Microsoft Windows Multiple Vulnerabilities (KB4507450)

Published: 2019-07-10 03:51:44
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4507450

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exist due to, - SymCrypt improperly handles a specially crafted digital signature. - Scripting engine improperly handles objects in memory in Microsoft browsers. - Windows RDP client improperly discloses the contents of its memory. - Chakra scripting engine improperly handles objects in memory in Microsoft Edge. - Windows Graphics Device Interface (GDI) improperly handles objects in the memory. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to execute arbitrary code in kernel mode, elevate privileges by escaping a sandbox, gain access to sensitive information.

Affected Versions:
Microsoft Windows 10 Version 1703 x32/x64

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0865
https://nvd.nist.gov/vuln/detail/CVE-2019-0880
https://nvd.nist.gov/vuln/detail/CVE-2019-0887
https://nvd.nist.gov/vuln/detail/CVE-2019-1102
https://nvd.nist.gov/vuln/detail/CVE-2019-0966
https://nvd.nist.gov/vuln/detail/CVE-2019-0999
https://nvd.nist.gov/vuln/detail/CVE-2019-1001
https://nvd.nist.gov/vuln/detail/CVE-2019-1004
https://nvd.nist.gov/vuln/detail/CVE-2019-1103
https://nvd.nist.gov/vuln/detail/CVE-2019-1104
https://nvd.nist.gov/vuln/detail/CVE-2019-1106
https://nvd.nist.gov/vuln/detail/CVE-2019-1107
https://nvd.nist.gov/vuln/detail/CVE-2019-1006
https://nvd.nist.gov/vuln/detail/CVE-2019-1108
https://nvd.nist.gov/vuln/detail/CVE-2019-1113
https://nvd.nist.gov/vuln/detail/CVE-2019-1056
https://nvd.nist.gov/vuln/detail/CVE-2019-1059
https://nvd.nist.gov/vuln/detail/CVE-2019-1062
https://nvd.nist.gov/vuln/detail/CVE-2019-1063
https://nvd.nist.gov/vuln/detail/CVE-2019-1067
https://nvd.nist.gov/vuln/detail/CVE-2019-1071
https://nvd.nist.gov/vuln/detail/CVE-2019-1073
https://nvd.nist.gov/vuln/detail/CVE-2019-1129
https://nvd.nist.gov/vuln/detail/CVE-2019-1130
https://nvd.nist.gov/vuln/detail/CVE-2019-1083
https://nvd.nist.gov/vuln/detail/CVE-2019-1085
https://nvd.nist.gov/vuln/detail/CVE-2019-1086
https://nvd.nist.gov/vuln/detail/CVE-2019-1087
https://nvd.nist.gov/vuln/detail/CVE-2019-1088
https://nvd.nist.gov/vuln/detail/CVE-2019-1089
https://nvd.nist.gov/vuln/detail/CVE-2019-1091
https://nvd.nist.gov/vuln/detail/CVE-2019-1092
https://nvd.nist.gov/vuln/detail/CVE-2019-1095
https://nvd.nist.gov/vuln/detail/CVE-2019-1096
https://nvd.nist.gov/vuln/detail/CVE-2019-1097
https://nvd.nist.gov/vuln/detail/CVE-2019-1093
https://nvd.nist.gov/vuln/detail/CVE-2019-1094
https://nvd.nist.gov/vuln/detail/CVE-2019-0683

CVE Analysis

https://www.mageni.net/cve/CVE-2019-0865
https://www.mageni.net/cve/CVE-2019-0880
https://www.mageni.net/cve/CVE-2019-0887
https://www.mageni.net/cve/CVE-2019-1102
https://www.mageni.net/cve/CVE-2019-0966
https://www.mageni.net/cve/CVE-2019-0999
https://www.mageni.net/cve/CVE-2019-1001
https://www.mageni.net/cve/CVE-2019-1004
https://www.mageni.net/cve/CVE-2019-1103
https://www.mageni.net/cve/CVE-2019-1104
https://www.mageni.net/cve/CVE-2019-1106
https://www.mageni.net/cve/CVE-2019-1107
https://www.mageni.net/cve/CVE-2019-1006
https://www.mageni.net/cve/CVE-2019-1108
https://www.mageni.net/cve/CVE-2019-1113
https://www.mageni.net/cve/CVE-2019-1056
https://www.mageni.net/cve/CVE-2019-1059
https://www.mageni.net/cve/CVE-2019-1062
https://www.mageni.net/cve/CVE-2019-1063
https://www.mageni.net/cve/CVE-2019-1067
https://www.mageni.net/cve/CVE-2019-1071
https://www.mageni.net/cve/CVE-2019-1073
https://www.mageni.net/cve/CVE-2019-1129
https://www.mageni.net/cve/CVE-2019-1130
https://www.mageni.net/cve/CVE-2019-1083
https://www.mageni.net/cve/CVE-2019-1085
https://www.mageni.net/cve/CVE-2019-1086
https://www.mageni.net/cve/CVE-2019-1087
https://www.mageni.net/cve/CVE-2019-1088
https://www.mageni.net/cve/CVE-2019-1089
https://www.mageni.net/cve/CVE-2019-1091
https://www.mageni.net/cve/CVE-2019-1092
https://www.mageni.net/cve/CVE-2019-1095
https://www.mageni.net/cve/CVE-2019-1096
https://www.mageni.net/cve/CVE-2019-1097
https://www.mageni.net/cve/CVE-2019-1093
https://www.mageni.net/cve/CVE-2019-1094
https://www.mageni.net/cve/CVE-2019-0683

References:

https://support.microsoft.com/en-us/help/4507450

Severity
High
CVSS Score
10.0
Published
2019-07-10
Modified
2019-07-10
Category
Windows : Microsoft Bulletins

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.