Microsoft Windows Multiple Vulnerabilities (KB4512488)

Published: 2019-08-14 05:17:57
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4512488

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - Windows improperly handles objects in memory. - Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. - Windows font library improperly handles specially crafted embedded fonts. - Windows improperly handles calls to Advanced Local Procedure Call (ALPC). - Windows Jet Database Engine improperly handles objects in memory. - Windows GDI component improperly discloses the contents of its memory. - Windows kernel fails to properly handle objects in memory. - Microsoft XML Core Services MSXML parser improperly processes user input.

Impact:
Successful exploitation will allow an attacker to cause a target system to stop responding, run arbitrary code on the client machine and obtain information to further compromise a user's system.

Affected Versions:
Microsoft Windows 8.1 for 32-bit/x64 Microsoft Windows Server 2012 R2

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0714
https://nvd.nist.gov/vuln/detail/CVE-2019-0715
https://nvd.nist.gov/vuln/detail/CVE-2019-0716
https://nvd.nist.gov/vuln/detail/CVE-2019-1168
https://nvd.nist.gov/vuln/detail/CVE-2019-1172
https://nvd.nist.gov/vuln/detail/CVE-2019-0718
https://nvd.nist.gov/vuln/detail/CVE-2019-0720
https://nvd.nist.gov/vuln/detail/CVE-2019-0723
https://nvd.nist.gov/vuln/detail/CVE-2019-0736
https://nvd.nist.gov/vuln/detail/CVE-2019-1177
https://nvd.nist.gov/vuln/detail/CVE-2019-1178
https://nvd.nist.gov/vuln/detail/CVE-2019-1057
https://nvd.nist.gov/vuln/detail/CVE-2019-1078
https://nvd.nist.gov/vuln/detail/CVE-2019-1180
https://nvd.nist.gov/vuln/detail/CVE-2019-1181
https://nvd.nist.gov/vuln/detail/CVE-2019-1133
https://nvd.nist.gov/vuln/detail/CVE-2019-1182
https://nvd.nist.gov/vuln/detail/CVE-2019-1183
https://nvd.nist.gov/vuln/detail/CVE-2019-1145
https://nvd.nist.gov/vuln/detail/CVE-2019-1146
https://nvd.nist.gov/vuln/detail/CVE-2019-1147
https://nvd.nist.gov/vuln/detail/CVE-2019-1192
https://nvd.nist.gov/vuln/detail/CVE-2019-1193
https://nvd.nist.gov/vuln/detail/CVE-2019-1194
https://nvd.nist.gov/vuln/detail/CVE-2019-1148
https://nvd.nist.gov/vuln/detail/CVE-2019-1149
https://nvd.nist.gov/vuln/detail/CVE-2019-1150
https://nvd.nist.gov/vuln/detail/CVE-2019-1151
https://nvd.nist.gov/vuln/detail/CVE-2019-1152
https://nvd.nist.gov/vuln/detail/CVE-2019-1206
https://nvd.nist.gov/vuln/detail/CVE-2019-1212
https://nvd.nist.gov/vuln/detail/CVE-2019-1153
https://nvd.nist.gov/vuln/detail/CVE-2019-1155
https://nvd.nist.gov/vuln/detail/CVE-2019-9506
https://nvd.nist.gov/vuln/detail/CVE-2019-1156
https://nvd.nist.gov/vuln/detail/CVE-2019-1157
https://nvd.nist.gov/vuln/detail/CVE-2019-1158
https://nvd.nist.gov/vuln/detail/CVE-2019-1159
https://nvd.nist.gov/vuln/detail/CVE-2019-1162
https://nvd.nist.gov/vuln/detail/CVE-2019-1164
https://nvd.nist.gov/vuln/detail/CVE-2019-1143
https://nvd.nist.gov/vuln/detail/CVE-2019-1144
https://nvd.nist.gov/vuln/detail/CVE-2019-1187

References:

https://support.microsoft.com/en-us/help/4512488

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.