Microsoft Windows Multiple Vulnerabilities (KB4507448)

Published: 2019-07-10 04:46:06
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4507448

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exist due to, - Scripting engine handles objects in memory in Microsoft browsers. - Windows RDP client improperly discloses the contents of its memory. - Windows Graphics Device Interface (GDI) handles objects in the memory. - An elevation of privilege exists in Windows Audio Service. - Internet Explorer improperly accesses objects in memory. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to execute arbitrary code, elevate privileges, bypass authentication, conduct denial-of-service condition and disclose sensitive information.

Affected Versions:
Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 for 32-bit/x64

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0785
https://nvd.nist.gov/vuln/detail/CVE-2019-0811
https://nvd.nist.gov/vuln/detail/CVE-2019-0880
https://nvd.nist.gov/vuln/detail/CVE-2019-0887
https://nvd.nist.gov/vuln/detail/CVE-2019-1102
https://nvd.nist.gov/vuln/detail/CVE-2019-1001
https://nvd.nist.gov/vuln/detail/CVE-2019-1004
https://nvd.nist.gov/vuln/detail/CVE-2019-1104
https://nvd.nist.gov/vuln/detail/CVE-2019-1006
https://nvd.nist.gov/vuln/detail/CVE-2019-1108
https://nvd.nist.gov/vuln/detail/CVE-2019-1056
https://nvd.nist.gov/vuln/detail/CVE-2019-1059
https://nvd.nist.gov/vuln/detail/CVE-2019-1063
https://nvd.nist.gov/vuln/detail/CVE-2019-1071
https://nvd.nist.gov/vuln/detail/CVE-2019-1073
https://nvd.nist.gov/vuln/detail/CVE-2019-1126
https://nvd.nist.gov/vuln/detail/CVE-2019-1130
https://nvd.nist.gov/vuln/detail/CVE-2019-1082
https://nvd.nist.gov/vuln/detail/CVE-2019-1085
https://nvd.nist.gov/vuln/detail/CVE-2019-1086
https://nvd.nist.gov/vuln/detail/CVE-2019-1087
https://nvd.nist.gov/vuln/detail/CVE-2019-1088
https://nvd.nist.gov/vuln/detail/CVE-2019-1089
https://nvd.nist.gov/vuln/detail/CVE-2019-1095
https://nvd.nist.gov/vuln/detail/CVE-2019-1096
https://nvd.nist.gov/vuln/detail/CVE-2019-1097
https://nvd.nist.gov/vuln/detail/CVE-2019-1093
https://nvd.nist.gov/vuln/detail/CVE-2019-1094
https://nvd.nist.gov/vuln/detail/CVE-2019-0683

References:

https://support.microsoft.com/en-us/help/4507448

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.