Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.812332 |
Kategorie: | Windows : Microsoft Bulletins |
Titel: | Microsoft Windows Multiple Vulnerabilities (KB4053579) |
Zusammenfassung: | This host is missing a critical security; update according to Microsoft KB4053579 |
Beschreibung: | Summary: This host is missing a critical security update according to Microsoft KB4053579 Vulnerability Insight: Multiple flaws exist due to: - An error in RPC if the server has Routing and Remote Access enabled. - An error when Internet Explorer improperly accesses objects in memory. - An error when Internet Explorer improperly handles objects in memory. - An error when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL. - An error when Microsoft Edge improperly accesses objects in memory. - An error in the way that the scripting engine handles objects in memory in Microsoft Edge. - An error in the way the scripting engine handles objects in memory in Microsoft browsers. - A security feature bypass exists when Device Guard incorrectly validates an untrusted file. Vulnerability Impact: Successful exploitation will allow an attacker to execute arbitrary code, gain the same user rights as the current user, obtain sensitive information to further compromise the user's system, a brute-force to disclose the NTLM hash password and make an unsigned file appear to be signed. Affected Software/OS: - Microsoft Windows Server 2016 - Microsoft Windows 10 Version 1607 x32/x64 Solution: The vendor has released updates. Please see the references for more information. CVSS Score: 8.5 CVSS Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-11885 Common Vulnerability Exposure (CVE) ID: CVE-2017-11907 Common Vulnerability Exposure (CVE) ID: CVE-2017-11909 Common Vulnerability Exposure (CVE) ID: CVE-2017-11910 Common Vulnerability Exposure (CVE) ID: CVE-2017-11911 Common Vulnerability Exposure (CVE) ID: CVE-2017-11912 Common Vulnerability Exposure (CVE) ID: CVE-2017-11886 Common Vulnerability Exposure (CVE) ID: CVE-2017-11887 Common Vulnerability Exposure (CVE) ID: CVE-2017-11888 Common Vulnerability Exposure (CVE) ID: CVE-2017-11889 Common Vulnerability Exposure (CVE) ID: CVE-2017-11890 Common Vulnerability Exposure (CVE) ID: CVE-2017-11893 Common Vulnerability Exposure (CVE) ID: CVE-2017-11894 Common Vulnerability Exposure (CVE) ID: CVE-2017-11895 Common Vulnerability Exposure (CVE) ID: CVE-2017-11899 Common Vulnerability Exposure (CVE) ID: CVE-2017-11901 Common Vulnerability Exposure (CVE) ID: CVE-2017-11903 Common Vulnerability Exposure (CVE) ID: CVE-2017-11905 Common Vulnerability Exposure (CVE) ID: CVE-2017-11906 Common Vulnerability Exposure (CVE) ID: CVE-2017-11913 Common Vulnerability Exposure (CVE) ID: CVE-2017-11914 Common Vulnerability Exposure (CVE) ID: CVE-2017-11918 Common Vulnerability Exposure (CVE) ID: CVE-2017-11919 Common Vulnerability Exposure (CVE) ID: CVE-2017-11927 Common Vulnerability Exposure (CVE) ID: CVE-2017-11930 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |