Microsoft Windows Multiple Vulnerabilities (KB4515384)

Published: 2019-09-11 04:48:11
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4515384

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - Chakra scripting engine improperly handles objects in memory in Microsoft Edge. - An error in Windows Text Service Framework (TSF) when the TSF server process does not validate the source of input or commands it receives. - Diagnostics Hub Standard Collector Service improperly impersonates certain file operations. - Windows Jet Database Engine improperly handles objects in memory. - Windows Common Log File System (CLFS) driver improperly handles objects in memory. - Active Directory Federation Services (ADFS) does not properly sanitize certain error messages. - Windows improperly handles calls to Advanced Local Procedure Call (ALPC). - An elevation of privilege exists in hdAudio. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to gain elevated privileges, execute code with elevated permissions, obtain information to further compromise the user's system and cause a target system to stop responding.

Affected Versions:
Windows 10 Version 1903 for 32-bit Systems Windows 10 Version 1903 for x64-based Systems

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2018-12126
https://nvd.nist.gov/vuln/detail/CVE-2018-12127
https://nvd.nist.gov/vuln/detail/CVE-2018-12130
https://nvd.nist.gov/vuln/detail/CVE-2019-0787
https://nvd.nist.gov/vuln/detail/CVE-2019-0788
https://nvd.nist.gov/vuln/detail/CVE-2019-11091
https://nvd.nist.gov/vuln/detail/CVE-2019-1138
https://nvd.nist.gov/vuln/detail/CVE-2019-1208
https://nvd.nist.gov/vuln/detail/CVE-2019-1214
https://nvd.nist.gov/vuln/detail/CVE-2019-1215
https://nvd.nist.gov/vuln/detail/CVE-2019-1217
https://nvd.nist.gov/vuln/detail/CVE-2019-1219
https://nvd.nist.gov/vuln/detail/CVE-2019-1220
https://nvd.nist.gov/vuln/detail/CVE-2019-1221
https://nvd.nist.gov/vuln/detail/CVE-2019-1232
https://nvd.nist.gov/vuln/detail/CVE-2019-1235
https://nvd.nist.gov/vuln/detail/CVE-2019-1236
https://nvd.nist.gov/vuln/detail/CVE-2019-1237
https://nvd.nist.gov/vuln/detail/CVE-2019-1240
https://nvd.nist.gov/vuln/detail/CVE-2019-1241
https://nvd.nist.gov/vuln/detail/CVE-2019-1242
https://nvd.nist.gov/vuln/detail/CVE-2019-1243
https://nvd.nist.gov/vuln/detail/CVE-2019-1244
https://nvd.nist.gov/vuln/detail/CVE-2019-1245
https://nvd.nist.gov/vuln/detail/CVE-2019-1246
https://nvd.nist.gov/vuln/detail/CVE-2019-1247
https://nvd.nist.gov/vuln/detail/CVE-2019-1248
https://nvd.nist.gov/vuln/detail/CVE-2019-1249
https://nvd.nist.gov/vuln/detail/CVE-2019-1250
https://nvd.nist.gov/vuln/detail/CVE-2019-1251
https://nvd.nist.gov/vuln/detail/CVE-2019-1252
https://nvd.nist.gov/vuln/detail/CVE-2019-1253
https://nvd.nist.gov/vuln/detail/CVE-2019-1254
https://nvd.nist.gov/vuln/detail/CVE-2019-1256
https://nvd.nist.gov/vuln/detail/CVE-2019-1267
https://nvd.nist.gov/vuln/detail/CVE-2019-1268
https://nvd.nist.gov/vuln/detail/CVE-2019-1269
https://nvd.nist.gov/vuln/detail/CVE-2019-1270
https://nvd.nist.gov/vuln/detail/CVE-2019-1271
https://nvd.nist.gov/vuln/detail/CVE-2019-1272
https://nvd.nist.gov/vuln/detail/CVE-2019-1273
https://nvd.nist.gov/vuln/detail/CVE-2019-1274
https://nvd.nist.gov/vuln/detail/CVE-2019-1277
https://nvd.nist.gov/vuln/detail/CVE-2019-1278
https://nvd.nist.gov/vuln/detail/CVE-2019-1280
https://nvd.nist.gov/vuln/detail/CVE-2019-1282
https://nvd.nist.gov/vuln/detail/CVE-2019-1285
https://nvd.nist.gov/vuln/detail/CVE-2019-1286
https://nvd.nist.gov/vuln/detail/CVE-2019-1287
https://nvd.nist.gov/vuln/detail/CVE-2019-1289
https://nvd.nist.gov/vuln/detail/CVE-2019-1290
https://nvd.nist.gov/vuln/detail/CVE-2019-1291
https://nvd.nist.gov/vuln/detail/CVE-2019-1292
https://nvd.nist.gov/vuln/detail/CVE-2019-1293
https://nvd.nist.gov/vuln/detail/CVE-2019-1294
https://nvd.nist.gov/vuln/detail/CVE-2019-1298
https://nvd.nist.gov/vuln/detail/CVE-2019-1299
https://nvd.nist.gov/vuln/detail/CVE-2019-1300
https://nvd.nist.gov/vuln/detail/CVE-2019-1303

References:

https://support.microsoft.com/en-us/help/4515384

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.