-for-net-framework-4-5-2-for-wi\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?78d71558\");\n # https://support.microsoft.com/en-us/help/4095513/description-of-the-security-only-update-for-net-framework-2-0-sp2-and\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?2fafc93a\");\n # https://support.microsoft.com/en-us/help/4095515/description-of-the-security-only-update-for-net-framework-3-5-sp1-for\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c993d489\");\n # https://support.microsoft.com/en-us/help/4095514/description-of-the-security-only-update-for-net-framework-3-5-1-for-wi\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a80d2f6a\");\n # https://support.microsoft.com/en-us/help/4096417/description-of-the-security-and-quality-rollup-for-net-framework-4-6-4\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d71b2a16\");\n # https://support.microsoft.com/en-us/help/4095512/description-of-the-security-only-update-for-net-framework-3-5-sp1-for\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?cfc3021f\");\n # https://support.microsoft.com/en-us/help/4096416/description-of-the-security-and-quality-rollup-for-net-framework-4-6-4\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f6e88e34\");\n # https://support.microsoft.com/en-us/help/4096235/description-of-the-security-only-update-for-net-framework-4-6-4-6-1-4\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e553999f\");\n # https://support.microsoft.com/en-us/help/4103721/windows-10-update-kb4103721\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9d0d5cd2\");\n # https://support.microsoft.com/en-us/help/4103723/windows-10-update-kb4103723\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?aca51532\");\n # https://support.microsoft.com/en-us/help/4103727/windows-10-update-kb4103727\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?41c43cb2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released security updates for Microsoft .NET Framework.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-1039\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:.net_framework\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_dotnet_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\", \"microsoft_net_framework_installed.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"install_func.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = \"MS18-05\";\nkbs = make_list(\n '4095512',\n '4095513',\n '4095514',\n '4095515',\n '4095517',\n '4095518',\n '4095519',\n '4095872',\n '4095873',\n '4095874',\n '4095875',\n '4095876',\n '4096235',\n '4096236',\n '4096237',\n '4096416',\n '4096417',\n '4096418',\n '4096494',\n '4096495',\n '4103716',\n '4103721',\n '4103723',\n '4103727',\n '4103731'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2', win7:'1', win8:'0', win81:'0', win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"Windows 8.1\" >!< productname) audit(AUDIT_OS_SP_NOT_VULN);\nelse if (\"Vista\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\napp = 'Microsoft .NET Framework';\nget_install_count(app_name:app, exit_if_zero:TRUE);\ninstalls = get_combined_installs(app_name:app);\n\nvuln = 0;\n\nif (installs[0] == 0)\n{\n foreach install (installs[1])\n {\n version = install['version'];\n if( version != UNKNOWN_VER &&\n smb_check_dotnet_rollup(rollup_date:\"05_2018\", dotnet_ver:version))\n vuln++;\n }\n}\nif(vuln)\n{\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, \"affected\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T05:45:23", "description": "The remote Windows host has an installation of ASP.NET Core\nwith a version less than 2.0.8. Therefore, the host is \naffected by a denial of service vulnerability.", "edition": 25, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2018-05-11T00:00:00", "title": "Security Update for ASP.NET Core (May 2018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:aspnet_core"], "id": "SMB_NT_MS18_MAY_ASP_DOTNET_CORE.NASL", "href": "https://www.tenable.com/plugins/nessus/109731", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109731);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/11/04\");\n\n script_cve_id(\"CVE-2018-0765\");\n script_bugtraq_id(104060);\n\n script_name(english:\"Security Update for ASP.NET Core (May 2018)\");\n script_summary(english:\"Checks for Windows Install of .NET Core.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a .NET Core SDK\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host has an installation of ASP.NET Core\nwith a version less than 2.0.8. Therefore, the host is \naffected by a denial of service vulnerability.\");\n # https://github.com/dotnet/core/blob/master/release-notes/2.0/2.1.200-sdk.md\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?802de2b2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/dotnet/announcements/issues/67\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update to ASP.NET Core version 2.0.8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-0765\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/11\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:aspnet_core\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_asp_dotnet_core_win.nbin\");\n script_require_keys(\"installed_sw/ASP .NET Core Windows\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"audit.inc\");\ninclude(\"install_func.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_func.inc\");\n\nappname = 'ASP .NET Core Windows';\nport = kb_smb_transport();\n\ninstalls = get_installs(app_name:appname, exit_if_not_found:TRUE);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\nreport = '';\n\nforeach install (installs[1])\n{\n version = install['version'];\n path = install['path'];\n fix = '2.0.12824.0';\n\n if (version =~ \"^2\\.\" && ver_compare(ver:version, fix:fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n}\n\nif (report != '')\n security_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\nelse\n audit(AUDIT_INST_VER_NOT_VULN, appname, version);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T05:45:23", "description": "The remote Windows host has an installation of .NET Core\nSDK with a version less than 2.1.200.0. Therefore, the host is \naffected by a denial of service vulnerability.", "edition": 25, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2018-05-11T00:00:00", "title": "Security Update for .NET Core SDK (May 2018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:.net_core"], "id": "SMB_NT_MS18_MAY_DOTNET_CORE_SDK.NASL", "href": "https://www.tenable.com/plugins/nessus/109732", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109732);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/11/04\");\n\n script_cve_id(\"CVE-2018-0765\");\n script_bugtraq_id(104060);\n\n script_name(english:\"Security Update for .NET Core SDK (May 2018)\");\n script_summary(english:\"Checks for Windows Install of .NET Core.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a .NET Core SDK\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host has an installation of .NET Core\nSDK with a version less than 2.1.200.0. Therefore, the host is \naffected by a denial of service vulnerability.\");\n # https://github.com/dotnet/core/blob/master/release-notes/2.0/2.1.200-sdk.md\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?802de2b2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/dotnet/announcements/issues/67\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update to .NET Core SDK version 2.1.200 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-0765\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/11\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:.net_core\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_dotnet_core_sdk_win.nbin\");\n script_require_keys(\"installed_sw/.NET Core SDK Windows\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"audit.inc\");\ninclude(\"install_func.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_func.inc\");\n\nappname = '.NET Core SDK Windows';\nport = kb_smb_transport();\n\ninstalls = get_installs(app_name:appname, exit_if_not_found:TRUE);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\nreport = '';\n\nforeach install (installs[1])\n{\n version = install['version'];\n path = install['path'];\n fix = '2.1.200.0';\n\n if (version =~ \"^2\\.\" && ver_compare(ver:version, fix:fix,strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n}\n\nif (report != '')\n security_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\nelse\n audit(AUDIT_INST_VER_NOT_VULN, appname);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T05:45:23", "description": "The remote Windows host is missing security update 4103726\nor cumulative update 4103730. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)", "edition": 30, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103726: Windows Server 2012 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-8136", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-0955", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8124", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8167", "CVE-2018-8166"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS18_MAY_4103730.NASL", "href": "https://www.tenable.com/plugins/nessus/109610", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109610);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0959\",\n \"CVE-2018-1039\",\n \"CVE-2018-8124\",\n \"CVE-2018-8127\",\n \"CVE-2018-8136\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8174\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103730\");\n script_xref(name:\"MSKB\", value:\"4103726\");\n script_xref(name:\"MSFT\", value:\"MS18-4103730\");\n script_xref(name:\"MSFT\", value:\"MS18-4103726\");\n\n script_name(english:\"KB4103726: Windows Server 2012 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103726\nor cumulative update 4103730. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\");\n # https://support.microsoft.com/en-us/help/4103730/windows-server-2012-update-kb4103730\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a47bd1fd\");\n # https://support.microsoft.com/en-us/help/4103726/windows-server-2012-update-kb4103726\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?988e96ea\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4103726 or Cumulative Update KB4103730.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103730', '4103726');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103730, 4103726])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:45:19", "description": "The remote Windows host is missing security update 4103712\nor cumulative update 4103718. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8120, CVE-2018-8124,\n CVE-2018-8164, CVE-2018-8166)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)", "edition": 30, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103712: Windows 7 and Windows Server 2008 R2 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-8136", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-0955", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8124", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8122", "CVE-2018-8167", "CVE-2018-8166", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-8120", "CVE-2018-1025"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS18_MAY_4103718.NASL", "href": "https://www.tenable.com/plugins/nessus/109604", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109604);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0959\",\n \"CVE-2018-1022\",\n \"CVE-2018-1025\",\n \"CVE-2018-1039\",\n \"CVE-2018-8114\",\n \"CVE-2018-8120\",\n \"CVE-2018-8122\",\n \"CVE-2018-8124\",\n \"CVE-2018-8127\",\n \"CVE-2018-8136\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8174\",\n \"CVE-2018-8178\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103718\");\n script_xref(name:\"MSKB\", value:\"4103712\");\n script_xref(name:\"MSFT\", value:\"MS18-4103718\");\n script_xref(name:\"MSFT\", value:\"MS18-4103712\");\n\n script_name(english:\"KB4103712: Windows 7 and Windows Server 2008 R2 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103712\nor cumulative update 4103718. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8120, CVE-2018-8124,\n CVE-2018-8164, CVE-2018-8166)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\");\n # https://support.microsoft.com/en-us/help/4103718/windows-7-update-kb4103718\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9cd8d3d4\");\n # https://support.microsoft.com/en-us/help/4103712/windows-7-update-kb4103712\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cbb798a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4103712 or Cumulative Update KB4103718.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103718', '4103712');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.1\",\n sp:1,\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103718, 4103712])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:45:22", "description": "The remote Windows host is missing security update 4103715\nor cumulative update 4103725. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)", "edition": 30, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103715: Windows 8.1 and Windows Server 2012 R2 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-8134", "CVE-2018-8136", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-0955", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8124", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8122", "CVE-2018-8167", "CVE-2018-8166", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-1025"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS18_MAY_4103725.NASL", "href": "https://www.tenable.com/plugins/nessus/109607", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109607);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0959\",\n \"CVE-2018-1022\",\n \"CVE-2018-1025\",\n \"CVE-2018-1039\",\n \"CVE-2018-8114\",\n \"CVE-2018-8122\",\n \"CVE-2018-8124\",\n \"CVE-2018-8127\",\n \"CVE-2018-8134\",\n \"CVE-2018-8136\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8174\",\n \"CVE-2018-8178\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103715\");\n script_xref(name:\"MSKB\", value:\"4103725\");\n script_xref(name:\"MSFT\", value:\"MS18-4103715\");\n script_xref(name:\"MSFT\", value:\"MS18-4103725\");\n\n script_name(english:\"KB4103715: Windows 8.1 and Windows Server 2012 R2 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103715\nor cumulative update 4103725. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\");\n # https://support.microsoft.com/en-us/help/4103715/windows-81-update-kb4103715\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?781c2262\");\n # https://support.microsoft.com/en-us/help/4103725/windows-81-update-kb4103725\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?dba0079e\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Only update KB4103715 or Cumulative Update KB4103725.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103715', '4103725');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"8.1\" >!< productname)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.3\",\n sp:0,\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103715, 4103725])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:18", "description": "The remote Windows host is missing security update 4103716.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0953,\n CVE-2018-8137)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A security feature bypass vulnerability exists in\n Windows Scripting Host which could allow an attacker to\n bypass Device Guard. An attacker who successfully\n exploited this vulnerability could circumvent a User\n Mode Code Integrity (UMCI) policy on the machine.\n (CVE-2018-0854)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8133)", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103716: Windows 10 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-8134", "CVE-2018-0854", "CVE-2018-8136", "CVE-2018-8126", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-8132", "CVE-2018-0955", "CVE-2018-8179", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8165", "CVE-2018-0953", "CVE-2018-8124", "CVE-2018-8112", "CVE-2018-8133", "CVE-2018-0958", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8122", "CVE-2018-8167", "CVE-2018-8166", "CVE-2018-8129", "CVE-2018-8137", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-0943", "CVE-2018-1025"], "modified": "2018-05-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS18_MAY_4103716.NASL", "href": "https://www.tenable.com/plugins/nessus/109603", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109603);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0854\",\n \"CVE-2018-0943\",\n \"CVE-2018-0953\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0958\",\n \"CVE-2018-0959\",\n \"CVE-2018-1022\",\n \"CVE-2018-1025\",\n \"CVE-2018-1039\",\n \"CVE-2018-8112\",\n \"CVE-2018-8114\",\n \"CVE-2018-8122\",\n \"CVE-2018-8124\",\n \"CVE-2018-8126\",\n \"CVE-2018-8127\",\n \"CVE-2018-8129\",\n \"CVE-2018-8132\",\n \"CVE-2018-8133\",\n \"CVE-2018-8134\",\n \"CVE-2018-8136\",\n \"CVE-2018-8137\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8165\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8174\",\n \"CVE-2018-8178\",\n \"CVE-2018-8179\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103716\");\n script_xref(name:\"MSFT\", value:\"MS18-4103716\");\n\n script_name(english:\"KB4103716: Windows 10 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103716.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0953,\n CVE-2018-8137)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A security feature bypass vulnerability exists in\n Windows Scripting Host which could allow an attacker to\n bypass Device Guard. An attacker who successfully\n exploited this vulnerability could circumvent a User\n Mode Code Integrity (UMCI) policy on the machine.\n (CVE-2018-0854)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8133)\");\n # https://support.microsoft.com/en-us/help/4103716/windows-10-update-kb4103716\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fb504ab5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4103716.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103716');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"10240\",\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103716])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:19", "description": "The remote Windows host is missing security update 4103723.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0951,\n CVE-2018-0953, CVE-2018-8137)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate vSMB packet data. An attacker who successfully\n exploited these vulnerabilities could execute arbitrary\n code on a target operating system. To exploit these\n vulnerabilities, an attacker running inside a virtual\n machine could run a specially crafted application that\n could cause the Hyper-V host operating system to execute\n arbitrary code. The update addresses the vulnerabilities\n by correcting how Windows Hyper-V validates vSMB packet\n data. (CVE-2018-0961)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A security feature bypass vulnerability exists in\n Windows Scripting Host which could allow an attacker to\n bypass Device Guard. An attacker who successfully\n exploited this vulnerability could circumvent a User\n Mode Code Integrity (UMCI) policy on the machine.\n (CVE-2018-0854)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8133)", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103723: Windows 10 Version 1607 and Windows Server 2016 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-8134", "CVE-2018-0961", "CVE-2018-0854", "CVE-2018-8136", "CVE-2018-8126", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-8132", "CVE-2018-0955", "CVE-2018-8179", "CVE-2018-0951", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8165", "CVE-2018-0953", "CVE-2018-8124", "CVE-2018-8112", "CVE-2018-8133", "CVE-2018-0958", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8122", "CVE-2018-8167", "CVE-2018-8166", "CVE-2018-8129", "CVE-2018-8137", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-0943", "CVE-2018-1025"], "modified": "2018-05-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS18_MAY_4103723.NASL", "href": "https://www.tenable.com/plugins/nessus/109606", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109606);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0854\",\n \"CVE-2018-0943\",\n \"CVE-2018-0951\",\n \"CVE-2018-0953\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0958\",\n \"CVE-2018-0959\",\n \"CVE-2018-0961\",\n \"CVE-2018-1022\",\n \"CVE-2018-1025\",\n \"CVE-2018-1039\",\n \"CVE-2018-8112\",\n \"CVE-2018-8114\",\n \"CVE-2018-8122\",\n \"CVE-2018-8124\",\n \"CVE-2018-8126\",\n \"CVE-2018-8127\",\n \"CVE-2018-8129\",\n \"CVE-2018-8132\",\n \"CVE-2018-8133\",\n \"CVE-2018-8134\",\n \"CVE-2018-8136\",\n \"CVE-2018-8137\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8165\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8174\",\n \"CVE-2018-8178\",\n \"CVE-2018-8179\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103723\");\n script_xref(name:\"MSFT\", value:\"MS18-4103723\");\n\n script_name(english:\"KB4103723: Windows 10 Version 1607 and Windows Server 2016 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103723.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0951,\n CVE-2018-0953, CVE-2018-8137)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate vSMB packet data. An attacker who successfully\n exploited these vulnerabilities could execute arbitrary\n code on a target operating system. To exploit these\n vulnerabilities, an attacker running inside a virtual\n machine could run a specially crafted application that\n could cause the Hyper-V host operating system to execute\n arbitrary code. The update addresses the vulnerabilities\n by correcting how Windows Hyper-V validates vSMB packet\n data. (CVE-2018-0961)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A security feature bypass vulnerability exists in\n Windows Scripting Host which could allow an attacker to\n bypass Device Guard. An attacker who successfully\n exploited this vulnerability could circumvent a User\n Mode Code Integrity (UMCI) policy on the machine.\n (CVE-2018-0854)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8133)\");\n # https://support.microsoft.com/en-us/help/4103723/windows-10-update-kb4103723\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?aca51532\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4103723.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103723');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"14393\",\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103723])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:18", "description": "The remote Windows host is missing security update 4103721.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate vSMB packet data. An attacker who successfully\n exploited these vulnerabilities could execute arbitrary\n code on a target operating system. To exploit these\n vulnerabilities, an attacker running inside a virtual\n machine could run a specially crafted application that\n could cause the Hyper-V host operating system to execute\n arbitrary code. The update addresses the vulnerabilities\n by correcting how Windows Hyper-V validates vSMB packet\n data. (CVE-2018-0961)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8130,\n CVE-2018-8133)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0945,\n CVE-2018-0946, CVE-2018-0953, CVE-2018-8128,\n CVE-2018-8137, CVE-2018-8139)", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103721: Windows 10 Version 1803 and Windows Server Version 1803 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-0946", "CVE-2018-8134", "CVE-2018-0961", "CVE-2018-8136", "CVE-2018-8126", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-8132", "CVE-2018-0955", "CVE-2018-8179", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8165", "CVE-2018-0945", "CVE-2018-0953", "CVE-2018-8124", "CVE-2018-8112", "CVE-2018-8128", "CVE-2018-8133", "CVE-2018-0958", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8130", "CVE-2018-8122", "CVE-2018-8139", "CVE-2018-8167", "CVE-2018-8166", "CVE-2018-8129", "CVE-2018-8137", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-0943", "CVE-2018-1025"], "modified": "2018-05-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS18_MAY_4103721.NASL", "href": "https://www.tenable.com/plugins/nessus/109605", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109605);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0943\",\n \"CVE-2018-0945\",\n \"CVE-2018-0946\",\n \"CVE-2018-0953\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0958\",\n \"CVE-2018-0959\",\n \"CVE-2018-0961\",\n \"CVE-2018-1022\",\n \"CVE-2018-1025\",\n \"CVE-2018-1039\",\n \"CVE-2018-8112\",\n \"CVE-2018-8114\",\n \"CVE-2018-8122\",\n \"CVE-2018-8124\",\n \"CVE-2018-8126\",\n \"CVE-2018-8127\",\n \"CVE-2018-8128\",\n \"CVE-2018-8129\",\n \"CVE-2018-8130\",\n \"CVE-2018-8132\",\n \"CVE-2018-8133\",\n \"CVE-2018-8134\",\n \"CVE-2018-8136\",\n \"CVE-2018-8137\",\n \"CVE-2018-8139\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8165\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8174\",\n \"CVE-2018-8178\",\n \"CVE-2018-8179\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103721\");\n script_xref(name:\"MSFT\", value:\"MS18-4103721\");\n\n script_name(english:\"KB4103721: Windows 10 Version 1803 and Windows Server Version 1803 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103721.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate vSMB packet data. An attacker who successfully\n exploited these vulnerabilities could execute arbitrary\n code on a target operating system. To exploit these\n vulnerabilities, an attacker running inside a virtual\n machine could run a specially crafted application that\n could cause the Hyper-V host operating system to execute\n arbitrary code. The update addresses the vulnerabilities\n by correcting how Windows Hyper-V validates vSMB packet\n data. (CVE-2018-0961)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8130,\n CVE-2018-8133)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0945,\n CVE-2018-0946, CVE-2018-0953, CVE-2018-8128,\n CVE-2018-8137, CVE-2018-8139)\");\n # https://support.microsoft.com/en-us/help/4103721/windows-10-update-kb4103721\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9d0d5cd2\");\n script_set_attribute(attribute:\"solution\", value:\n \"Apply Cumulative Update KB4103721.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103721');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"17134\",\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103721])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-19T05:13:20", "description": "The remote Windows host is missing security update 4103731.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate vSMB packet data. An attacker who successfully\n exploited these vulnerabilities could execute arbitrary\n code on a target operating system. To exploit these\n vulnerabilities, an attacker running inside a virtual\n machine could run a specially crafted application that\n could cause the Hyper-V host operating system to execute\n arbitrary code. The update addresses the vulnerabilities\n by correcting how Windows Hyper-V validates vSMB packet\n data. (CVE-2018-0961)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A security feature bypass vulnerability exists in\n Windows Scripting Host which could allow an attacker to\n bypass Device Guard. An attacker who successfully\n exploited this vulnerability could circumvent a User\n Mode Code Integrity (UMCI) policy on the machine.\n (CVE-2018-0854)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8133)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0946,\n CVE-2018-0951, CVE-2018-0953, CVE-2018-8128,\n CVE-2018-8137)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows kernel image handles objects in\n memory. An attacker who successfully exploited the\n vulnerability could execute code with elevated\n permissions. (CVE-2018-8170)", "edition": 27, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-05-08T00:00:00", "title": "KB4103731: Windows 10 Version 1703 May 2018 Security Update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-0946", "CVE-2018-8134", "CVE-2018-0961", "CVE-2018-0854", "CVE-2018-8136", "CVE-2018-8126", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-8170", "CVE-2018-8132", "CVE-2018-0955", "CVE-2018-8179", "CVE-2018-0951", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8165", "CVE-2018-0953", "CVE-2018-8124", "CVE-2018-8112", "CVE-2018-8128", "CVE-2018-8133", "CVE-2018-0958", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8122", "CVE-2018-8167", "CVE-2018-8166", "CVE-2018-8129", "CVE-2018-8137", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-0943", "CVE-2018-1025"], "modified": "2018-05-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:edge"], "id": "SMB_NT_MS18_MAY_4103731.NASL", "href": "https://www.tenable.com/plugins/nessus/109611", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109611);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/18\");\n\n script_cve_id(\n \"CVE-2018-0765\",\n \"CVE-2018-0824\",\n \"CVE-2018-0854\",\n \"CVE-2018-0943\",\n \"CVE-2018-0946\",\n \"CVE-2018-0951\",\n \"CVE-2018-0953\",\n \"CVE-2018-0954\",\n \"CVE-2018-0955\",\n \"CVE-2018-0958\",\n \"CVE-2018-0959\",\n \"CVE-2018-0961\",\n \"CVE-2018-1022\",\n \"CVE-2018-1025\",\n \"CVE-2018-1039\",\n \"CVE-2018-8112\",\n \"CVE-2018-8114\",\n \"CVE-2018-8122\",\n \"CVE-2018-8124\",\n \"CVE-2018-8126\",\n \"CVE-2018-8127\",\n \"CVE-2018-8128\",\n \"CVE-2018-8129\",\n \"CVE-2018-8132\",\n \"CVE-2018-8133\",\n \"CVE-2018-8134\",\n \"CVE-2018-8136\",\n \"CVE-2018-8137\",\n \"CVE-2018-8145\",\n \"CVE-2018-8164\",\n \"CVE-2018-8165\",\n \"CVE-2018-8166\",\n \"CVE-2018-8167\",\n \"CVE-2018-8170\",\n \"CVE-2018-8174\",\n \"CVE-2018-8178\",\n \"CVE-2018-8179\",\n \"CVE-2018-8897\"\n );\n script_xref(name:\"MSKB\", value:\"4103731\");\n script_xref(name:\"MSFT\", value:\"MS18-4103731\");\n\n script_name(english:\"KB4103731: Windows 10 Version 1703 May 2018 Security Update\");\n script_summary(english:\"Checks for rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 4103731.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A security feature bypass vulnerability exists in .Net\n Framework which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-1039)\n\n - A remote code execution vulnerability exists in the way\n that Microsoft browsers access objects in memory. The\n vulnerability could corrupt memory in a way that could\n allow an attacker to execute arbitrary code in the\n context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8178)\n\n - A remote code execution vulnerability exists in\n Microsoft COM for Windows when it fails to\n properly handle serialized objects. An attacker who\n successfully exploited the vulnerability could use a\n specially crafted file or script to perform actions. In\n an email attack scenario, an attacker could exploit the\n vulnerability by sending the specially crafted file to\n the user and convincing the user to open the file.\n (CVE-2018-0824)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate vSMB packet data. An attacker who successfully\n exploited these vulnerabilities could execute arbitrary\n code on a target operating system. To exploit these\n vulnerabilities, an attacker running inside a virtual\n machine could run a specially crafted application that\n could cause the Hyper-V host operating system to execute\n arbitrary code. The update addresses the vulnerabilities\n by correcting how Windows Hyper-V validates vSMB packet\n data. (CVE-2018-0961)\n\n - An information disclosure vulnerability exists when\n affected Microsoft browsers improperly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could obtain information to further\n compromise the users system. (CVE-2018-1025)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Internet Explorer. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)\n\n - An elevation of privilege vulnerability exists when the\n Windows Common Log File System (CLFS) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8167)\n\n - A security feature bypass vulnerability exists in\n Windows which could allow an attacker to bypass Device\n Guard. An attacker who successfully exploited this\n vulnerability could circumvent a User Mode Code\n Integrity (UMCI) policy on the machine. (CVE-2018-0958,\n CVE-2018-8129, CVE-2018-8132)\n\n - An information disclosure vulnerability exists when the\n Windows kernel improperly handles objects in memory. An\n attacker who successfully exploited this vulnerability\n could obtain information to further compromise the users\n system. (CVE-2018-8127)\n\n - A remote code execution vulnerability exists in the way\n that the VBScript engine handles objects in memory. The\n vulnerability could corrupt memory in such a way that an\n attacker could execute arbitrary code in the context of\n the current user. An attacker who successfully exploited\n the vulnerability could gain the same user rights as the\n current user. (CVE-2018-8174)\n\n - A security feature bypass vulnerability exists when\n Microsoft Edge improperly handles requests of different\n origins. The vulnerability allows Microsoft Edge to\n bypass Same-Origin Policy (SOP) restrictions, and to\n allow requests that should otherwise be ignored. An\n attacker who successfully exploited the vulnerability\n could force the browser to send data that would\n otherwise be restricted. (CVE-2018-8112)\n\n - A denial of service vulnerability exists when .NET and\n .NET Core improperly process XML documents. An attacker\n who successfully exploited this vulnerability could\n cause a denial of service against a .NET application. A\n remote unauthenticated attacker could exploit this\n vulnerability by issuing specially crafted requests to a\n .NET (or .NET core) application. The update addresses\n the vulnerability by correcting how .NET and .NET Core\n applications handle XML document processing.\n (CVE-2018-0765)\n\n - An elevation of privilege vulnerability exists when the\n Windows kernel fails to properly handle objects in\n memory. An attacker who successfully exploited this\n vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change,\n or delete data; or create new accounts with full user\n rights. (CVE-2018-8897)\n\n - An information disclosure vulnerability exists when\n Chakra improperly discloses the contents of its memory,\n which could provide an attacker with information to\n further compromise the users computer or data.\n (CVE-2018-8145)\n\n - A security feature bypass vulnerability exists in\n Windows Scripting Host which could allow an attacker to\n bypass Device Guard. An attacker who successfully\n exploited this vulnerability could circumvent a User\n Mode Code Integrity (UMCI) policy on the machine.\n (CVE-2018-0854)\n\n - An elevation of privilege vulnerability exists when the\n DirectX Graphics Kernel (DXGKRNL) driver improperly\n handles objects in memory. An attacker who successfully\n exploited this vulnerability could run processes in an\n elevated context. (CVE-2018-8165)\n\n - A remote code execution vulnerability exists in the way\n that Windows handles objects in memory. An attacker who\n successfully exploited the vulnerability could execute\n arbitrary code with elevated permissions on a target\n system. (CVE-2018-8136)\n\n - A remote code execution vulnerability exists in the way\n that the Chakra scripting engine handles objects in\n memory in Microsoft Edge. The vulnerability could\n corrupt memory in such a way that an attacker could\n execute arbitrary code in the context of the current\n user. An attacker who successfully exploited the\n vulnerability could gain the same user rights as the\n current user. (CVE-2018-0943, CVE-2018-8133)\n\n - An elevation of privilege vulnerability exists in\n Windows when the Win32k component fails to properly\n handle objects in memory. An attacker who successfully\n exploited this vulnerability could run arbitrary code in\n kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts\n with full user rights. (CVE-2018-8124, CVE-2018-8164,\n CVE-2018-8166)\n\n - A security feature bypass vulnerability exists when\n Internet Explorer fails to validate User Mode Code\n Integrity (UMCI) policies. The vulnerability could allow\n an attacker to bypass Device Guard UMCI policies.\n (CVE-2018-8126)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows Kernel API enforces permissions. An\n attacker who successfully exploited the vulnerability\n could impersonate processes, interject cross-process\n communication, or interrupt system functionality.\n (CVE-2018-8134)\n\n - A remote code execution vulnerability exists when\n Microsoft Edge improperly accesses objects in memory.\n The vulnerability could corrupt memory in such a way\n that enables an attacker to execute arbitrary code in\n the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-8179)\n\n - A remote code execution vulnerability exists in the way\n that the scripting engine handles objects in memory in\n Microsoft Edge. The vulnerability could corrupt memory\n in such a way that an attacker could execute arbitrary\n code in the context of the current user. An attacker who\n successfully exploited the vulnerability could gain the\n same user rights as the current user. (CVE-2018-0946,\n CVE-2018-0951, CVE-2018-0953, CVE-2018-8128,\n CVE-2018-8137)\n\n - A remote code execution vulnerability exists in the way\n the scripting engine handles objects in memory in\n Microsoft browsers. The vulnerability could corrupt\n memory in such a way that an attacker could execute\n arbitrary code in the context of the current user. An\n attacker who successfully exploited the vulnerability\n could gain the same user rights as the current user.\n (CVE-2018-0954, CVE-2018-1022)\n\n - A remote code execution vulnerability exists when\n Windows Hyper-V on a host server fails to properly\n validate input from an authenticated user on a guest\n operating system. (CVE-2018-0959)\n\n - An elevation of privilege vulnerability exists in the\n way that the Windows kernel image handles objects in\n memory. An attacker who successfully exploited the\n vulnerability could execute code with elevated\n permissions. (CVE-2018-8170)\");\n # https://support.microsoft.com/en-us/help/4103731/windows-10-update-kb4103731\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e6fc001a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB4103731.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-8136\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:edge\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-05\";\nkbs = make_list('4103731');\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"15063\",\n rollup_date:\"05_2018\",\n bulletin:bulletin,\n rollup_kb_list:[4103731])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-01-01T22:45:13", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service\u00a0against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>.</p><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6 for Windows Server 2008 SP2 require the d3dcompiler_47.dll update to be installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll update, see </span></span></span><a href=\"https://support.microsoft.com/en-us/help/4019478\"><span><span><span>KB 4019478</span></span></span></a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4095513\" managed-link=\"\">4095513</a>\u00a0<span>Description of the Security Only update for .NET Framework 2.0 SP2 and 3.0 SP2 for Windows Server 2008 SP2 (KB 4095513)</span></span></li><li><a href=\"https://support.microsoft.com/help/4095519\" managed-link=\"\">4095519</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.5.2 for Windows Server 2008 SP2 (KB 4095519)</span></li><li><a href=\"https://support.microsoft.com/help/4096237\" managed-link=\"\">4096237</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 (KB 4096237)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 3, "modified": "2018-06-18T18:39:29", "id": "KB4099640", "href": "https://support.microsoft.com/en-us/help/4099640/", "published": "2018-06-18T18:39:29", "title": "Security Only update for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 updates for Windows Server 2008 SP2 (KB 4099640)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:44:35", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Notice</h2><p><span>This update is included in the\u00a0June 2018 Preview of the Quality Rollups for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and\u00a0\u00a04.7.1 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (<a href=\"https://support.microsoft.com/help/4291497\">KB 4291497</a>). Parts of this update was previously included in the Security and Quality rollup (<a href=\"https://support.microsoft.com/help/4099635\">KB 4099635</a>) on May 8, 2018 and Preview of Quality rollup (<a href=\"https://support.microsoft.com/help/4103473\">KB 4103473</a>) on May 15, 2018.</span></p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>.</p><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span>All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_self\"><span><span><span>2919355</span></span></span></a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_self\"><span><span><span>2919355</span></span></span></a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future</span></span></span>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div> </div><ul><li><span><a href=\"https://support.microsoft.com/help/4095875\" managed-link=\"\">4095875</a> <span>Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows 8.1 and Server 2012 R2 (KB 4095875)</span></span></li><li><a href=\"https://support.microsoft.com/help/4095876\" managed-link=\"\">4095876</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4095876)</span></li><li><a href=\"https://support.microsoft.com/help/4096417\" managed-link=\"\">4096417</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4096417)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 7, "modified": "2018-06-21T20:09:16", "id": "KB4099635", "href": "https://support.microsoft.com/en-us/help/4099635/", "published": "2018-06-21T20:09:16", "title": "Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 updates for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4099635)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:51:29", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service\u00a0against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. <span><span><span><span>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>. </span></span></span></span></p><h2></h2><p><span class=\"text-base\">Important</span></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see </span></span></span><a href=\"https://support.microsoft.com/en-us/help/4019990\"><span><span>KB 4019990</span></span></a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions:</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4095514\" managed-link=\"\">4095514</a>\u00a0<span>Description of the Security Only update for .NET Framework 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4095514)</span></span></li><li><a href=\"https://support.microsoft.com/help/4095519\" managed-link=\"\">4095519</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB 4095519)</span></li><li><a href=\"https://support.microsoft.com/help/4096237\" managed-link=\"\">4096237</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 (KB 4096237)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 3, "modified": "2018-06-18T18:38:55", "id": "KB4099637", "href": "https://support.microsoft.com/en-us/help/4099637/", "published": "2018-06-18T18:38:55", "title": "Security Only update for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 updates for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4099637)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:39:10", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service\u00a0against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>.</p><h2></h2><p><span class=\"text-base\">Important</span></p><ul><li><span><span><span>All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_self\"><span><span><span>2919355</span></span></span></a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_self\"><span><span><span>2919355</span></span></span></a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future</span></span></span>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4095515\" managed-link=\"\">4095515</a>\u00a0<span>Description of the Security Only update for .NET Framework 3.5 SP1 for Windows 8.1 and Server 2012 R2 (KB 4095515)</span></span></li><li><a href=\"https://support.microsoft.com/help/4095517\" managed-link=\"\">4095517</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.5.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4095517)</span></li><li><a href=\"https://support.microsoft.com/help/4096236\" managed-link=\"\">4096236</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4096236)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 3, "modified": "2018-06-18T18:37:43", "id": "KB4099639", "href": "https://support.microsoft.com/en-us/help/4099639/", "published": "2018-06-18T18:37:43", "title": "Security Only update for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 updates for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4099639)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:38:40", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Notice</h2><p><span>This update is included in the\u00a0June 2018 Preview of the Quality Rollups for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and\u00a0\u00a04.7.1 for Windows Server 2012 (<a href=\"https://support.microsoft.com/help/4291495\">KB 4291495</a>). Parts of this update was previously included in the Security and Quality rollup (<a href=\"https://support.microsoft.com/help/4099634\">KB 4099634</a>) on May 8, 2018 and Preview of Quality rollup (<a href=\"https://support.microsoft.com/help/4098968\">KB 4098968</a>) on May 15, 2018.</span></p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>.</p><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see <a aria-live=\"rude\" data-bi-name=\"content-anchor-link\" data-content-id=\"4019990\" data-content-type=\"article\" href=\"https://support.microsoft.com/en-us/help/4019990\" managed-link=\"\" tabindex=\"0\">KB 4019990</a>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div> </div><ul><li><span><a href=\"https://support.microsoft.com/help/4095872\" managed-link=\"\">4095872</a> <span>Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows Server 2012 (KB 4095872)</span></span></li><li><a href=\"https://support.microsoft.com/help/4096494\" managed-link=\"\">4096494</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows Server 2012 (KB 4096494)</span></li><li><a href=\"https://support.microsoft.com/help/4096416\" managed-link=\"\">4096416</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows Server 2012 (KB 4096416)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 7, "modified": "2018-06-21T20:09:16", "id": "KB4099634", "href": "https://support.microsoft.com/en-us/help/4099634/", "published": "2018-06-21T20:09:16", "title": "Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 updates for Windows Server 2012 (KB 4099634)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:46:29", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Notice</h2><p><span>This update is included in the\u00a0June 2018 Preview of the Quality Rollups for .NET Framework 2.0, 3.0, 4.5.2 and 4.6 for Windows Server 2008 (<a href=\"https://support.microsoft.com/help/4291501\">KB 4291501</a>). Parts of this update was previously included in the Security and Quality rollup (<a href=\"https://support.microsoft.com/help/4099636\">KB 4099636</a>) on May 8, 2018 and Preview of Quality rollup (<a href=\"https://support.microsoft.com/help/4103474\">KB 4103474</a>) on May 15, 2018.</span></p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>.</p><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6 for Windows Server 2008 require the d3dcompiler_47.dll update to be installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll update, see </span></span></span><a href=\"https://support.microsoft.com/en-us/help/4019478\"><span><span><span>KB 4019478</span></span></span></a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div> </div><ul><li><span><a href=\"https://support.microsoft.com/help/4095873\" managed-link=\"\">4095873</a> </span><span>Description of the Security and Quality Rollup for .NET Framework 2.0 SP2 and 3.0 SP2 for Windows Server 2008 SP2 (KB 4095873)</span></li><li><a href=\"https://support.microsoft.com/help/4096495\" managed-link=\"\">4096495</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB 4096495)</span></li><li><a href=\"https://support.microsoft.com/help/4096418\" managed-link=\"\">4096418</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 for Windows 7 SP1 and Server 2008 R2 SP1, and for the .NET Framework 4.6 for Server 2008 (KB 4096418)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 8, "modified": "2018-06-21T20:09:16", "id": "KB4099636", "href": "https://support.microsoft.com/en-us/help/4099636/", "published": "2018-06-21T20:09:16", "title": "Security and Quality Rollup for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 updates for Windows Server 2008 SP2 (KB 4099636)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:51:29", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Notice</h2><p><span>This update is included in the\u00a0June 2018 Preview of the Quality Rollups for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and\u00a0\u00a04.7.1 for Windows 7 and Windows Server 2008 R2 (<a href=\"https://support.microsoft.com/help/4291493\">KB 4291493</a>). Parts of this update was previously included in the Security and Quality rollup (<a href=\"https://support.microsoft.com/help/4099633\">KB 4099633</a>) on May 8, 2018 and Preview of Quality rollup (<a href=\"https://support.microsoft.com/help/4103472\">KB 4103472</a>) on May 15, 2018.</span></p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. <span><span><span><span>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>. </span></span></span></span></p><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see <a aria-live=\"rude\" data-bi-name=\"content-anchor-link\" data-content-id=\"4019990\" data-content-type=\"article\" href=\"https://support.microsoft.com/en-us/help/4019990\" managed-link=\"\" tabindex=\"0\">KB 4019990</a>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div> </div><ul><li><span><a href=\"https://support.microsoft.com/help/4095874\" managed-link=\"\">4095874</a> <span>Description of the Security and Quality Rollup for .NET Framework 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4095874)</span></span></li><li><a href=\"https://support.microsoft.com/help/4096495\" managed-link=\"\">4096495</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 (KB 4096495)</span></li><li><a href=\"https://support.microsoft.com/help/4096418\" managed-link=\"\">4096418</a> <span>Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 (KB 4096418)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 8, "modified": "2018-06-21T20:09:16", "id": "KB4099633", "href": "https://support.microsoft.com/en-us/help/4099633/", "published": "2018-06-21T20:09:16", "title": "Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 updates for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4099633)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T22:47:37", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "<html><body><p>Resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack and a security feature bypass vulnerability in Windows.</p><h2>Summary</h2><p>This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service\u00a0against a .NET Framework application. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-0765\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0765</a>.</p><p>Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-1039\" id=\"kb-link-2\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1039</a>.</p><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see </span></span></span><a href=\"https://support.microsoft.com/en-us/help/4019990\"><span><span>KB 4019990</span></span></a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4095512\" managed-link=\"\">4095512</a>\u00a0<span>Description of the Security Only update for .NET Framework 3.5 SP1 for Windows Server 2012 (KB 4095512)</span></span></li><li><a href=\"https://support.microsoft.com/help/4095518\" managed-link=\"\">4095518</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.5.2 for Windows Server 2012 (KB 4095518)</span></li><li><a href=\"https://support.microsoft.com/help/4096235\" managed-link=\"\">4096235</a>\u00a0<span>Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows Server 2012 (KB 4096235)</span></li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 3, "modified": "2018-06-18T18:38:21", "id": "KB4099638", "href": "https://support.microsoft.com/en-us/help/4099638/", "published": "2018-06-18T18:38:21", "title": "Security Only update for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 updates for Windows Server 2012 (KB 4099638)", "type": "mskb", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "openvas": [{"lastseen": "2020-06-08T23:06:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing an important security\n update according to Microsoft KB4096418", "modified": "2020-06-04T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310813188", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813188", "type": "openvas", "title": "Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4096418)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4096418)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813188\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 14:47:38 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4096418)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4096418\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists,\n\n - An error when .NET and .NET Core improperly process XML documents.\n\n - An error in .Net Framework which could allow an attacker to bypass\n Device Guard.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker to cause a denial of service and circumvent a User Mode Code\n Integrity (UMCI) policy on the machine.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1\n\n - Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2\n\n - Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4096418\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008:3, win2008x64:3, win2008r2:2) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v4\\Full\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nversion = registry_get_sz(key:key, item:\"Version\");\nif(!version){\n exit(0);\n}\n\nif(((hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0) && (version =~ \"^4\\.(7|6)\"))||\n ((hotfix_check_sp(win2008:3, win2008x64:3) > 0) && (version =~ \"^4\\.6\")))\n{\n dotPath = registry_get_sz(key:key, item:\"InstallPath\");\n if(dotPath && \"Microsoft.NET\" >< dotPath)\n {\n dotPath = dotPath + \"SetupCache\\v\" + version;\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"sqmapi.dll\");\n if(dllVer && version_is_less(version:dllVer, test_version:\"6.2.9200.16384\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"\\sqmapi.dll\",\n file_version:dllVer, vulnerable_range:\"Less than 6.2.9200.16384\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-06-08T23:06:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing an important security\n update according to Microsoft KB4096495", "modified": "2020-06-04T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310813184", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813184", "type": "openvas", "title": "Microsoft .NET Framework 4.5.2 Security Feature Bypass And DoS Vulnerabilities", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework 4.5.2 Security Feature Bypass And DoS Vulnerabilities\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813184\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 14:50:29 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework 4.5.2 Security Feature Bypass And DoS Vulnerabilities\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4096495\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists due to,\n\n - An error when .NET and .NET Core improperly process XML documents.\n\n - An error In .Net Framework which could allow an attacker to bypass\n Device Guard.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker to cause a denial of service and circumvent a User Mode Code\n Integrity (UMCI) policy on the machine.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1\n\n - Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2\n\n - Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4096495\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008:3, win2008x64:3, win2008r2:2) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n sysdllVer = fetch_file_version(sysPath:dotPath, file_name:\"mscorlib.dll\");\n if(!sysdllVer){\n continue;\n }\n\n if(version_in_range(version:sysdllVer, test_version:\"4.0.30319.30000\", test_version2:\"4.0.30319.36439\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"mscorlib.dll\",\n file_version:sysdllVer, vulnerable_range:\"4.0.30319.30000 - 4.0.30319.36439\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-06-08T23:06:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing a critical security\n update according to Microsoft Security Updates KB4095874.", "modified": "2020-06-04T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310813226", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813226", "type": "openvas", "title": "Microsoft .NET Framework Multiple Vulnerabilities (KB4095874)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Multiple Vulnerabilities (KB4095874)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813226\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 13:04:50 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework Multiple Vulnerabilities (KB4095874)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft Security Updates KB4095874.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to,\n\n - .NET Framework (and .NET Core) components do not completely validate\n certificates.\n\n - .NET, and .NET core, improperly process XML documents.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service against a .NET application and also\n to bypass cetain security restrictions.\");\n\n script_tag(name:\"affected\", value:\"Microsoft .NET Framework 3.5.1.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4095874\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nkey2 = \"SOFTWARE\\Microsoft\\.NETFramework\\AssemblyFolders\\\";\nforeach item (registry_enum_keys(key:key2))\n{\n path = registry_get_sz(key:key2 + item, item:\"All Assemblies In\");\n if(path)\n {\n dllVer = fetch_file_version(sysPath:path, file_name:\"system.identitymodel.dll\");\n if(dllVer)\n {\n if(version_in_range(version:dllVer, test_version:\"3.0.4506.7082\", test_version2:\"3.0.4506.8788\"))\n {\n report = report_fixed_ver(file_checked:path + \"system.identitymodel.dll\",\n file_version:dllVer, vulnerable_range:\"3.0.4506.7082 - 3.0.4506.8788\");\n security_message(data:report);\n exit(0);\n }\n }\n }\n}\n\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing an important security\n update according to Microsoft KB4095876", "modified": "2019-05-03T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310813185", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813185", "type": "openvas", "title": "Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095876)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095876)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813185\");\n script_version(\"2019-05-03T08:55:39+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-03 08:55:39 +0000 (Fri, 03 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 14:52:36 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework Security Feature Bypass And DoS Vulnerabilities (KB4095876)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4095876\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - .NET, and .NET core, improperly process XML documents.\n\n - An error .Net Framework which could allow an attacker to bypass Device Guard\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker who successfully exploited this vulnerability to cause a denial\n of service against a .NET application and also to bypass security.\");\n\n script_tag(name:\"affected\", value:\".NET Framework 4.5.2 for Windows 8.1, and Server 2012 R2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4095876\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n sysdllVer = fetch_file_version(sysPath:dotPath, file_name:\"mscorlib.dll\");\n if(!sysdllVer){\n continue;\n }\n\n if(version_in_range(version:sysdllVer, test_version:\"4.0.30319.30000\", test_version2:\"4.0.30319.36439\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"mscorlib.dll\",\n file_version:sysdllVer, vulnerable_range:\"4.0.30319.30000 - 4.0.30319.36439\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-06-08T23:06:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing an important security\n update according to Microsoft KB4096494", "modified": "2020-06-04T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310812877", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812877", "type": "openvas", "title": "Microsoft Windows Server 2012 Multiple Vulnerabilities (KB4096494)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Server 2012 Multiple Vulnerabilities (KB4096494)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812877\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 14:44:59 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft Windows Server 2012 Multiple Vulnerabilities (KB4096494)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4096494\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists,\n\n - When .NET and .NET Core improperly process XML documents and\n\n - In .Net Framework which could allow an attacker to bypass Device Guard.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker to cause a denial of service and circumvent a User Mode Code\n Integrity (UMCI) policy on the machine.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Windows Server 2012.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4096494\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2012:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nfileVer = fetch_file_version(sysPath:sysPath, file_name:\"mscorlib.dll\");\nif(!fileVer){\n exit(0);\n}\n\nif(version_is_less(version:fileVer, test_version:\"4.0.30319.36440\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\mscorlib.dll\",\n file_version:fileVer, vulnerable_range:\"Less than 4.0.30319.36440\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-06-08T23:06:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing an important security\n update according to Microsoft KB4095873", "modified": "2020-06-04T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310812876", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812876", "type": "openvas", "title": "Microsoft .NET Framework Multiple Vulnerabilities (KB4095873)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Multiple Vulnerabilities (KB4095873)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812876\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 13:39:10 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework Multiple Vulnerabilities (KB4095873)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4095873\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists,\n\n - When .NET and .NET Core improperly process XML documents and\n\n - In .Net Framework which could allow an attacker to bypass\n Device Guard.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker to cause a denial of service and circumvent a User Mode Code\n Integrity (UMCI) policy on the machine.\");\n script_tag(name:\"affected\", value:\"- Microsoft .NET Framework 3.0 Service Pack 2 on Microsoft Windows Server 2008\n\n - Microsoft .NET Framework 2.0 Service Pack 2 on Microsoft Windows Server 2008\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4095873\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2008:3, win2008x64:3) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n path = registry_get_sz(key:key + item, item:\"Path\");\n if(path && \"\\Microsoft.NET\\Framework\" >< path)\n {\n dllVer = fetch_file_version(sysPath:path, file_name:\"mscorlib.dll\");\n if(dllVer)\n {\n if(version_in_range(version:dllVer, test_version:\"2.0.50727.5700\", test_version2:\"2.0.50727.8783\"))\n {\n report = report_fixed_ver(file_checked:path + \"\\mscorlib.dll\",\n file_version:dllVer, vulnerable_range:\"2.0.50727.5700 - 2.0.50727.8783\");\n security_message(data:report);\n exit(0);\n }\n }\n }\n}\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765", "CVE-2018-1039"], "description": "This host is missing an important security\n update according to Microsoft KB4095872", "modified": "2019-05-03T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310813186", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813186", "type": "openvas", "title": "Microsoft .NET Framework 3.5 SP1 for Windows Server 2012 (KB4095872)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework 3.5 SP1 for Windows Server 2012 (KB4095872)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813186\");\n script_version(\"2019-05-03T08:55:39+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-1039\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-03 08:55:39 +0000 (Fri, 03 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 14:55:37 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft .NET Framework 3.5 SP1 for Windows Server 2012 (KB4095872)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4095872\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - .NET, and .NET core, improperly process XML documents.\n\n - An error .Net Framework which could allow an attacker to bypass Device Guard\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an\n attacker who successfully exploited this vulnerability to cause a denial\n of service against a .NET application and also to bypass security.\");\n\n script_tag(name:\"affected\", value:\".NET Framework 3.5 SP1 for Windows Server 2012\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4095872\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2012:1) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n sysdllVer = fetch_file_version(sysPath:dotPath, file_name:\"mscorlib.dll\");\n if(!sysdllVer){\n continue;\n }\n\n if(version_in_range(version:sysdllVer, test_version:\"2.0.50727.5700\", test_version2:\"2.0.50727.8783\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"\\mscorlib.dll\",\n file_version:sysdllVer, vulnerable_range:\"2.0.50727.5700 - 2.0.50727.8783\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765"], "description": "This host is installed with ASP.NET Core\n and is prone to a denial of service vulnerability.", "modified": "2019-05-17T00:00:00", "published": "2018-05-15T00:00:00", "id": "OPENVAS:1361412562310813189", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813189", "type": "openvas", "title": "ASP.NET Core Denial of Service Vulnerability May18 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# ASP.NET Core Denial of Service Vulnerability May18 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n##########################################################################\nCPE = \"cpe:/a:microsoft:asp.net_core\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813189\");\n script_version(\"2019-05-17T10:45:27+0000\");\n script_cve_id(\"CVE-2018-0765\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 10:45:27 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-15 14:16:59 +0530 (Tue, 15 May 2018)\");\n script_name(\"ASP.NET Core Denial of Service Vulnerability May18 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with ASP.NET Core\n and is prone to a denial of service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error when .NET\n and .NET Core improperly process XML documents.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to cause a denial of service against a .NET application.\");\n\n script_tag(name:\"affected\", value:\"ASP.NET Core 2.0 prior to version 2.0.8\");\n\n script_tag(name:\"solution\", value:\"Upgrade to ASP.NET Core 2.0 to version\n 2.0.8 or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765\");\n script_xref(name:\"URL\", value:\"https://github.com/dotnet/announcements/issues/67\");\n script_xref(name:\"URL\", value:\"https://github.com/dotnet/core/blob/master/release-notes/download-archives/2.1.200-sdk-download.md\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows\");\n script_dependencies(\"gb_asp_dotnet_core_detect_win.nasl\");\n script_mandatory_keys(\"ASP.NET/Core/Ver\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE, version_regex:\"[0-9]+\\.[0-9]+\\.[0-9]+\")) exit(0);\ncoreVers = infos['version'];\npath = infos['location'];\n\nif(coreVers =~ \"^(2\\.0)\" && version_is_less(version:coreVers, test_version:\"2.0.8\"))\n{\n report = report_fixed_ver(installed_version:coreVers, fixed_version:\"2.0.8\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0765"], "description": "This host is installed with .NET Core SDK\n and is prone to a denial of service vulnerability.", "modified": "2019-05-17T00:00:00", "published": "2018-05-15T00:00:00", "id": "OPENVAS:1361412562310813190", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813190", "type": "openvas", "title": ".NET Core SDK Denial of Service Vulnerability (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# .NET Core SDK Denial of Service Vulnerability (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n##########################################################################\nCPE = \"cpe:/a:microsoft:.netcore_sdk\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813190\");\n script_version(\"2019-05-17T10:45:27+0000\");\n script_cve_id(\"CVE-2018-0765\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-17 10:45:27 +0000 (Fri, 17 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-15 14:17:38 +0530 (Tue, 15 May 2018)\");\n script_name(\".NET Core SDK Denial of Service Vulnerability (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with .NET Core SDK\n and is prone to a denial of service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to an error when .NET\n and .NET Core improperly process XML documents.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to cause a denial of service against a .NET application.\");\n\n script_tag(name:\"affected\", value:\".NET Core SDK 2.x prior to version 2.1.200\");\n\n script_tag(name:\"solution\", value:\"Upgrade to .NET Core SDK to version 2.1.200\n or later. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765\");\n script_xref(name:\"URL\", value:\"https://github.com/dotnet/announcements/issues/67\");\n script_xref(name:\"URL\", value:\"https://github.com/dotnet/core/blob/master/release-notes/download-archives/2.1.200-sdk-download.md\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows\");\n script_dependencies(\"gb_asp_dotnet_core_detect_win.nasl\");\n script_mandatory_keys(\".NET/Core/SDK/Ver\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\ncoreVers = infos['version'];\npath = infos['location'];\n\nif(coreVers =~ \"^(2\\.)\" && version_is_less(version:coreVers, test_version:\"2.1.200\"))\n{\n report = report_fixed_ver(installed_version:coreVers, fixed_version:\"2.1.200\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-01-08T13:28:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0959", "CVE-2018-0765", "CVE-2018-8174", "CVE-2018-8134", "CVE-2018-0961", "CVE-2018-0854", "CVE-2018-8136", "CVE-2018-8126", "CVE-2018-0824", "CVE-2018-8164", "CVE-2018-8178", "CVE-2018-8132", "CVE-2018-0955", "CVE-2018-8179", "CVE-2018-0951", "CVE-2018-0954", "CVE-2018-8127", "CVE-2018-8165", "CVE-2018-0953", "CVE-2018-8124", "CVE-2018-8112", "CVE-2018-8133", "CVE-2018-0958", "CVE-2018-8145", "CVE-2018-1039", "CVE-2018-8897", "CVE-2018-8122", "CVE-2018-8167", "CVE-2018-8166", "CVE-2017-11927", "CVE-2018-8129", "CVE-2018-0886", "CVE-2018-8137", "CVE-2018-1022", "CVE-2018-8114", "CVE-2018-0943", "CVE-2018-1025"], "description": "This host is missing a critical security\n update according to Microsoft KB4103723", "modified": "2019-12-20T00:00:00", "published": "2018-05-09T00:00:00", "id": "OPENVAS:1361412562310813340", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813340", "type": "openvas", "title": "Microsoft Windows Multiple Vulnerabilities (KB4103723)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Multiple Vulnerabilities (KB4103723)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813340\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2018-0765\", \"CVE-2018-0954\", \"CVE-2018-0955\", \"CVE-2018-0958\",\n \"CVE-2018-0959\", \"CVE-2018-0961\", \"CVE-2018-1022\", \"CVE-2018-1025\",\n \"CVE-2018-1039\", \"CVE-2018-8112\", \"CVE-2018-8114\", \"CVE-2018-8122\",\n \"CVE-2018-8124\", \"CVE-2018-8126\", \"CVE-2018-8127\", \"CVE-2018-8129\",\n \"CVE-2018-8132\", \"CVE-2018-8133\", \"CVE-2018-8134\", \"CVE-2018-8136\",\n \"CVE-2018-8137\", \"CVE-2018-8145\", \"CVE-2018-8164\", \"CVE-2018-8165\",\n \"CVE-2018-8166\", \"CVE-2018-8167\", \"CVE-2018-8174\", \"CVE-2018-8178\",\n \"CVE-2018-8179\", \"CVE-2018-8897\", \"CVE-2018-0824\", \"CVE-2018-0854\",\n \"CVE-2018-0943\", \"CVE-2018-0951\", \"CVE-2018-0953\", \"CVE-2017-11927\",\n \"CVE-2018-0886\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-05-09 10:00:32 +0530 (Wed, 09 May 2018)\");\n script_name(\"Microsoft Windows Multiple Vulnerabilities (KB4103723)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft KB4103723\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists due to,\n\n - Windows Common Log File System (CLFS) driver improperly handles objects in\n memory.\n\n - The Win32k component fails to properly handle objects in memory.\n\n - The DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects\n in memory.\n\n - Windows kernel fails to properly handle objects in memory.\n\n - Chakra improperly discloses the contents of its memory.\n\n - Scripting engine improperly handles objects in memory in microsoft browsers.\n\n - Internet Explorer fails to validate User Mode Code Integrity (UMCI) policies.\n\n - Microsoft browsers improperly handle objects in memory.\n\n - Windows Hyper-V on a host server fails to properly validate vSMB packet data.\n\n - Chakra scripting engine improperly handles objects in memory.\n\n - Windows Kernel API improperly enforces permissions.\n\n - Windows Hyper-V on a host server fails to properly validate input from an\n authenticated user on a guest operating system.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to run processes in an elevated context, run arbitrary code in kernel mode,\n bypass security restrictions, obtain information to further compromise the\n user's system, interrupt system functionality and cause denial of service\n condition.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 10 Version 1607 x32/x64\n\n - Microsoft Windows Server 2016\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4103723\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1, win10x64:1, win2016:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nedgeVer = fetch_file_version(sysPath:sysPath, file_name:\"edgehtml.dll\");\nif(!edgeVer){\n exit(0);\n}\n\nif(version_in_range(version:edgeVer, test_version:\"11.0.14393.0\", test_version2:\"11.0.14393.2247\"))\n{\n report = report_fixed_ver(file_checked:sysPath + \"\\Edgehtml.dll\",\n file_version:edgeVer, vulnerable_range:\"11.0.14393.0 - 11.0.14393.2247\");\n security_message(data:report);\n exit(0);\n}\nexit(99);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T11:49:54", "bulletinFamily": "info", "cvelist": ["CVE-2018-0765", "CVE-2018-8119", "CVE-2018-1039"], "description": "### *Detect date*:\n05/08/2018\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, cause denial of service.\n\n### *Affected products*:\nMicrosoft .NET Framework 4.7.2 \n.NET Core 2.0 \nMicrosoft .NET Framework 2.0 Service Pack 2 \nMicrosoft .NET Framework 3.0 Service Pack 2 \nMicrosoft .NET Framework 3.5 \nMicrosoft .NET Framework 3.5.1 \nMicrosoft .NET Framework 4.5.2 \nMicrosoft .NET Framework 4.6 \nMicrosoft .NET Framework 4.7.1 \nC# SDK for Azure IoT \nMicrosoft .NET Framework 4.6.2/4.7/4.7.1 \nMicrosoft .NET Framework 4.6/4.6.1/4.6.2 \nJava SDK for Azure IoT \nMicrosoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1 \nMicrosoft .NET Framework 4.7/4.7.1 \nC SDK for Azure IoT\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2018-8119](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8119>) \n[CVE-2018-1039](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1039>) \n[CVE-2018-0765](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0765>) \n\n\n### *Impacts*:\nDoS \n\n### *Related products*:\n[Microsoft .NET Framework](<https://threats.kaspersky.com/en/product/Microsoft-.NET-Framework/>)\n\n### *CVE-IDS*:\n[CVE-2018-0765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0765>)0.0Unknown \n[CVE-2018-1039](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1039>)0.0Unknown \n[CVE-2018-8119](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8119>)0.0Unknown\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[4103723](<http://support.microsoft.com/kb/4103723>) \n[4103716](<http://support.microsoft.com/kb/4103716>) \n[4103731](<http://support.microsoft.com/kb/4103731>) \n[4103721](<http://support.microsoft.com/kb/4103721>) \n[4103727](<http://support.microsoft.com/kb/4103727>) \n[4095873](<http://support.microsoft.com/kb/4095873>) \n[4095513](<http://support.microsoft.com/kb/4095513>) \n[4095872](<http://support.microsoft.com/kb/4095872>) \n[4095512](<http://support.microsoft.com/kb/4095512>) \n[4095875](<http://support.microsoft.com/kb/4095875>) \n[4095515](<http://support.microsoft.com/kb/4095515>) \n[4095874](<http://support.microsoft.com/kb/4095874>) \n[4095514](<http://support.microsoft.com/kb/4095514>) \n[4095876](<http://support.microsoft.com/kb/4095876>) \n[4095517](<http://support.microsoft.com/kb/4095517>) \n[4096495](<http://support.microsoft.com/kb/4096495>) \n[4095519](<http://support.microsoft.com/kb/4095519>) \n[4096494](<http://support.microsoft.com/kb/4096494>) \n[4095518](<http://support.microsoft.com/kb/4095518>) \n[4096236](<http://support.microsoft.com/kb/4096236>) \n[4096237](<http://support.microsoft.com/kb/4096237>) \n[4096235](<http://support.microsoft.com/kb/4096235>) \n[4096416](<http://support.microsoft.com/kb/4096416>) \n[4096417](<http://support.microsoft.com/kb/4096417>) \n[4096418](<http://support.microsoft.com/kb/4096418>)", "edition": 34, "modified": "2020-07-22T00:00:00", "published": "2018-05-08T00:00:00", "id": "KLA11248", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11248", "title": "\r KLA11248Multiple vulnerabilities in Microsoft Developer Tools ", "type": "kaspersky", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "github": [{"lastseen": "2020-12-24T13:32:59", "bulletinFamily": "software", "cvelist": ["CVE-2018-0765"], "description": "A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka \".NET and .NET Core Denial of Service Vulnerability.\" This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.", "edition": 3, "modified": "2019-07-03T21:02:04", "published": "2018-10-16T19:54:06", "id": "GHSA-35HC-X2CW-2J4V", "href": "https://github.com/advisories/GHSA-35hc-x2cw-2j4v", "title": "Moderate severity vulnerability that affects System.Security.Cryptography.Xml", "type": "github", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "trendmicroblog": [{"lastseen": "2018-05-11T17:14:43", "bulletinFamily": "blog", "cvelist": ["CVE-2018-0765", "CVE-2018-0824", "CVE-2018-0854", "CVE-2018-0905", "CVE-2018-0943", "CVE-2018-0945", "CVE-2018-0946", "CVE-2018-0951", "CVE-2018-0953", "CVE-2018-0954", "CVE-2018-0955", "CVE-2018-0958", "CVE-2018-0959", "CVE-2018-0961", "CVE-2018-1021", "CVE-2018-1022", "CVE-2018-1025", "CVE-2018-1039", "CVE-2018-8112", "CVE-2018-8114", "CVE-2018-8119", "CVE-2018-8120", "CVE-2018-8122", "CVE-2018-8123", "CVE-2018-8124", "CVE-2018-8126", "CVE-2018-8127", "CVE-2018-8128", "CVE-2018-8129", "CVE-2018-8130", "CVE-2018-8132", "CVE-2018-8133", "CVE-2018-8134", "CVE-2018-8136", "CVE-2018-8137", "CVE-2018-8139", "CVE-2018-8145", "CVE-2018-8147", "CVE-2018-8148", "CVE-2018-8149", "CVE-2018-8150", "CVE-2018-8151", "CVE-2018-8152", "CVE-2018-8153", "CVE-2018-8154", "CVE-2018-8155", "CVE-2018-8156", "CVE-2018-8157", "CVE-2018-8158", "CVE-2018-8159", "CVE-2018-8160", "CVE-2018-8161", "CVE-2018-8162", "CVE-2018-8163", "CVE-2018-8164", "CVE-2018-8165", "CVE-2018-8166", "CVE-2018-8167", "CVE-2018-8168", "CVE-2018-8170", "CVE-2018-8173", "CVE-2018-8174", "CVE-2018-8177", "CVE-2018-8178", "CVE-2018-8179", "CVE-2018-8897"], "description": "\n\nThis week marked National Teacher Appreciation Week here in the United States. I was happy to see that many other countries celebrate educators in all the other months of the year. All of us have at least one teacher, instructor or professor who really made a difference in our lives. There are two for me, and while they may not remember me out of the thousands they taught over the years, I definitely remember them. The first one helped me realize that I could write, and had me focus my frustration through poetry and essays as a 10-year-old moving from a city of almost two million (at the time) to a small town with 3,000 people trying to fit in. The second one validated my love for writing and journalism in college, encouraged me to ask the tough questions (don\u2019t forget the five Ws and the H!) and reminded me to never bury the lead. He never forgave me for \u201cgoing to the dark side\u201d \u2013 that was _his_ definition for marketing \u2013 but told me that as long as I\u2019m still writing in some capacity, he was happy.\n\nIt\u2019s only fitting that during National Teach Appreciation week that the University of Texas at San Antonio announced its plans to open a new cybersecurity center for government agencies and businesses seeking future cybersecurity workers and research. The space may potentially host a startup incubator, a computing center for research, data visualization lab and other research and training facilities. With a predicted 3.5 million unfilled cybersecurity positions by the year 2021, according to the Cybersecurity Jobs Report 2018-2021, we need all the help we can get to stay ahead of sophisticated cyber threats. You can learn more about the new center [here](<https://www.utsa.edu/today/2018/04/story/NSCC.html>).\n\n**TippingPoint Operating System (TOS) v5.0.3**\n\nLate last week, we released TOS v5.0.3 build 4867 for the TippingPoint TX-Series devices (8200TX/8400TX). For a complete list of enhancements and changes, customers can refer to the product Release Notes located on the [Threat Management Center (TMC)](<https://tmc.tippingpoint.com/TMC/>) website. Customers with any concerns or questions can contact the Trend Micro TippingPoint Technical Assistance Center (TAC).\n\n**Microsoft Security Updates**\n\nThis week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for Microsoft updates released on or before May 8, 2018. It was another busy month for Microsoft with 68 security patches covering Internet Explorer (IE), Edge, ChakraCore, Hyper-V Server, Windows, Visual Studio, Microsoft Office and Office Services and Web Apps, and the Azure IoT SDK. Of these 68 CVEs, 21 are listed as Critical, 45 are rated Important, and two are listed as Low in severity. Eleven of these CVEs came through the ZDI program. The following table maps Digital Vaccine filters to the Microsoft updates. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 [May 2018 Security Update Review](<https://www.zerodayinitiative.com/blog/2018/5/8/the-may-2018-security-update-review>) from the Zero Day Initiative:\n\n**CVE #** | **Digital Vaccine Filter #** | **Status** \n---|---|--- \nCVE-2018-0765 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0824 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0854 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0905 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0943 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0945 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0946 | 31487 | \nCVE-2018-0951 | 31488 | \nCVE-2018-0953 | 31489 | \nCVE-2018-0954 | 31490 | \nCVE-2018-0955 | 31563 | \nCVE-2018-0958 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0959 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0961 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1021 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1022 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1025 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1039 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8112 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8114 | 31491 | \nCVE-2018-8119 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8120 | 31562 | \nCVE-2018-8122 | 31492 | \nCVE-2018-8123 | 31552 | \nCVE-2018-8124 | 31558 | \nCVE-2018-8126 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8127 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8128 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8129 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8130 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8132 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8133 | 31494 | \nCVE-2018-8134 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8136 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8137 | 31617 | \nCVE-2018-8139 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8145 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8147 | 31554 | \nCVE-2018-8148 | 31555 | \nCVE-2018-8149 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8150 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8151 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8152 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8153 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8154 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8155 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8156 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8157 | 31556 | \nCVE-2018-8158 | 31557 | \nCVE-2018-8159 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8160 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8161 | 31573 | \nCVE-2018-8162 | 31559 | \nCVE-2018-8163 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8164 | 31561 | \nCVE-2018-8165 | 31571 | \nCVE-2018-8166 | 31572 | \nCVE-2018-8167 | 31560 | \nCVE-2018-8168 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8170 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8173 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8174 | 31493 | \nCVE-2018-8177 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8178 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8179 | 31498 | \nCVE-2018-8897 | | Vendor Deemed Reproducibility or Exploitation Unlikely \n \n** **\n\n**Zero-Day Filters**\n\nThere are two new zero-day filters covering one vendor in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of [published advisories](<http://www.zerodayinitiative.com/advisories/published/>) and [upcoming advisories](<http://www.zerodayinitiative.com/advisories/upcoming/>) on the [Zero Day Initiative](<http://www.zerodayinitiative.com/>) website. You can also follow the Zero Day Initiative on Twitter [@thezdi](<https://twitter.com/thezdi>) and on their [blog](<https://www.zerodayinitiative.com/blog>).\n\n**_Trend Micro (2)_**\n\n| \n\n * 31495: ZDI-CAN-5550 Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)\n * 31496: ZDI-CAN-5551 Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway) \n---|--- \n| \n \n**Missed Last Week\u2019s News?**\n\nCatch up on last week\u2019s news in my [weekly recap](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-april-30-2018/>).\n\nThe post [TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 7, 2018](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-7-2018/>) appeared first on [](<https://blog.trendmicro.com>).", "modified": "2018-05-11T15:37:20", "published": "2018-05-11T15:37:20", "id": "TRENDMICROBLOG:0CB92F2EE8EC7EB60BEEAFE3A0B1926F", "href": "https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-may-7-2018/", "type": "trendmicroblog", "title": "TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of May 7, 2018", "cvss": {"score": 0.0, "vector": "NONE"}}], "talosblog": [{"lastseen": "2018-06-23T08:19:16", "bulletinFamily": "blog", "cvelist": ["CVE-2018-0765", "CVE-2018-0824", "CVE-2018-0854", "CVE-2018-0943", "CVE-2018-0945", "CVE-2018-0946", "CVE-2018-0951", "CVE-2018-0953", "CVE-2018-0954", "CVE-2018-0955", "CVE-2018-0958", "CVE-2018-0959", "CVE-2018-0961", "CVE-2018-1021", "CVE-2018-1022", "CVE-2018-1025", "CVE-2018-1039", "CVE-2018-4944", "CVE-2018-8112", "CVE-2018-8114", "CVE-2018-8115", "CVE-2018-8119", "CVE-2018-8120", "CVE-2018-8122", "CVE-2018-8123", "CVE-2018-8124", "CVE-2018-8126", "CVE-2018-8127", "CVE-2018-8128", "CVE-2018-8129", "CVE-2018-8130", "CVE-2018-8132", "CVE-2018-8133", "CVE-2018-8134", "CVE-2018-8137", "CVE-2018-8139", "CVE-2018-8141", "CVE-2018-8145", "CVE-2018-8147", "CVE-2018-8148", "CVE-2018-8149", "CVE-2018-8150", "CVE-2018-8151", "CVE-2018-8152", "CVE-2018-8155", "CVE-2018-8156", "CVE-2018-8157", "CVE-2018-8158", "CVE-2018-8159", "CVE-2018-8160", "CVE-2018-8161", "CVE-2018-8162", "CVE-2018-8163", "CVE-2018-8164", "CVE-2018-8165", "CVE-2018-8166", "CVE-2018-8167", "CVE-2018-8170", "CVE-2018-8173", "CVE-2018-8174", "CVE-2018-8177", "CVE-2018-8178", "CVE-2018-8179", "CVE-2018-8897"], "description": "Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 67 new vulnerabilities, with 21 of them rated critical, 42 of them rated important, and four rated as low severity. These vulnerabilities impact Outlook, Office, Exchange, Edge, Internet Explorer and more.\n\n \n\n\nIn addition to the 67 vulnerabilities referenced above, Microsoft has also released a critical update advisory, [ADV180008](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180008>), which addresses the vulnerability CVE-2018-4944 described in the Adobe security bulletin [APSB18-16](<http://helpx.adobe.com/security/products/flash-player/apsb18-16.html>).\n\n \n \n \n\n\n### Critical Vulnerabilities\n\nThis month, Microsoft is addressing 21 vulnerabilities that are rated as critical. Talos believes one of these is notable and requires prompt attention.\n\n \n\n\n[CVE-2018-8174](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8174>) \\- Windows VBScript Engine Remote Code Execution Vulnerability.\n\nA remote code execution vulnerability exists in the VBScript scripting engine (vbscript.dll) of Windows. This vulnerability allows an attacker to include malicious VBScript within a website or embedded within an Office file, which when executed allows an attacker to execute arbitrary code in the context of the current user. Threat actors are currently exploiting this vulnerability.\n\n \n\n\nOther vulnerabilities rated as critical are listed below:\n\n \n\n\n[CVE-2018-0959](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0959>) \\- Hyper-V Remote Code Execution Vulnerability \n[CVE-2018-0961](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0961>) \\- Hyper-V vSMB Remote Code Execution Vulnerability \n[CVE-2018-8115](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8115>) \\- Windows Host Compute Service Shim Remote Code Execution Vulnerability \n[CVE-2018-8178](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8178>) \\- Microsoft Browser Memory Corruption Vulnerability \n[CVE-2018-0946](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0946>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-0951](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0951>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-0953](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0953>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-0954](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0954>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-0955](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0955>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8114](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8114>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8122](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8122>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8137](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8137>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-0945](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0945>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-1022](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1022>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8139](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8139>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8128](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8128>) \\- Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8133](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8133>) \\- Chakra Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-0943](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0943>) \\- Chakra Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8130](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8130>) \\- Chakra Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8177](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8177>) \\- Chakra Scripting Engine Memory Corruption Vulnerability\n\n \n\n\n### Important Vulnerabilities\n\n \n\n\nThis month, Microsoft is addressing 42 vulnerabilities that are rated important.\n\n \n\n\n[CVE-2018-8120](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120>) \\- Win32k Elevation of Privilege Vulnerability \n[CVE-2018-8123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8123>) \\- Microsoft Edge Memory Corruption Vulnerability \n[CVE-2018-8124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8124>) \\- Win32k Elevation of Privilege Vulnerability \n[CVE-2018-8147](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8147>) \\- Microsoft Excel Remote Code Execution Vulnerability \n[CVE-2018-8148](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8148>) \\- Microsoft Excel Remote Code Execution Vulnerability \n[CVE-2018-8157](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8157>) \\- Microsoft Office Remote Code Execution Vulnerability \n[CVE-2018-8158](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8158>) \\- Microsoft Office Remote Code Execution Vulnerability \n[CVE-2018-8161](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8161>) \\- Microsoft Office Remote Code Execution Vulnerability \n[CVE-2018-8162](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8162>) \\- Microsoft Excel Remote Code Execution Vulnerability \n[CVE-2018-8164](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8164>) \\- Win32k Elevation of Privilege Vulnerability \n[CVE-2018-8165](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8165>) \\- DirectX Graphics Kernel Elevation of Privilege Vulnerability \n[CVE-2018-8166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8166>) \\- Win32k Elevation of Privilege Vulnerability \n[CVE-2018-8167](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8167>) \\- Windows Common Log File System Driver Elevation of Privilege Vulnerability \n[CVE-2018-8179](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8179>) \\- Microsoft Edge Memory Corruption Vulnerability \n[CVE-2018-0765](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765>) \\- .NET and .NET Core Denial of Service Vulnerability \n[CVE-2018-0824](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0824>) \\- Microsoft COM for Windows Remote Code Execution Vulnerability \n[CVE-2018-0854](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0854>) \\- Windows Security Feature Bypass Vulnerability \n[CVE-2018-0958](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0958>) \\- Windows Security Feature Bypass Vulnerability \n[CVE-2018-1021](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1021>) \\- Microsoft Edge Information Disclosure Vulnerability \n[CVE-2018-1025](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1025>) \\- Microsoft Browser Information Disclosure Vulnerability \n[CVE-2018-1039](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1039>) \\- .NET Framework Device Guard Security Feature Bypass Vulnerability \n[CVE-2018-8112](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8112>) \\- Microsoft Edge Security Feature Bypass Vulnerability \n[CVE-2018-8119](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119>) \\- Azure IoT SDK Spoofing Vulnerability \n[CVE-2018-8126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8126>) \\- Internet Explorer Security Feature Bypass Vulnerability \n[CVE-2018-8127](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8127>) \\- Windows Kernel Information Disclosure Vulnerability \n[CVE-2018-8129](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8129>) \\- Windows Security Feature Bypass Vulnerability \n[CVE-2018-8132](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8132>) \\- Windows Security Feature Bypass Vulnerability \n[CVE-2018-8134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8134>) \\- Windows Elevation of Privilege Vulnerability \n[CVE-2018-8141](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8141>) \\- Windows Kernel Information Disclosure Vulnerability \n[CVE-2018-8145](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8145>) \\- Chakra Scripting Engine Memory Corruption Vulnerability \n[CVE-2018-8149](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8149>) \\- Microsoft SharePoint Elevation of Privilege Vulnerability \n[CVE-2018-8150](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8150>) \\- Microsoft Outlook Security Feature Bypass Vulnerability \n[CVE-2018-8151](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8151>) \\- Microsoft Exchange Memory Corruption Vulnerability \n[CVE-2018-8152](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8152>) \\- Microsoft Exchange Server Elevation of Privilege Vulnerability \n[CVE-2018-8155](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8155>) \\- Microsoft SharePoint Elevation of Privilege Vulnerability \n[CVE-2018-8156](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8156>) \\- Microsoft SharePoint Elevation of Privilege Vulnerability \n[CVE-2018-8159](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8159>) \\- Microsoft Exchange Elevation of Privilege Vulnerability \n[CVE-2018-8160](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8160>) \\- Microsoft Outlook Information Disclosure Vulnerability \n[CVE-2018-8163](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8163>) \\- Microsoft Excel Information Disclosure Vulnerability \n[CVE-2018-8170](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8170>) \\- Windows Image Elevation of Privilege Vulnerability \n[CVE-2018-8173](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8173>) \\- Microsoft InfoPath Remote Code Execution Vulnerability \n[CVE-2018-8897](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897>) \\- Windows Kernel Elevation of Privilege Vulnerability\n\n \n\n\n### Coverage\n\nIn response to these vulnerability disclosures, Talos is releasing the following Snort rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.\n\n \n\n\nSnort Rules:\n\n 46538 - 46539, \n 46544 - 46549, \n 46552 - 46565, \n 46594 - 46597, \n 46601 - 46604\n\n \n\n\n[](<http://feeds.feedburner.com/~ff/feedburner/Talos?a=Jg0FgcbhKyU:Y3ogHkaR8p0:yIl2AUoC8zA>)\n\n", "modified": "2018-05-09T08:42:37", "published": "2018-05-08T12:02:00", "id": "TALOSBLOG:C19AB95C902B2507E8156BE7B09BE73B", "href": "http://feedproxy.google.com/~r/feedburner/Talos/~3/Jg0FgcbhKyU/microsoft-patch-tuesday-may-2018.html", "type": "talosblog", "title": "Microsoft Patch Tuesday - May 2018", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}