Microsoft Windows Multiple Vulnerabilities (KB4507449)

Published: 2019-07-10 04:00:27
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4507449

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exist as, - Remote Desktop Services improperly handles clipboard redirection. - Scripting Engine improperly handles objects in memory in Microsoft browsers. - Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allow signing of SAML tokens with arbitrary symmetric keys. - Windows GDI component improperly handles objects in memory. - An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to execute arbitrary code on a victim system, obtain information to further compromise the user's system and gain elevated privileges.

Affected Versions:
Windows 7 for 32-bit/x64 Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0683
https://nvd.nist.gov/vuln/detail/CVE-2019-0887
https://nvd.nist.gov/vuln/detail/CVE-2019-1001
https://nvd.nist.gov/vuln/detail/CVE-2019-1004
https://nvd.nist.gov/vuln/detail/CVE-2019-1006
https://nvd.nist.gov/vuln/detail/CVE-2019-1056
https://nvd.nist.gov/vuln/detail/CVE-2019-1059
https://nvd.nist.gov/vuln/detail/CVE-2019-1063
https://nvd.nist.gov/vuln/detail/CVE-2019-1071
https://nvd.nist.gov/vuln/detail/CVE-2019-1073
https://nvd.nist.gov/vuln/detail/CVE-2019-1082
https://nvd.nist.gov/vuln/detail/CVE-2019-1085
https://nvd.nist.gov/vuln/detail/CVE-2019-1088
https://nvd.nist.gov/vuln/detail/CVE-2019-1089
https://nvd.nist.gov/vuln/detail/CVE-2019-1093
https://nvd.nist.gov/vuln/detail/CVE-2019-1094
https://nvd.nist.gov/vuln/detail/CVE-2019-1095
https://nvd.nist.gov/vuln/detail/CVE-2019-1096
https://nvd.nist.gov/vuln/detail/CVE-2019-1097
https://nvd.nist.gov/vuln/detail/CVE-2019-1098
https://nvd.nist.gov/vuln/detail/CVE-2019-1099
https://nvd.nist.gov/vuln/detail/CVE-2019-1100
https://nvd.nist.gov/vuln/detail/CVE-2019-1101
https://nvd.nist.gov/vuln/detail/CVE-2019-1102
https://nvd.nist.gov/vuln/detail/CVE-2019-1104
https://nvd.nist.gov/vuln/detail/CVE-2019-1108
https://nvd.nist.gov/vuln/detail/CVE-2019-1116
https://nvd.nist.gov/vuln/detail/CVE-2019-1132

CVE Analysis

https://www.mageni.net/cve/CVE-2019-0683
https://www.mageni.net/cve/CVE-2019-0887
https://www.mageni.net/cve/CVE-2019-1001
https://www.mageni.net/cve/CVE-2019-1004
https://www.mageni.net/cve/CVE-2019-1006
https://www.mageni.net/cve/CVE-2019-1056
https://www.mageni.net/cve/CVE-2019-1059
https://www.mageni.net/cve/CVE-2019-1063
https://www.mageni.net/cve/CVE-2019-1071
https://www.mageni.net/cve/CVE-2019-1073
https://www.mageni.net/cve/CVE-2019-1082
https://www.mageni.net/cve/CVE-2019-1085
https://www.mageni.net/cve/CVE-2019-1088
https://www.mageni.net/cve/CVE-2019-1089
https://www.mageni.net/cve/CVE-2019-1093
https://www.mageni.net/cve/CVE-2019-1094
https://www.mageni.net/cve/CVE-2019-1095
https://www.mageni.net/cve/CVE-2019-1096
https://www.mageni.net/cve/CVE-2019-1097
https://www.mageni.net/cve/CVE-2019-1098
https://www.mageni.net/cve/CVE-2019-1099
https://www.mageni.net/cve/CVE-2019-1100
https://www.mageni.net/cve/CVE-2019-1101
https://www.mageni.net/cve/CVE-2019-1102
https://www.mageni.net/cve/CVE-2019-1104
https://www.mageni.net/cve/CVE-2019-1108
https://www.mageni.net/cve/CVE-2019-1116
https://www.mageni.net/cve/CVE-2019-1132

References:

https://support.microsoft.com/en-us/help/4507449

Severity
High
CVSS Score
10.0
Published
2019-07-10
Modified
2019-07-10
Category
Windows : Microsoft Bulletins

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.