Microsoft Windows Multiple Vulnerabilities (KB4507435)

Published: 2019-07-10 04:11:08
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4507435

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exist due to, - SymCrypt improperly handles a specially crafted digital signature. - Scripting engine improperly handles objects in memory in Microsoft browsers. - Windows RDP client improperly discloses the contents of its memory. - Windows Graphics Device Interface (GDI) improperly handles objects in the memory. - An elevation of privilege exists in Windows Audio Service. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to execute arbitrary code in kernel mode, elevate privileges by escaping a sandbox, gain access to sensitive information, conduct denial of service and could take control of the affected system.

Affected Versions:
Windows 10 Version 1803 for 32-bit Systems Windows 10 Version 1803 for x64-based Systems

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0785
https://nvd.nist.gov/vuln/detail/CVE-2019-0811
https://nvd.nist.gov/vuln/detail/CVE-2019-0865
https://nvd.nist.gov/vuln/detail/CVE-2019-0880
https://nvd.nist.gov/vuln/detail/CVE-2019-0887
https://nvd.nist.gov/vuln/detail/CVE-2019-1102
https://nvd.nist.gov/vuln/detail/CVE-2019-0966
https://nvd.nist.gov/vuln/detail/CVE-2019-0975
https://nvd.nist.gov/vuln/detail/CVE-2019-0999
https://nvd.nist.gov/vuln/detail/CVE-2019-1001
https://nvd.nist.gov/vuln/detail/CVE-2019-1004
https://nvd.nist.gov/vuln/detail/CVE-2019-1103
https://nvd.nist.gov/vuln/detail/CVE-2019-1104
https://nvd.nist.gov/vuln/detail/CVE-2019-1106
https://nvd.nist.gov/vuln/detail/CVE-2019-1107
https://nvd.nist.gov/vuln/detail/CVE-2019-1006
https://nvd.nist.gov/vuln/detail/CVE-2019-1108
https://nvd.nist.gov/vuln/detail/CVE-2019-1037
https://nvd.nist.gov/vuln/detail/CVE-2019-1056
https://nvd.nist.gov/vuln/detail/CVE-2019-1113
https://nvd.nist.gov/vuln/detail/CVE-2019-1059
https://nvd.nist.gov/vuln/detail/CVE-2019-1062
https://nvd.nist.gov/vuln/detail/CVE-2019-1063
https://nvd.nist.gov/vuln/detail/CVE-2019-1067
https://nvd.nist.gov/vuln/detail/CVE-2019-1117
https://nvd.nist.gov/vuln/detail/CVE-2019-1118
https://nvd.nist.gov/vuln/detail/CVE-2019-1119
https://nvd.nist.gov/vuln/detail/CVE-2019-1120
https://nvd.nist.gov/vuln/detail/CVE-2019-1121
https://nvd.nist.gov/vuln/detail/CVE-2019-1122
https://nvd.nist.gov/vuln/detail/CVE-2019-1123
https://nvd.nist.gov/vuln/detail/CVE-2019-1124
https://nvd.nist.gov/vuln/detail/CVE-2019-1071
https://nvd.nist.gov/vuln/detail/CVE-2019-1073
https://nvd.nist.gov/vuln/detail/CVE-2019-1126
https://nvd.nist.gov/vuln/detail/CVE-2019-1127
https://nvd.nist.gov/vuln/detail/CVE-2019-1128
https://nvd.nist.gov/vuln/detail/CVE-2019-1129
https://nvd.nist.gov/vuln/detail/CVE-2019-1130
https://nvd.nist.gov/vuln/detail/CVE-2019-1074
https://nvd.nist.gov/vuln/detail/CVE-2019-1083
https://nvd.nist.gov/vuln/detail/CVE-2019-1085
https://nvd.nist.gov/vuln/detail/CVE-2019-1086
https://nvd.nist.gov/vuln/detail/CVE-2019-1087
https://nvd.nist.gov/vuln/detail/CVE-2019-1088
https://nvd.nist.gov/vuln/detail/CVE-2019-1089
https://nvd.nist.gov/vuln/detail/CVE-2019-1090
https://nvd.nist.gov/vuln/detail/CVE-2019-1091
https://nvd.nist.gov/vuln/detail/CVE-2019-1092
https://nvd.nist.gov/vuln/detail/CVE-2019-1095
https://nvd.nist.gov/vuln/detail/CVE-2019-1096
https://nvd.nist.gov/vuln/detail/CVE-2019-1097
https://nvd.nist.gov/vuln/detail/CVE-2019-1093
https://nvd.nist.gov/vuln/detail/CVE-2019-1094
https://nvd.nist.gov/vuln/detail/CVE-2019-0683

CVE Analysis

https://www.mageni.net/cve/CVE-2019-0785
https://www.mageni.net/cve/CVE-2019-0811
https://www.mageni.net/cve/CVE-2019-0865
https://www.mageni.net/cve/CVE-2019-0880
https://www.mageni.net/cve/CVE-2019-0887
https://www.mageni.net/cve/CVE-2019-1102
https://www.mageni.net/cve/CVE-2019-0966
https://www.mageni.net/cve/CVE-2019-0975
https://www.mageni.net/cve/CVE-2019-0999
https://www.mageni.net/cve/CVE-2019-1001
https://www.mageni.net/cve/CVE-2019-1004
https://www.mageni.net/cve/CVE-2019-1103
https://www.mageni.net/cve/CVE-2019-1104
https://www.mageni.net/cve/CVE-2019-1106
https://www.mageni.net/cve/CVE-2019-1107
https://www.mageni.net/cve/CVE-2019-1006
https://www.mageni.net/cve/CVE-2019-1108
https://www.mageni.net/cve/CVE-2019-1037
https://www.mageni.net/cve/CVE-2019-1056
https://www.mageni.net/cve/CVE-2019-1113
https://www.mageni.net/cve/CVE-2019-1059
https://www.mageni.net/cve/CVE-2019-1062
https://www.mageni.net/cve/CVE-2019-1063
https://www.mageni.net/cve/CVE-2019-1067
https://www.mageni.net/cve/CVE-2019-1117
https://www.mageni.net/cve/CVE-2019-1118
https://www.mageni.net/cve/CVE-2019-1119
https://www.mageni.net/cve/CVE-2019-1120
https://www.mageni.net/cve/CVE-2019-1121
https://www.mageni.net/cve/CVE-2019-1122
https://www.mageni.net/cve/CVE-2019-1123
https://www.mageni.net/cve/CVE-2019-1124
https://www.mageni.net/cve/CVE-2019-1071
https://www.mageni.net/cve/CVE-2019-1073
https://www.mageni.net/cve/CVE-2019-1126
https://www.mageni.net/cve/CVE-2019-1127
https://www.mageni.net/cve/CVE-2019-1128
https://www.mageni.net/cve/CVE-2019-1129
https://www.mageni.net/cve/CVE-2019-1130
https://www.mageni.net/cve/CVE-2019-1074
https://www.mageni.net/cve/CVE-2019-1083
https://www.mageni.net/cve/CVE-2019-1085
https://www.mageni.net/cve/CVE-2019-1086
https://www.mageni.net/cve/CVE-2019-1087
https://www.mageni.net/cve/CVE-2019-1088
https://www.mageni.net/cve/CVE-2019-1089
https://www.mageni.net/cve/CVE-2019-1090
https://www.mageni.net/cve/CVE-2019-1091
https://www.mageni.net/cve/CVE-2019-1092
https://www.mageni.net/cve/CVE-2019-1095
https://www.mageni.net/cve/CVE-2019-1096
https://www.mageni.net/cve/CVE-2019-1097
https://www.mageni.net/cve/CVE-2019-1093
https://www.mageni.net/cve/CVE-2019-1094
https://www.mageni.net/cve/CVE-2019-0683

References:

https://support.microsoft.com/en-us/help/4507435

Severity
High
CVSS Score
10.0
Published
2019-07-10
Modified
2019-07-10
Category
Windows : Microsoft Bulletins

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.