Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасноси в Microsoft Windows
Опубликовано:14 мая 2014 г.
Источник:
SecurityVulns ID:13769
Тип:библиотека
Уровень опасности:
7/10
Описание:Выполнение кода через Windows File Handling, повышение привилегий через Group Policy Preferences. Повышение привилегий через .Net. Повышение привилегий в Windows Shell. DoS в iSCSI.
Затронутые продукты:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
 MICROSOFT : Windows 8
 MICROSOFT : Windows 2012 Server
CVE:CVE-2014-1812 (The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability.")
 CVE-2014-1807 (The ShellExecute API in Windows Shell in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly implement file associations, which allows local users to gain privileges via a crafted application, as exploited in the wild in May 2014, aka "Windows Shell File Association Vulnerability.")
 CVE-2014-1806 (The .NET Remoting implementation in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly restrict memory access, which allows remote attackers to execute arbitrary code via vectors involving malformed objects, aka "TypeFilterLevel Vulnerability.")
 CVE-2014-0315 (Untrusted search path vulnerability in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse cmd.exe file in the current working directory, as demonstrated by a directory that contains a .bat or .cmd file, aka "Windows File Handling Vulnerability.")
 CVE-2014-0256 (Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold allow remote attackers to cause a denial of service (iSCSI service outage) by sending many crafted packets, aka "iSCSI Target Remote Denial of Service Vulnerability.")
 CVE-2014-0255 (Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allow remote attackers to cause a denial of service (iSCSI service outage) by sending many crafted packets, aka "iSCSI Target Remote Denial of Service Vulnerability.")
Файлы: Microsoft Security Bulletin MS14-019 - Important Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)
  Microsoft Security Bulletin MS14-025 - Important Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486)
  Microsoft Security Bulletin MS14-026 - Important Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732)
  Microsoft Security Bulletin MS14-027 - Important Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege (2962488)
  Microsoft Security Bulletin MS14-028 - Important Vulnerabilities in iSCSI Could Allow Denial of Service (2962485)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород