Microsoft Windows Multiple Vulnerabilities (KB4512516)

Published: 2019-08-14 03:42:59
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4512516

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - Windows improperly handles objects in memory. - Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. - Windows DirectX improperly handles objects in memory. - Windows font library improperly handles specially crafted embedded fonts. - Windows improperly handles calls to Advanced Local Procedure Call (ALPC). - Windows Jet Database Engine improperly handles objects in memory. - Chakra scripting engine improperly handles objects in memory in Microsoft Edge. - Windows GDI component improperly discloses the contents of its memory. - Windows kernel fails to properly handle objects in memory. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to run arbitrary code on the client machine, disclose sensitive information, elevate privileges and create a denial of service condition causing the target system to become unresponsive.

Affected Versions:
Windows 10 Version 1709 for 64-based Systems Windows 10 Version 1709 for 32-bit Systems

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0714
https://nvd.nist.gov/vuln/detail/CVE-2019-0715
https://nvd.nist.gov/vuln/detail/CVE-2019-1168
https://nvd.nist.gov/vuln/detail/CVE-2019-1171
https://nvd.nist.gov/vuln/detail/CVE-2019-1172
https://nvd.nist.gov/vuln/detail/CVE-2019-0716
https://nvd.nist.gov/vuln/detail/CVE-2019-0718
https://nvd.nist.gov/vuln/detail/CVE-2019-0720
https://nvd.nist.gov/vuln/detail/CVE-2019-0723
https://nvd.nist.gov/vuln/detail/CVE-2019-1175
https://nvd.nist.gov/vuln/detail/CVE-2019-1176
https://nvd.nist.gov/vuln/detail/CVE-2019-1177
https://nvd.nist.gov/vuln/detail/CVE-2019-0736
https://nvd.nist.gov/vuln/detail/CVE-2019-0965
https://nvd.nist.gov/vuln/detail/CVE-2019-1030
https://nvd.nist.gov/vuln/detail/CVE-2019-1057
https://nvd.nist.gov/vuln/detail/CVE-2019-1178
https://nvd.nist.gov/vuln/detail/CVE-2019-1179
https://nvd.nist.gov/vuln/detail/CVE-2019-1180
https://nvd.nist.gov/vuln/detail/CVE-2019-1078
https://nvd.nist.gov/vuln/detail/CVE-2019-1131
https://nvd.nist.gov/vuln/detail/CVE-2019-1133
https://nvd.nist.gov/vuln/detail/CVE-2019-1139
https://nvd.nist.gov/vuln/detail/CVE-2019-1140
https://nvd.nist.gov/vuln/detail/CVE-2019-1181
https://nvd.nist.gov/vuln/detail/CVE-2019-1182
https://nvd.nist.gov/vuln/detail/CVE-2019-1183
https://nvd.nist.gov/vuln/detail/CVE-2019-1145
https://nvd.nist.gov/vuln/detail/CVE-2019-1146
https://nvd.nist.gov/vuln/detail/CVE-2019-1192
https://nvd.nist.gov/vuln/detail/CVE-2019-1193
https://nvd.nist.gov/vuln/detail/CVE-2019-1194
https://nvd.nist.gov/vuln/detail/CVE-2019-1147
https://nvd.nist.gov/vuln/detail/CVE-2019-1148
https://nvd.nist.gov/vuln/detail/CVE-2019-1149
https://nvd.nist.gov/vuln/detail/CVE-2019-1195
https://nvd.nist.gov/vuln/detail/CVE-2019-1196
https://nvd.nist.gov/vuln/detail/CVE-2019-1197
https://nvd.nist.gov/vuln/detail/CVE-2019-1198
https://nvd.nist.gov/vuln/detail/CVE-2019-1150
https://nvd.nist.gov/vuln/detail/CVE-2019-1151
https://nvd.nist.gov/vuln/detail/CVE-2019-1212
https://nvd.nist.gov/vuln/detail/CVE-2019-1152
https://nvd.nist.gov/vuln/detail/CVE-2019-1153
https://nvd.nist.gov/vuln/detail/CVE-2019-9506
https://nvd.nist.gov/vuln/detail/CVE-2019-1155
https://nvd.nist.gov/vuln/detail/CVE-2019-1156
https://nvd.nist.gov/vuln/detail/CVE-2019-1157
https://nvd.nist.gov/vuln/detail/CVE-2019-9511
https://nvd.nist.gov/vuln/detail/CVE-2019-9512
https://nvd.nist.gov/vuln/detail/CVE-2019-9513
https://nvd.nist.gov/vuln/detail/CVE-2019-9514
https://nvd.nist.gov/vuln/detail/CVE-2019-9518
https://nvd.nist.gov/vuln/detail/CVE-2019-1158
https://nvd.nist.gov/vuln/detail/CVE-2019-1159
https://nvd.nist.gov/vuln/detail/CVE-2019-1162
https://nvd.nist.gov/vuln/detail/CVE-2019-1163
https://nvd.nist.gov/vuln/detail/CVE-2019-1164
https://nvd.nist.gov/vuln/detail/CVE-2019-1143
https://nvd.nist.gov/vuln/detail/CVE-2019-1144
https://nvd.nist.gov/vuln/detail/CVE-2019-1186
https://nvd.nist.gov/vuln/detail/CVE-2019-1187
https://nvd.nist.gov/vuln/detail/CVE-2019-1188

References:

https://support.microsoft.com/en-us/help/4512516

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.