- Total Plugins 68,728
Microsoft Windows Multiple Vulnerabilities (KB4511553)
Windows : Microsoft Bulletins
- ID: 1.3.6.1.4.1.25623.1.0.815437
CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
Summary:
This host is missing a critical security
update according to Microsoft KB4511553
Detection Method:
Checks if a vulnerable version is present
on the target host.
Technical Details:
Multiple flaws exists due to,
- Microsoft Hyper-V Network Switch on a host server fails to properly
validate input from a privileged user on a guest operating system.
- Windows improperly handles objects in memory.
- Windows GDI component improperly discloses the contents of its memory.
- Windows font library improperly handles specially crafted embedded
fonts.
- Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
- Windows Jet Database Engine improperly handles objects in memory.
- The Chakra scripting engine handles objects in memory in Microsoft Edge.
- Windows RDP server improperly discloses the contents of its memory.
- Windows kernel fails to properly handle objects in memory.
Impact:
Successful exploitation will allow an attacker
to run arbitrary code in kernel mode, obtain information to further compromise
a user's system, elevate permissions and create a denial of service condition
causing the target system to become unresponsive.
Affected Versions:
Windows 10 Version 1809 for x64-based Systems
Windows Server 2019
Windows 10 Version 1809 for 32-bit Systems
Recommendations:
The vendor has released updates. Please see
the references for more information.
Solution Type:
Vendor Patch
Detection Type:
Executable
CVE-2019-0715
CVE-2019-1168
CVE-2019-1170
CVE-2019-1171
CVE-2019-1172
CVE-2019-0716
CVE-2019-0717
CVE-2019-0718
CVE-2019-0720
CVE-2019-0723
CVE-2019-1173
CVE-2019-1174
CVE-2019-1175
CVE-2019-1176
CVE-2019-1177
CVE-2019-0965
CVE-2019-1030
CVE-2019-1057
CVE-2019-1178
CVE-2019-1179
CVE-2019-1180
CVE-2019-1078
CVE-2019-1131
CVE-2019-1133
CVE-2019-1139
CVE-2019-1140
CVE-2019-1181
CVE-2019-1182
CVE-2019-1183
CVE-2019-1184
CVE-2019-1145
CVE-2019-1146
CVE-2019-1192
CVE-2019-1193
CVE-2019-1194
CVE-2019-1147
CVE-2019-1148
CVE-2019-1149
CVE-2019-1195
CVE-2019-1196
CVE-2019-1197
CVE-2019-1198
CVE-2019-1150
CVE-2019-1151
CVE-2019-1206
CVE-2019-1212
CVE-2019-1222
CVE-2019-1223
CVE-2019-1152
CVE-2019-1153
CVE-2019-1224
CVE-2019-1225
CVE-2019-1226
CVE-2019-1227
CVE-2019-9506
CVE-2019-1155
CVE-2019-1156
CVE-2019-1157
CVE-2019-9511
CVE-2019-9512
CVE-2019-9513
CVE-2019-9514
CVE-2019-9518
CVE-2019-1158
CVE-2019-1159
CVE-2019-1162
CVE-2019-1163
CVE-2019-1164
CVE-2019-1141
CVE-2019-1143
CVE-2019-1144
CVE-2019-1186
CVE-2019-1187
CVE-2019-1188
CVE-2019-1190
You never have to pay for a vulnerability scanning and management software again.
Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.