Risk | High |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2017-0192 CVE-2017-0166 CVE-2013-6629 CVE-2017-0189 CVE-2017-0058 CVE-2017-0188 CVE-2017-0191 CVE-2017-0165 CVE-2017-0167 CVE-2017-0211 |
CWE-ID | CWE-200 CWE-119 CWE-125 CWE-20 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #8 is available. Public exploit code for vulnerability #9 is available. Public exploit code for vulnerability #10 is available. |
Vulnerable software |
Windows Operating systems & Components / Operating system Windows Server Operating systems & Components / Operating system Mono Framework Universal components / Libraries / Software for developers Microsoft Silverlight Client/Desktop applications / Plugins for browsers, ActiveX components |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU6253
Risk: Low
CVSSv3.1: 3.5 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-0192
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to improper handling of objects in memory in Adobe Type Manager Font Driver (ATMFD.dll). A local user can gain access to potentially sensitive information.
MitigationInstall update from vendor's website.
Windows: Vista - 10
Windows Server: 2008 R2 - 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0192
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6255
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-0166
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing LDAP requests. A remote attacker can send a specially crafted LDAP requests to domain controller, trigger buffer overflow and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the system with elevated privileges.
MitigationInstall update from Microsoft website.
Windows: Vista - 10
Windows Server: 2008 R2 - 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0166
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU1644
Risk: Low
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2013-6629
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to an error in get_sos() function in jdmarker.c file within the libjpeg and libjpeg-turbo libraries when processing JPEG files. A remote attacker can create a specially crafeted JPEG file and read parts of unallocated memory on the system.
Successful exploitation of the vulnerability may allow an attacker to gain access to potentially sensitive information.
Install updates from vendor's website.
Vulnerable software versionsMono Framework: 4.8.1.0 - 5.0.0.48
Windows: Vista - 10
Windows Server: 2008 R2 - 2016 10.0.14393.10
Microsoft Silverlight: 5
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6272
Risk: Low
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-0189
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain elevated privileges.
The vulnerability exists due to an error in Win32k.sys driver when handling objects in memory. A local user can execute arbitrary code with SYSTEM privileges.
Successful exploitation of the vulnerability may allow a local user to elevate his privileges on the system.
Mitigation
Install update from Microsoft website.
Windows: 10
Windows Server: 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0189
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6274
Risk: Low
CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-0058
CWE-ID:
CWE-200 - Information exposure
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to an error in Win32k.sys driver when processing objects in memory. A local user can obtain potentially sensitive information.
MitigationInstall updates from vendor's website.
Windows: Vista - 10
Windows Server: 2008 R2 - 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0058
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6275
Risk: Low
CVSSv3.1: 8.1 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-0188
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to an error in Win32k.sys driver when processing objects in memory. A local user can obtain potentially sensitive information.
MitigationInstall updates from vendor's website.
Windows: 8.1 RT - 10
Windows Server: 2012 R2 - 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0058
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6276
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-0191
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to trigger denial of service.
The vulnerability exists due to the way that Windows handles objects in memory. A remote attacker can perform a denial of service attack against vulnerable system.
MitigationInstall update from vendor's website.
Windows: 7 - 10
Windows Server: 2008 R2 - 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0191
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6278
Risk: Low
CVSSv3.1: 7.6 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-0165
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to obtain elevated privileges.
The vulnerability exists due to an error when handling objects in memory. A local user can execute arbitrary code with SYSTEM privileges.
Successful exploitation of the vulnerability may allow a local user to elevate his privileges on the system.
Mitigation
Install update from Microsoft website.
Windows: 8.1 RT - 10
Windows Server: 2012 R2 - 2012
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0165
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6280
Risk: Low
CVSSv3.1: 8.4 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-0167
CWE-ID:
CWE-200 - Information exposure
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to an error when the Windows kernel improperly handles objects in memory.. A local user can obtain potentially sensitive information.
MitigationInstall updates from vendor's website.
Windows: 8.1 RT - 10
Windows Server: 2012 R2 - 2016 10.0.14393.10
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0167
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6281
Risk: Low
CVSSv3.1: 7.6 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-0211
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to obtain elevated privileges.
The vulnerability exists in Microsoft Windows OLE when it fails an integrity-level check.. A local user can execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may allow a local user to elevate his privileges on the system.
Mitigation
Install update from Microsoft website.
Windows: 8.1 RT - 10
Windows Server: 2012 R2 - 2012
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0211
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.