Microsoft Windows Multiple Vulnerabilities (KB4517389)

Published: 2019-10-09 04:43:33
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is missing a critical security update according to Microsoft KB4517389

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. - Chakra scripting engine improperly handles objects in memory in Microsoft Edge. - A spoofing vulnerability exists when Transport Layer Security (TLS) accesses non Extended Master Secret (EMS) sessions. - Microsoft Windows Update Client does not properly handle privileges. - Windows Error Reporting manager improperly handles process crashes. - Microsoft Browsers does not properly parse HTTP content. - Scripting engine handles objects in memory in Internet Explorer. For more information about the vulnerabilities refer Reference links.

Impact:
Successful exploitation will allow an attacker to run arbitrary code on the client machine, bypass security restrictions, elevate privileges and read privileged data across trust boundaries, create a denial of service condition and conduct spoofing attack.

Affected Versions:
Windows 10 Version 1903 for 32-bit Systems Windows 10 Version 1903 for x64-based Systems

Recommendations:
The vendor has released updates. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-0608
https://nvd.nist.gov/vuln/detail/CVE-2019-1060
https://nvd.nist.gov/vuln/detail/CVE-2019-1166
https://nvd.nist.gov/vuln/detail/CVE-2019-1192
https://nvd.nist.gov/vuln/detail/CVE-2019-1238
https://nvd.nist.gov/vuln/detail/CVE-2019-1307
https://nvd.nist.gov/vuln/detail/CVE-2019-1308
https://nvd.nist.gov/vuln/detail/CVE-2019-1311
https://nvd.nist.gov/vuln/detail/CVE-2019-1315
https://nvd.nist.gov/vuln/detail/CVE-2019-1316
https://nvd.nist.gov/vuln/detail/CVE-2019-1317
https://nvd.nist.gov/vuln/detail/CVE-2019-1318
https://nvd.nist.gov/vuln/detail/CVE-2019-1319
https://nvd.nist.gov/vuln/detail/CVE-2019-1320
https://nvd.nist.gov/vuln/detail/CVE-2019-1321
https://nvd.nist.gov/vuln/detail/CVE-2019-1322
https://nvd.nist.gov/vuln/detail/CVE-2019-1323
https://nvd.nist.gov/vuln/detail/CVE-2019-1325
https://nvd.nist.gov/vuln/detail/CVE-2019-1326
https://nvd.nist.gov/vuln/detail/CVE-2019-1333
https://nvd.nist.gov/vuln/detail/CVE-2019-1334
https://nvd.nist.gov/vuln/detail/CVE-2019-1335
https://nvd.nist.gov/vuln/detail/CVE-2019-1336
https://nvd.nist.gov/vuln/detail/CVE-2019-1337
https://nvd.nist.gov/vuln/detail/CVE-2019-1339
https://nvd.nist.gov/vuln/detail/CVE-2019-1340
https://nvd.nist.gov/vuln/detail/CVE-2019-1341
https://nvd.nist.gov/vuln/detail/CVE-2019-1342
https://nvd.nist.gov/vuln/detail/CVE-2019-1343
https://nvd.nist.gov/vuln/detail/CVE-2019-1344
https://nvd.nist.gov/vuln/detail/CVE-2019-1345
https://nvd.nist.gov/vuln/detail/CVE-2019-1346
https://nvd.nist.gov/vuln/detail/CVE-2019-1347
https://nvd.nist.gov/vuln/detail/CVE-2019-1356
https://nvd.nist.gov/vuln/detail/CVE-2019-1357
https://nvd.nist.gov/vuln/detail/CVE-2019-1358
https://nvd.nist.gov/vuln/detail/CVE-2019-1359
https://nvd.nist.gov/vuln/detail/CVE-2019-1365
https://nvd.nist.gov/vuln/detail/CVE-2019-1366
https://nvd.nist.gov/vuln/detail/CVE-2019-1367
https://nvd.nist.gov/vuln/detail/CVE-2019-1368
https://nvd.nist.gov/vuln/detail/CVE-2019-1371

References:

https://support.microsoft.com/en-us/help/4517389

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.