Risk | Low |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2018-0746 CVE-2018-0747 CVE-2018-0748 CVE-2018-0751 CVE-2018-0752 CVE-2018-0744 CVE-2018-0745 |
CWE-ID | CWE-200 CWE-264 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Windows Operating systems & Components / Operating system Windows Server Operating systems & Components / Operating system |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU9834
Risk: Low
CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0746
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due to an error which can lead to ASLR bypass . A local user can retrieve the memory address of a kernel object and bypass ASLR protection mechanism. MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: 8.1 - 10
Windows Server: 2012 - 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0746
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9835
Risk: Low
CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0747
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due to an error which can lead to ASLR bypass . A local user can retrieve the memory address of a kernel object and bypass ASLR protection mechanism. MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: 7 - 10
Windows Server: 2008 - 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0747
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9836
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0748
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Kernel API enforces permissions. A local user can use a specially crafted application to impersonate processes, interject cross-process communication, or interrupt system functionality.
Install updates from vendor's website.
Vulnerable software versionsWindows: 7 - 10
Windows Server: 2008 - 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0748
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9837
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0751
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Kernel API enforces
permissions. A local user can use a specially crafted application to
impersonate processes, interject cross-process communication, or
interrupt system functionality.
Install updates from vendor's website.
Vulnerable software versionsWindows: 8.1 - 10
Windows Server: 2012 - 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0751
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9838
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0752
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Kernel API enforces
permissions. A local user can use a specially crafted application to
impersonate processes, interject cross-process communication, or
interrupt system functionality.
Install updates from vendor's website.
Vulnerable software versionsWindows: 8.1 - 10
Windows Server: 2012 - 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0752
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9839
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0744
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in Windows kernel. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system with SYSTEM privileges.
Install updates from vendor's website.
Vulnerable software versionsWindows: 8.1 - 10
Windows Server: 2012 - 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0744
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9840
Risk: Low
CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0745
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due to an error which can lead to ASLR bypass . A local user can retrieve the memory address of a kernel object and bypass ASLR protection mechanism. MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: 10
Windows Server: 2016
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0745
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.