Professional Documents
Culture Documents
Vulnerabilities by Host
• 192.168.100.4.................................................................................................................................................. .....4
Remediations
• Suggested Remediations.............................................................................................................................. 1136
Vulnerabilities by Host
192.168.100.4
34 209 73 10 279
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
Vulnerabilities
119583 - KB4471322: Windows 8.1 and Windows Server 2012 R2 December 2018 Security Update
Synopsis
Description
The remote Windows host is missing security update 4471322 or cumulative update 4471320. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists when the Internet Explorer VBScript execution policy does not
properly restrict VBScript under specific conditions. An attacker who exploited the vulnerability could run arbitrary
code with medium-integrity level privileges (the permissions of the current user). (CVE-2018-8619)
- A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input
properly. An attacker who successfully exploited this vulnerability could take control of an affected system.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
(CVE-2018-8540)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
192.168.100.4 4
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2018-8595, CVE-2018-8596)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8631)
- A remote code execution vulnerability exists in Windows Domain Name System (DNS) servers when they fail to
properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the
context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this
vulnerability. (CVE-2018-8626)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-8477)
- An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes
objects in memory. (CVE-2018-8514)
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2018-8611)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8625)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the
users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application.
The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
(CVE-2018-8622)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8643)
- A denial of service vulnerability exists when .NET Framework improperly handles special web requests. An
attacker who successfully exploited this vulnerability could cause a denial of service against an .NET Framework
web application. The vulnerability can be exploited remotely, without authentication. A remote unauthenticated
attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application.
The update addresses the vulnerability by correcting how the .NET Framework web application handles web
requests. (CVE-2018-8517)
- An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly
handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in
kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with
full user rights.
(CVE-2018-8641)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8639)
See Also
http://www.nessus.org/u?454a6553
http://www.nessus.org/u?56bb4eaa
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-8477
CVE CVE-2018-8514
CVE CVE-2018-8517
CVE CVE-2018-8540
CVE CVE-2018-8595
CVE CVE-2018-8596
CVE CVE-2018-8611
CVE CVE-2018-8619
CVE CVE-2018-8622
CVE CVE-2018-8625
CVE CVE-2018-8626
CVE CVE-2018-8631
CVE CVE-2018-8639
CVE CVE-2018-8641
CVE CVE-2018-8643
MSKB 4471322
MSKB 4471320
XREF MSFT:MS18-4471322
XREF MSFT:MS18-4471320
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4512489 or cumulative update 4512488. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local
Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the
security context of the local system. An attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights.
(CVE-2019-1162)
- A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different
origins. The vulnerability allows Microsoft browsers to bypass Same-Origin Policy (SOP) restrictions, and to
allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could
force the browser to send data that would otherwise be restricted.
(CVE-2019-1192)
- An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly
handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. (CVE-2019-1148, CVE-2019-1153)
- A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An
attacker who successfully exploited this vulnerability could cause a denial of service against an XML application.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML
application. The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input.
(CVE-2019-1187)
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a
victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The
update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in
memory. (CVE-2019-1146, CVE-2019-1147, CVE-2019-1155, CVE-2019-1156, CVE-2019-1157)
- <h1>Executive Summary</h1> Microsoft is aware of the Bluetooth BR/EDR (basic rate/enhanced data rate,
known as "Bluetooth Classic") key negotiation vulnerability that exists at the hardware specification
level of any BR/EDR Bluetooth device. An attacker could potentially be able to negotiate the offered key length
down to 1 byte of entropy, from a maximum of 16 bytes.
(CVE-2019-9506)
- An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An
attacker who successfully exploited the vulnerability could execute code with elevated permissions.
(CVE-2019-1180)
- An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the
vulnerability could run arbitrary code with elevated privileges. (CVE-2019-1168)
- An information disclosure vulnerability exists when the Windows Graphics component improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further
compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially
crafted application. The update addresses the vulnerability by correcting how the Windows Graphics Component
handles objects in memory. (CVE-2019-1078)
- A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends
specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability
could cause the DHCP service to become nonresponsive.
(CVE-2019-1206)
- An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An
attacker who successfully exploited the vulnerability could execute code with elevated permissions.
(CVE-2019-1178)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially
crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights. (CVE-2019-1144, CVE-2019-1145, CVE-2019-1149, CVE-2019-1150, CVE-2019-1151,
CVE-2019-1152)
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2019-1159, CVE-2019-1164)
- A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services
when an unauthenticated attacker connects to the target system using RDP and sends specially crafted
requests.
This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited
this vulnerability could execute arbitrary code on the target system. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2019-1181, CVE-2019-1182)
- A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted
DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on
the client machine. (CVE-2019-0736)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-1133, CVE-2019-1194)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1183)
- An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker
who successfully exploited the vulnerability could execute code with elevated permissions.
(CVE-2019-1177)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1193)
- An information disclosure vulnerability exists in Azure Active Directory (AAD) Microsoft Account (MSA) during
the login request session. An attacker who successfully exploited the vulnerability could take over a user's
account. (CVE-2019-1172)
- A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly
validate input from a privileged user on a guest operating system. An attacker who successfully exploited
the vulnerability could cause the host server to crash. (CVE-2019-0714, CVE-2019-0715, CVE-2019-0718,
CVE-2019-0723)
- A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. (CVE-2019-0716)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise a users system. There are multiple ways an attacker could exploit the vulnerability, such as
by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage.
The update addresses the vulnerability by correcting how the Windows GDI component handles objects in
memory.
(CVE-2019-1143, CVE-2019-1158)
- A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to
properly validate input from an authenticated user on a guest operating system. (CVE-2019-0720)
- A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially
crafted packets. An attacker who successfully exploited the vulnerability could cause the DHCP server service to
stop responding. (CVE-2019-1212)
- A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes
user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take
control of the users system. (CVE-2019-1057)
See Also
http://www.nessus.org/u?7c858a23
http://www.nessus.org/u?1fc7ed0c
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
STIG Severity
II
References
CVE CVE-2019-0714
CVE CVE-2019-0715
CVE CVE-2019-0716
CVE CVE-2019-0718
CVE CVE-2019-0720
CVE CVE-2019-0723
CVE CVE-2019-0736
CVE CVE-2019-1057
CVE CVE-2019-1078
CVE CVE-2019-1133
CVE CVE-2019-1143
CVE CVE-2019-1144
CVE CVE-2019-1145
CVE CVE-2019-1146
CVE CVE-2019-1147
CVE CVE-2019-1148
CVE CVE-2019-1149
CVE CVE-2019-1150
CVE CVE-2019-1151
CVE CVE-2019-1152
CVE CVE-2019-1153
CVE CVE-2019-1155
CVE CVE-2019-1156
CVE CVE-2019-1157
CVE CVE-2019-1158
CVE CVE-2019-1159
CVE CVE-2019-1162
CVE CVE-2019-1164
CVE CVE-2019-1168
CVE CVE-2019-1172
CVE CVE-2019-1177
CVE CVE-2019-1178
CVE CVE-2019-1180
CVE CVE-2019-1181
CVE CVE-2019-1182
CVE CVE-2019-1183
CVE CVE-2019-1187
CVE CVE-2019-1192
CVE CVE-2019-1193
CVE CVE-2019-1194
CVE CVE-2019-1206
CVE CVE-2019-1212
CVE CVE-2019-9506
MSKB 4512489
MSKB 4512488
XREF MSFT:MS19-4512489
XREF MSFT:MS19-4512488
XREF IAVA:2019-A-0284
XREF IAVA:2019-A-0290
Plugin Information
Plugin Output
tcp/445
Synopsis
The version of the .NET Framework installed on the remote host is affected by a denial of service vulnerability.
Description
The remote Windows host has a version of the Microsoft .NET Framework that is affected by a vulnerability that
allows a remote attacker to to execute code remotely.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-057
Solution
Microsoft has released a set of patches for .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, 4.5.1, and 4.5.2.
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 70312
BID 70313
BID 70351
CVE CVE-2014-4073
CVE CVE-2014-4121
CVE CVE-2014-4122
MSKB 2968292
MSKB 2968294
MSKB 2968295
MSKB 2968296
MSKB 2972098
MSKB 2972100
MSKB 2972101
MSKB 2972103
MSKB 2972105
MSKB 2972106
MSKB 2972107
MSKB 2978041
MSKB 2978042
MSKB 2979568
MSKB 2979570
MSKB 2979571
MSKB 2979573
MSKB 2979574
MSKB 2979575
MSKB 2979576
MSKB 2979577
MSKB 2979578
XREF MSFT:MS14-057
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability due to improper processing of
packets by the Secure Channel (Schannel) security package. An attacker can exploit this issue by sending
specially crafted packets to a Windows server.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-066
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 70954
CVE CVE-2014-6321
MSKB 2992611
XREF CERT:505120
XREF MSFT:MS14-066
Exploitable With
Plugin Information
tcp/445
KB : 2992611
- C:\Windows\system32\Schannel.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17385
79638 - MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution (2992611)
(uncredentialed check)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability due to improper processing of
packets by the Secure Channel (Schannel) security package. An attacker can exploit this issue by sending
specially crafted packets to a Windows server.
Note that this plugin sends a client Certificate TLS handshake message followed by a CertificateVerify message.
Some Windows hosts will close the connection upon receiving a client certificate for which it did not ask for
with a CertificateRequest message. In this case, the plugin cannot proceed to detect the vulnerability as the
CertificateVerify message cannot be sent.
See Also
http://www.nessus.org/u?64e97902
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Critical
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 70954
CVE CVE-2014-6321
MSKB 2992611
XREF CERT:505120
XREF MSFT:MS14-066
Exploitable With
Plugin Information
Plugin Output
tcp/3389
82771 - MS15-034: Vulnerability in HTTP.sys Could Allow Remote Code Execution (3042553)
Synopsis
The remote Windows host is affected by a vulnerability in the HTTP protocol stack.
Description
The version of Windows running on the remote host is affected a vulnerability in the HTTP protocol stack
(HTTP.sys) due to improperly parsing crafted HTTP requests. A remote attacker can exploit this to execute
arbitrary code with System privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-034
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 8.1, 2012, and 2012 R2
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
References
BID 74013
CVE CVE-2015-1635
MSKB 3042553
XREF MSFT:MS15-034
XREF IAVA:2015-A-0092
Exploitable With
Plugin Output
tcp/445
KB : 3042553
- C:\Windows\system32\drivers\http.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17712
82828 - MS15-034: Vulnerability in HTTP.sys Could Allow Remote Code Execution (3042553)
(uncredentialed check)
Synopsis
The remote Windows host is affected by a remote code execution vulnerability in the HTTP protocol stack.
Description
The version of Windows running on the remote host is affected by an integer overflow condition in the HTTP
protocol stack (HTTP.sys) due to improper parsing of crafted HTTP requests. An unauthenticated, remote
attacker can exploit this to execute arbitrary code with System privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-034
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 8.1, 2012, and 2012 R2
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.0 (CVSS:3.0/E:F/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
References
BID 74013
CVE CVE-2015-1635
MSKB 3042553
XREF MSFT:MS15-034
XREF IAVA:2015-A-0092
XREF EDB-ID:36773
XREF EDB-ID:36776
Exploitable With
Plugin Information
Plugin Output
tcp/80
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple code execution
vulnerabilities :
- A remote code execution vulnerability exists in Windows Reader. An attacker can exploit this, by convincing a
user to open a specially crafted file, to execute arbitrary code in the context of the current user.
(CVE-2016-0046)
- A flaw exists in the Microsoft Windows PDF Library due to improper handling of API calls. An attacker can
exploit this, by convincing a user to open a specially crafted file, to execute arbitrary code in the context of the
current user. (CVE-2016-0058).
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-012
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, 2012 R2, and 10.
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 82636
BID 82638
CVE CVE-2016-0046
CVE CVE-2016-0058
MSKB 3123294
MSKB 3135174
XREF MSFT:MS16-012
Plugin Information
Plugin Output
tcp/445
KB : 3123294
- C:\Windows\system32\glcndfilter.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18184
91599 - MS16-071: Security Update for Microsoft Windows DNS Server (3164065)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability in the Windows Domain Name
System (DNS) server due to improper handling of DNS requests. An unauthenticated, remote attacker can
exploit this, via specially crafted DNS requests, to execute arbitrary code in the context of the Local System
Account.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-071
Solution
Microsoft has released a set of patches for Windows 2012 and 2012 R2.
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 91117
CVE CVE-2016-3227
MSKB 3161951
MSKB 3164065
XREF MSFT:MS16-071
XREF IAVA:2016-A-0153
Plugin Information
Published: 2016/06/14, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3161951
- C:\Windows\system32\dns.exe has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18340
91605 - MS16-077: Security Update for WPAD (3165191)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities :
- An elevation of privilege vulnerability exists in the Web Proxy Auto Discovery (WPAD) protocol due to improper
handling of the proxy discovery process. A remote attacker can exploit this, by responding to NetBIOS name
requests for WPAD, to bypass security restrictions and gain elevated privileges. (CVE-2016-3213)
- An elevation of privilege vulnerability exists in the Web Proxy Auto Discovery (WPAD) protocol due to improper
handling of certain proxy discovery scenarios. A remote attacker can exploit this to elevate privileges, resulting in
the ability to disclose or control network traffic. (CVE-2016-3236)
- An elevation of privilege vulnerability exists in NetBIOS due to improper handling of responses. A remote
attacker can exploit this, via specially crafted NetBIOS responses, to appear as a trusted network device,
resulting in the ability to render untrusted content in a browser outside of Enhanced Protected Mode (EPM) or an
application container. (CVE-2016-3299)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-077
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Note that cumulative update 3160005 in MS16-063 must also be installed in order to fully resolve
CVE-2016-3213.
Risk Factor
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
I
References
BID 91111
BID 91114
BID 92387
CVE CVE-2016-3213
CVE CVE-2016-3236
CVE CVE-2016-3299
MSKB 3163017
MSKB 3161949
MSKB 3163018
XREF MSFT:MS16-077
XREF IAVA:2016-A-0157
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3161949
- C:\Windows\system32\ws2_32.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18340
94012 - MS16-123: Security Update for Windows Kernel-Mode Drivers (3192892)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these, via a specially crafted application, to execute arbitrary
code in kernel mode. (CVE-2016-3266, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191)
- An elevation of privilege vulnerability exists in Windows Transaction Manager due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to execute processes in
an elevated context. (CVE-2016-3341)
See Also
http://www.nessus.org/u?e7e63f93
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
Critical
7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 93384
BID 93388
BID 93389
BID 93391
BID 93556
CVE CVE-2016-3266
CVE CVE-2016-3341
CVE CVE-2016-3376
CVE CVE-2016-7185
CVE CVE-2016-7211
MSKB 3191203
MSKB 3183431
MSKB 3192391
MSKB 3185330
MSKB 3192392
MSKB 3185331
MSKB 3192393
MSKB 3185332
MSKB 3192440
MSKB 3192441
MSKB 3194798
MSKB 4038788
XREF MSFT:MS16-123
XREF IAVA:2016-A-0279
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An unauthenticated, remote attacker can exploit these vulnerabilities,
via a specially crafted packet, to execute arbitrary code. (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145,
CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in Microsoft Server Message Block 1.0 (SMBv1) due to improper
handling of certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet,
to disclose sensitive information. (CVE-2017-0147)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-010
http://www.nessus.org/u?321523eb
http://www.nessus.org/u?065561d0
http://www.nessus.org/u?d9f569cf
https://github.com/stamparm/EternalRocks/
http://www.nessus.org/u?59db5b5b
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016. Microsoft has also released emergency patches for Windows operating systems that are no longer
supported, including Windows XP, 2003, and 8.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 96703
BID 96704
BID 96705
BID 96706
BID 96707
BID 96709
CVE CVE-2017-0143
CVE CVE-2017-0144
CVE CVE-2017-0145
CVE CVE-2017-0146
CVE CVE-2017-0147
CVE CVE-2017-0148
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
MSKB 4012598
XREF MSFT:MS17-010
XREF IAVA:2017-A-0065
XREF EDB-ID:41891
XREF EDB-ID:41987
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An unauthenticated, remote attacker can exploit these vulnerabilities,
via a specially crafted packet, to execute arbitrary code. (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145,
CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in Microsoft Server Message Block 1.0 (SMBv1) due to improper
handling of certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet,
to disclose sensitive information. (CVE-2017-0147)
See Also
http://www.nessus.org/u?68fc8eff
http://www.nessus.org/u?321523eb
http://www.nessus.org/u?065561d0
http://www.nessus.org/u?d9f569cf
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
http://www.nessus.org/u?b9d9ebf9
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
https://github.com/stamparm/EternalRocks/
http://www.nessus.org/u?59db5b5b
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016. Microsoft has also released emergency patches for Windows operating systems that are no longer
supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft recommends that users discontinue
the use of SMBv1. SMBv1 lacks security features that were included in later SMB versions. SMBv1 can
be disabled by following the vendor instructions provided in Microsoft KB2696547. Additionally, US-CERT
recommends that users block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB
over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
Critical
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 96703
BID 96704
BID 96705
BID 96706
BID 96707
BID 96709
CVE CVE-2017-0143
CVE CVE-2017-0144
CVE CVE-2017-0145
CVE CVE-2017-0146
CVE CVE-2017-0147
CVE CVE-2017-0148
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
MSKB 4012598
XREF EDB-ID:41891
XREF EDB-ID:41987
XREF MSFT:MS17-010
XREF IAVA:2017-A-0065
Exploitable With
Plugin Information
Plugin Output
tcp/445
97743 - MS17-012: Security Update for Microsoft Windows (4013078)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- A security feature bypass vulnerability exists in Device Guard due to improper validation of certain elements
in a signed PowerShell script. An unauthenticated, remote attacker can exploit this vulnerability to modify the
contents of a PowerShell script without invalidating the signature associated with the file, allowing the execution
of a malicious script. (CVE-2017-0007)
- A denial of service vulnerability exists in the Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3)
client implementations due to improper handling of certain requests sent to the client. An unauthenticated,
remote attacker can exploit this issue, via a malicious SMB server, to cause the system to stop responding until
it is manually restarted. (CVE-2017-0016)
- A remote code execution vulnerability exists due to using an insecure path to load certain dynamic link library
(DLL) files. A local attacker can exploit this, via a specially crafted library placed in the path, to execute arbitrary
code. (CVE-2017-0039)
- An information disclosure vulnerability exists in Windows dnsclient due to improper handling of certain
requests. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted
web page, to gain access to sensitive information on a targeted workstation. If the target is a server, the
attacker can also exploit this issue by tricking the server into sending a DNS query to a malicious DNS server.
(CVE-2017-0057)
- An integer overflow condition exists in the iSNS Server service due to improper validation of input from
the client. An unauthenticated, remote attacker can exploit this issue, via a specially crafted application that
connects and issues requests to the iSNS server, to execute arbitrary code in the context of the SYSTEM
account. (CVE-2017-0104)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-012
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 95969
BID 96018
BID 96024
BID 96695
BID 96697
BID 96700
CVE CVE-2017-0007
CVE CVE-2017-0016
CVE CVE-2017-0039
CVE CVE-2017-0057
CVE CVE-2017-0100
CVE CVE-2017-0104
MSKB 3217587
MSKB 4012021
MSKB 4012212
MSKB 4012215
MSKB 4012213
MSKB 4012216
MSKB 4012214
MSKB 4012217
MSKB 4012606
MSKB 4013198
XREF CERT:867968
XREF IAVA:2017-A-0070
XREF MSFT:MS17-012
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
According to its self-reported version number, there is at least one version of Microsoft .NET Framework
installed on the remote Windows host that is no longer supported.
Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it
is likely to contain security vulnerabilities.
See Also
http://www.nessus.org/u?53ee34d3
http://www.nessus.org/u?3b10ac8d
Solution
Risk Factor
Critical
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host has Microsoft Server Message Block 1.0 (SMBv1) enabled. It is, therefore, affected
by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated, remote attacker can exploit these vulnerabilities,
via a specially crafted SMBv1 packet, to disclose sensitive information. (CVE-2017-0267, CVE-2017-0268,
CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, CVE-2017-0276)
- Multiple denial of service vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of requests. An unauthenticated, remote attacker can exploit these vulnerabilities, via a
specially crafted SMB request, to cause the system to stop responding. (CVE-2017-0269, CVE-2017-0273,
CVE-2017-0280)
- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of SMBv1 packets. An unauthenticated, remote attacker can exploit these vulnerabilities, via a
specially crafted SMBv1 packet, to execute arbitrary code. (CVE-2017-0272, CVE-2017-0277, CVE-2017-0278,
CVE-2017-0279)
Depending on the host's security policy configuration, this plugin cannot always correctly determine if the
Windows host is vulnerable if the host is running a later Windows version (i.e., Windows 8.1, 10, 2012, 2012 R2,
and 2016) specifically that named pipes and shares are allowed to be accessed remotely and anonymously.
Tenable does not recommend this configuration, and the hosts should be checked locally for patches with one
of the following plugins, depending on the Windows version : 100054, 100055, 100057, 100059, 100060, or
100061.
See Also
http://www.nessus.org/u?c21268d4
http://www.nessus.org/u?b9253982
http://www.nessus.org/u?23802c83
http://www.nessus.org/u?8313bb60
http://www.nessus.org/u?7677c678
http://www.nessus.org/u?36da236c
http://www.nessus.org/u?0981b934
http://www.nessus.org/u?c88efefa
http://www.nessus.org/u?695bf5cc
http://www.nessus.org/u?459a1e8c
http://www.nessus.org/u?ea45bbc5
http://www.nessus.org/u?4195776a
http://www.nessus.org/u?fbf092cf
http://www.nessus.org/u?8c0cc566
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 98259
BID 98260
BID 98261
BID 98263
BID 98264
BID 98265
BID 98266
BID 98267
BID 98268
BID 98270
BID 98271
BID 98272
BID 98273
BID 98274
CVE CVE-2017-0267
CVE CVE-2017-0268
CVE CVE-2017-0269
CVE CVE-2017-0270
CVE CVE-2017-0271
CVE CVE-2017-0272
CVE CVE-2017-0273
CVE CVE-2017-0274
CVE CVE-2017-0275
CVE CVE-2017-0276
CVE CVE-2017-0277
CVE CVE-2017-0278
CVE CVE-2017-0279
CVE CVE-2017-0280
MSKB 4016871
MSKB 4018466
MSKB 4019213
MSKB 4019214
MSKB 4019215
MSKB 4019216
MSKB 4019263
MSKB 4019264
MSKB 4019472
MSKB 4019473
MSKB 4019474
Plugin Information
Plugin Output
tcp/445
73570 - Oracle Java SE Multiple Vulnerabilities (April 2014 CPU)
Synopsis
The remote Windows host contains a programming platform that is potentially affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 8
Update 5, 7 Update 55, 6 Update 75, or 5 Update 65. It is, therefore, potentially affected by security issues in the
following components :
- 2D
- AWT
- Deployment
- Hotspot
- JAX-WS
- JAXB
- JAXP
- JNDI
- JavaFX
- Javadoc
- Libraries
- Scripting
- Security
- Sound
See Also
http://www.nessus.org/u?1e3ee66a
http://www.nessus.org/u?f65f6f6e
http://www.nessus.org/u?39cb260f
http://www.nessus.org/u?726f7054
http://www.nessus.org/u?84f3023c
Solution
Update to JDK / JRE 8 Update 5, 7 Update 55, 6 Update 75, or 5 Update 65 or later and, if necessary, remove
any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 65 or later or 6
Update 75 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 63676
BID 64493
BID 65568
BID 66856
BID 66866
BID 66870
BID 66873
BID 66877
BID 66879
BID 66881
BID 66883
BID 66886
BID 66887
BID 66891
BID 66893
BID 66894
BID 66897
BID 66898
BID 66899
BID 66902
BID 66903
BID 66904
BID 66905
BID 66907
BID 66908
BID 66909
BID 66910
BID 66911
BID 66912
BID 66913
BID 66914
BID 66915
BID 66916
BID 66917
BID 66918
BID 66919
BID 66920
CVE CVE-2013-6629
CVE CVE-2013-6954
CVE CVE-2014-0429
CVE CVE-2014-0432
CVE CVE-2014-0446
CVE CVE-2014-0448
CVE CVE-2014-0449
CVE CVE-2014-0451
CVE CVE-2014-0452
CVE CVE-2014-0453
CVE CVE-2014-0454
CVE CVE-2014-0455
CVE CVE-2014-0456
CVE CVE-2014-0457
CVE CVE-2014-0458
CVE CVE-2014-0459
CVE CVE-2014-0460
CVE CVE-2014-0461
CVE CVE-2014-0463
CVE CVE-2014-0464
CVE CVE-2014-1876
CVE CVE-2014-2397
CVE CVE-2014-2398
CVE CVE-2014-2401
CVE CVE-2014-2402
CVE CVE-2014-2403
CVE CVE-2014-2409
CVE CVE-2014-2410
CVE CVE-2014-2412
CVE CVE-2014-2413
CVE CVE-2014-2414
CVE CVE-2014-2420
CVE CVE-2014-2421
CVE CVE-2014-2422
CVE CVE-2014-2423
CVE CVE-2014-2427
CVE CVE-2014-2428
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 45, 7 Update 79, 6 Update 95, or 5 Update 85. It is, therefore, affected by security vulnerabilities in the
following components :
- 2D
- Beans
- Deployment
- Hotspot
- JavaFX
- JCE
- JSSE
- Tools
See Also
http://www.nessus.org/u?56618dc1
http://www.nessus.org/u?abb7def2
http://www.nessus.org/u?7736cf95
http://www.nessus.org/u?726f7054
http://www.nessus.org/u?84f3023c
https://www.smacktls.com/#freak
Solution
Upgrade to Oracle JDK / JRE 8 Update 45, 7 Update 79, 6 Update 95, or 5 Update 85 or later. If necessary,
remove any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 85 or later and 6
Update 95 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 71936
BID 74072
BID 74083
BID 74094
BID 74097
BID 74104
BID 74111
BID 74119
BID 74129
BID 74135
BID 74141
BID 74145
BID 74147
BID 74149
CVE CVE-2015-0204
CVE CVE-2015-0458
CVE CVE-2015-0459
CVE CVE-2015-0460
CVE CVE-2015-0469
CVE CVE-2015-0470
CVE CVE-2015-0477
CVE CVE-2015-0478
CVE CVE-2015-0480
CVE CVE-2015-0484
CVE CVE-2015-0486
CVE CVE-2015-0488
CVE CVE-2015-0491
CVE CVE-2015-0492
Plugin Information
Published: 2015/04/16, Modified: 2018/11/15
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is potentially affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7
Update 51, 6 Update 71, or 5 Update 61. It is, therefore, potentially affected by security issues in the following
components :
- 2D
- Beans
- CORBA
- Deployment
- Hotspot
- Install
- JAAS
- JavaFX
- JAXP
- JNDI
- JSSE
- Libraries
- Networking
- Security
- Serviceability
See Also
https://www.zerodayinitiative.com/advisories/ZDI-14-013/
https://www.zerodayinitiative.com/advisories/ZDI-14-038/
http://www.nessus.org/u?924160cd
Solution
Update to JDK / JRE 7 Update 51, 6 Update 71 or 5 Update 61 or later and, if necessary, remove any affected
versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 61 or later or 6
Update 71 or later.
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 64863
BID 64875
BID 64882
BID 64890
BID 64894
BID 64899
BID 64901
BID 64903
BID 64906
BID 64907
BID 64910
BID 64912
BID 64914
BID 64915
BID 64916
BID 64917
BID 64918
BID 64919
BID 64920
BID 64921
BID 64922
BID 64923
BID 64924
BID 64926
BID 64927
BID 64928
BID 64929
BID 64930
BID 64931
BID 64932
BID 64933
BID 64934
BID 64935
BID 64936
BID 64937
CVE CVE-2013-5870
CVE CVE-2013-5878
CVE CVE-2013-5884
CVE CVE-2013-5887
CVE CVE-2013-5889
CVE CVE-2013-5893
CVE CVE-2013-5895
CVE CVE-2013-5896
CVE CVE-2013-5898
CVE CVE-2013-5899
CVE CVE-2013-5902
CVE CVE-2013-5904
CVE CVE-2013-5905
CVE CVE-2013-5906
CVE CVE-2013-5907
CVE CVE-2013-5910
CVE CVE-2014-0368
CVE CVE-2014-0373
CVE CVE-2014-0375
CVE CVE-2014-0376
CVE CVE-2014-0382
CVE CVE-2014-0385
CVE CVE-2014-0387
CVE CVE-2014-0403
CVE CVE-2014-0408
CVE CVE-2014-0410
CVE CVE-2014-0411
CVE CVE-2014-0415
CVE CVE-2014-0416
CVE CVE-2014-0417
CVE CVE-2014-0418
CVE CVE-2014-0422
CVE CVE-2014-0423
CVE CVE-2014-0424
CVE CVE-2014-0428
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle Java SE or Java for Business installed on the remote host is prior to 8 Update 31, 7
Update 75, 6 Update 91, or 5 Update 81. It is, therefore, affected by security vulnerabilities in the following
components :
- 2D
- Deployment
- Hotspot
- Install
- JAX-WS
- JSSE
- Libraries
- RMI
- Security
- Serviceability
- Swing
See Also
http://www.nessus.org/u?75c6cafb
http://www.nessus.org/u?17bff27a
http://www.nessus.org/u?64c6b956
http://www.nessus.org/u?726f7054
http://www.nessus.org/u?84f3023c
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
Update to JDK / JRE 8 Update 31, 7 Update 75, 6 Update 91, or 5 Update 81 or later, and if necessary, remove
any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 81 or later, or 6
Update 91 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.8 (CVSS:3.0/E:P/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.8 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 70574
BID 72132
BID 72136
BID 72137
BID 72140
BID 72142
BID 72146
BID 72148
BID 72150
BID 72154
BID 72155
BID 72159
BID 72162
BID 72165
BID 72168
BID 72169
BID 72173
BID 72175
BID 72176
CVE CVE-2014-3566
CVE CVE-2014-6549
CVE CVE-2014-6585
CVE CVE-2014-6587
CVE CVE-2014-6591
CVE CVE-2014-6593
CVE CVE-2014-6601
CVE CVE-2015-0383
CVE CVE-2015-0395
CVE CVE-2015-0400
CVE CVE-2015-0403
CVE CVE-2015-0406
CVE CVE-2015-0407
CVE CVE-2015-0408
CVE CVE-2015-0410
CVE CVE-2015-0412
CVE CVE-2015-0413
CVE CVE-2015-0421
CVE CVE-2015-0437
XREF CERT:577193
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 71, 7 Update 95, or 6 Update 111. It is, therefore, affected by security vulnerabilities in the following
components :
- 2D
- AWT
- JAXP
- JMX
- Libraries
- Networking
- Security
See Also
http://www.nessus.org/u?376edd90
http://www.nessus.org/u?f7b6203b
http://www.nessus.org/u?796894ea
http://www.nessus.org/u?b809e094
http://www.mitls.org/pages/attacks/SLOTH
http://www.mitls.org/downloads/transcript-collisions.pdf
Solution
Upgrade to Oracle JDK / JRE 8 Update 71, 7 Update 95, 6 Update 111, or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 111 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 77568
BID 79684
CVE CVE-2015-7575
CVE CVE-2015-8126
CVE CVE-2016-0402
CVE CVE-2016-0448
CVE CVE-2016-0466
CVE CVE-2016-0475
CVE CVE-2016-0483
CVE CVE-2016-0494
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 11, 7 Update 65, 6 Update 81, or 5 Update 71. It is, therefore, affected by security issues in the following
components :
- Deployment
- Hotspot
- JavaFX
- JMX
- Libraries
- Security
- Serviceability
- Swing
See Also
http://www.nessus.org/u?4743a1ef
http://www.nessus.org/u?81911044
http://www.nessus.org/u?39cb260f
http://www.nessus.org/u?726f7054
http://www.nessus.org/u?84f3023c
Solution
Update to JDK / JRE 8 Update 11, 7 Update 65, 6 Update 81, or 5 Update 71 or later and, if necessary, remove
any affected versions.
Note that an extended support contract with Oracle is needed to obtain JDK / JRE 5 Update 71 or later or 6
Update 81 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
References
CVE CVE-2014-2483
CVE CVE-2014-2490
CVE CVE-2014-4208
CVE CVE-2014-4209
CVE CVE-2014-4216
CVE CVE-2014-4218
CVE CVE-2014-4219
CVE CVE-2014-4220
CVE CVE-2014-4221
CVE CVE-2014-4223
CVE CVE-2014-4227
CVE CVE-2014-4244
CVE CVE-2014-4247
CVE CVE-2014-4252
CVE CVE-2014-4262
CVE CVE-2014-4263
CVE CVE-2014-4264
CVE CVE-2014-4265
CVE CVE-2014-4266
CVE CVE-2014-4268
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 51, 7 Update 85, or 6 Update 101. It is, therefore, affected by security vulnerabilities in the following
components :
- 2D
- CORBA
- Deployment
- Hotspot
- Install
- JCE
- JMX
- JNDI
- JSSE
- Libraries
- RMI
- Security
See Also
http://www.nessus.org/u?c3cf9c18
http://www.nessus.org/u?822f496a
http://www.nessus.org/u?8497a5aa
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 8 Update 51, 7 Update 85, 6 Update 101, or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
References
BID 73684
BID 74733
BID 75784
BID 75796
BID 75812
BID 75818
BID 75823
BID 75832
BID 75833
BID 75850
BID 75854
BID 75857
BID 75861
BID 75867
BID 75871
BID 75874
BID 75877
BID 75881
BID 75883
BID 75887
BID 75890
BID 75892
BID 75893
BID 75895
CVE CVE-2015-2590
CVE CVE-2015-2596
CVE CVE-2015-2601
CVE CVE-2015-2613
CVE CVE-2015-2619
CVE CVE-2015-2621
CVE CVE-2015-2625
CVE CVE-2015-2627
CVE CVE-2015-2628
CVE CVE-2015-2632
CVE CVE-2015-2637
CVE CVE-2015-2638
CVE CVE-2015-2659
CVE CVE-2015-2664
CVE CVE-2015-2808
CVE CVE-2015-4000
CVE CVE-2015-4729
CVE CVE-2015-4731
CVE CVE-2015-4732
CVE CVE-2015-4733
CVE CVE-2015-4736
CVE CVE-2015-4748
CVE CVE-2015-4749
CVE CVE-2015-4760
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 101, 7 Update 111, or 6 Update 121. It is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the CORBA subcomponent that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-3458)
- An unspecified flaw exists in the Networking subcomponent that allows a local attacker to impact integrity.
(CVE-2016-3485)
- An unspecified flaw exists in the JavaFX subcomponent that allows an unauthenticated, remote attacker to
cause a denial of service condition. (CVE-2016-3498)
- An unspecified flaw exists in the JAXP subcomponent that allows an unauthenticated, remote attacker to cause
a denial of service condition. (CVE-2016-3500)
- An unspecified flaw exists in the Install subcomponent that allows a local attacker to gain elevated privileges.
(CVE-2016-3503)
- An unspecified flaw exists in the JAXP subcomponent that allows an unauthenticated, remote attacker to cause
a denial of service condition. (CVE-2016-3508)
- An unspecified flaw exists in the Deployment subcomponent that allows a local attacker to gain elevated
privileges. (CVE-2016-3511)
- An unspecified flaw exists in the Hotspot subcomponent that allows an unauthenticated, remote attacker to
disclose potentially sensitive information.
(CVE-2016-3550)
- An unspecified flaw exists in the Install subcomponent that allows a local attacker to gain elevated privileges.
(CVE-2016-3552)
- A flaw exists in the Hotspot subcomponent due to improper access to the MethodHandle::invokeBasic()
function. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2016-3587)
- A flaw exists in the Libraries subcomponent within the MethodHandles::dropArguments() function that allows an
unauthenticated, remote attacker to execute arbitrary code. (CVE-2016-3598)
- A flaw exists in the Hotspot subcomponent within the ClassVerifier::ends_in_athrow() function when handling
bytecode verification. An unauthenticated, remote attacker can exploit this to execute arbitrary code.
(CVE-2016-3606)
- An unspecified flaw exists in the Libraries subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2016-3610)
See Also
http://www.nessus.org/u?e71b6836
http://www.nessus.org/u?92867054
http://www.nessus.org/u?6adbf356
http://www.nessus.org/u?81636e81
Solution
Upgrade to Oracle JDK / JRE 8 Update 101 / 7 Update 111 / 6 Update 121 or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 91904
BID 91912
BID 91918
BID 91930
BID 91945
BID 91951
BID 91956
BID 91962
BID 91972
BID 91990
BID 91996
BID 92000
BID 92006
CVE CVE-2016-3458
CVE CVE-2016-3485
CVE CVE-2016-3498
CVE CVE-2016-3500
CVE CVE-2016-3503
CVE CVE-2016-3508
CVE CVE-2016-3511
CVE CVE-2016-3550
CVE CVE-2016-3552
CVE CVE-2016-3587
CVE CVE-2016-3598
CVE CVE-2016-3606
CVE CVE-2016-3610
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is potentially affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than or
equal to 7 Update 21, 6 Update 45 or 5 Update 45. It is, therefore, potentially affected by security issues in the
following components :
- 2D
- AWT
- CORBA
- Deployment
- Hotspot
- Install
- JDBC
- JMX
- Libraries
- Networking
- Serialization
- Serviceability
- Sound
See Also
http://www.zerodayinitiative.com/advisories/ZDI-13-132/
http://www.zerodayinitiative.com/advisories/ZDI-13-151/
http://www.zerodayinitiative.com/advisories/ZDI-13-152/
http://www.zerodayinitiative.com/advisories/ZDI-13-153/
http://www.zerodayinitiative.com/advisories/ZDI-13-154/
http://www.zerodayinitiative.com/advisories/ZDI-13-155/
http://www.zerodayinitiative.com/advisories/ZDI-13-156/
http://www.zerodayinitiative.com/advisories/ZDI-13-157/
http://www.zerodayinitiative.com/advisories/ZDI-13-158/
http://www.zerodayinitiative.com/advisories/ZDI-13-159/
http://www.zerodayinitiative.com/advisories/ZDI-13-160/
https://seclists.org/fulldisclosure/2013/Aug/211
https://seclists.org/fulldisclosure/2013/Aug/276
http://www.nessus.org/u?a094a6d7
http://www.oracle.com/technetwork/java/eol-135779.html
Solution
Update to JDK / JRE 5 Update 51, 6 Update 51, 7 Update 25 or later and, if necessary, remove any affected
versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 51 or later or 6
Update 51 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
References
BID 60617
BID 60618
BID 60619
BID 60620
BID 60621
BID 60622
BID 60623
BID 60624
BID 60625
BID 60626
BID 60627
BID 60629
BID 60630
BID 60631
BID 60632
BID 60633
BID 60634
BID 60635
BID 60636
BID 60637
BID 60638
BID 60639
BID 60640
BID 60641
BID 60643
BID 60644
BID 60645
BID 60646
BID 60647
BID 60649
BID 60650
BID 60651
BID 60652
BID 60653
BID 60654
BID 60655
BID 60656
BID 60657
BID 60658
BID 60659
CVE CVE-2013-1500
CVE CVE-2013-1571
CVE CVE-2013-2400
CVE CVE-2013-2407
CVE CVE-2013-2412
CVE CVE-2013-2437
CVE CVE-2013-2442
CVE CVE-2013-2443
CVE CVE-2013-2444
CVE CVE-2013-2445
CVE CVE-2013-2446
CVE CVE-2013-2447
CVE CVE-2013-2448
CVE CVE-2013-2449
CVE CVE-2013-2450
CVE CVE-2013-2451
CVE CVE-2013-2452
CVE CVE-2013-2453
CVE CVE-2013-2454
CVE CVE-2013-2455
CVE CVE-2013-2456
CVE CVE-2013-2457
CVE CVE-2013-2458
CVE CVE-2013-2459
CVE CVE-2013-2460
CVE CVE-2013-2461
CVE CVE-2013-2462
CVE CVE-2013-2463
CVE CVE-2013-2464
CVE CVE-2013-2465
CVE CVE-2013-2466
CVE CVE-2013-2467
CVE CVE-2013-2468
CVE CVE-2013-2469
CVE CVE-2013-2470
CVE CVE-2013-2471
CVE CVE-2013-2472
CVE CVE-2013-2473
CVE CVE-2013-3743
CVE CVE-2013-3744
XREF CERT:225657
XREF EDB-ID:27754
XREF EDB-ID:27943
XREF EDB-ID:28050
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is potentially affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is earlier than 7
Update 45, 6 Update 65, or 5 Update 55. It is, therefore, potentially affected by security issues in the following
components :
- 2D
- AWT
- BEANS
- CORBA
- Deployment
- JAX-WS
- JAXP
- JGSS
- jhat
- JNDI
- JavaFX
- Javadoc
- Libraries
- SCRIPTING
- Security
- Swing
See Also
http://www.zerodayinitiative.com/advisories/ZDI-13-244/
http://www.zerodayinitiative.com/advisories/ZDI-13-245/
http://www.zerodayinitiative.com/advisories/ZDI-13-246/
http://www.zerodayinitiative.com/advisories/ZDI-13-247/
http://www.zerodayinitiative.com/advisories/ZDI-13-248/
http://www.nessus.org/u?94fd7b37
http://www.oracle.com/technetwork/java/eol-135779.html
Solution
Update to JDK / JRE 7 Update 45, 6 Update 65, or 5 Update 55 or later and, if necessary, remove any affected
versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 55 or later or 6
Update 65 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 58507
BID 59141
BID 59153
BID 59165
BID 59167
BID 59170
BID 59184
BID 59187
BID 59194
BID 59206
BID 59212
BID 59213
BID 59219
BID 59228
BID 59243
BID 60617
BID 60618
BID 60619
BID 60620
BID 60621
BID 60622
BID 60623
BID 60624
BID 60625
BID 60626
BID 60627
BID 60629
BID 60630
BID 60631
BID 60632
BID 60633
BID 60634
BID 60635
BID 60637
BID 60638
BID 60639
BID 60640
BID 60641
BID 60643
BID 60644
BID 60645
BID 60646
BID 60647
BID 60649
BID 60650
BID 60651
BID 60652
BID 60653
BID 60654
BID 60655
BID 60656
BID 60657
BID 60658
BID 60659
BID 61310
BID 63079
BID 63082
BID 63089
BID 63095
BID 63098
BID 63101
BID 63102
BID 63103
BID 63106
BID 63110
BID 63111
BID 63112
BID 63115
BID 63118
BID 63120
BID 63121
BID 63122
BID 63124
BID 63126
BID 63127
BID 63128
BID 63129
BID 63130
BID 63131
BID 63132
BID 63133
BID 63134
BID 63135
BID 63136
BID 63137
BID 63139
BID 63140
BID 63141
BID 63142
BID 63143
BID 63144
BID 63145
BID 63146
BID 63147
BID 63148
BID 63149
BID 63150
BID 63151
BID 63152
BID 63153
BID 63154
BID 63155
BID 63156
BID 63157
BID 63158
CVE CVE-2013-3829
CVE CVE-2013-4002
CVE CVE-2013-5772
CVE CVE-2013-5774
CVE CVE-2013-5775
CVE CVE-2013-5776
CVE CVE-2013-5777
CVE CVE-2013-5778
CVE CVE-2013-5780
CVE CVE-2013-5782
CVE CVE-2013-5783
CVE CVE-2013-5784
CVE CVE-2013-5787
CVE CVE-2013-5788
CVE CVE-2013-5789
CVE CVE-2013-5790
CVE CVE-2013-5797
CVE CVE-2013-5800
CVE CVE-2013-5801
CVE CVE-2013-5802
CVE CVE-2013-5803
CVE CVE-2013-5804
CVE CVE-2013-5805
CVE CVE-2013-5806
CVE CVE-2013-5809
CVE CVE-2013-5810
CVE CVE-2013-5812
CVE CVE-2013-5814
CVE CVE-2013-5817
CVE CVE-2013-5818
CVE CVE-2013-5819
CVE CVE-2013-5820
CVE CVE-2013-5823
CVE CVE-2013-5824
CVE CVE-2013-5825
CVE CVE-2013-5829
CVE CVE-2013-5830
CVE CVE-2013-5831
CVE CVE-2013-5832
CVE CVE-2013-5838
CVE CVE-2013-5840
CVE CVE-2013-5842
CVE CVE-2013-5843
CVE CVE-2013-5844
CVE CVE-2013-5846
CVE CVE-2013-5848
CVE CVE-2013-5849
CVE CVE-2013-5850
CVE CVE-2013-5851
CVE CVE-2013-5852
CVE CVE-2013-5854
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 25, 7 Update 71, 6 Update 85, or 5 Update 75. It is, therefore, affected by security issues in the following
components :
- 2D
- AWT
- Deployment
- Hotspot
- JAXP
- JSSE
- JavaFX
- Libraries
- Security
See Also
http://www.nessus.org/u?2b7fdf57
http://www.nessus.org/u?631ebd82
http://www.nessus.org/u?cd6e3a16
http://www.nessus.org/u?726f7054
http://www.nessus.org/u?84f3023c
Solution
Update to JDK / JRE 8 Update 25, 7 Update 71, 6 Update 85, or 5 Update 75 or later and, if necessary, remove
any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 5 Update 75 or later or 6
Update 85 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 70456
BID 70460
BID 70468
BID 70470
BID 70484
BID 70488
BID 70507
BID 70518
BID 70519
BID 70522
BID 70523
BID 70531
BID 70533
BID 70538
BID 70544
BID 70548
BID 70552
BID 70556
BID 70560
BID 70564
BID 70565
BID 70567
BID 70569
BID 70570
BID 70572
CVE CVE-2014-4288
CVE CVE-2014-6456
CVE CVE-2014-6457
CVE CVE-2014-6458
CVE CVE-2014-6466
CVE CVE-2014-6468
CVE CVE-2014-6476
CVE CVE-2014-6485
CVE CVE-2014-6492
CVE CVE-2014-6493
CVE CVE-2014-6502
CVE CVE-2014-6503
CVE CVE-2014-6504
CVE CVE-2014-6506
CVE CVE-2014-6511
CVE CVE-2014-6512
CVE CVE-2014-6513
CVE CVE-2014-6515
CVE CVE-2014-6517
CVE CVE-2014-6519
CVE CVE-2014-6527
CVE CVE-2014-6531
CVE CVE-2014-6532
CVE CVE-2014-6558
CVE CVE-2014-6562
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 65, 7 Update 91, or 6 Update 105. It is, therefore, affected by security vulnerabilities in the following
components :
- 2D
- CORBA
- Deployment
- JavaFX
- JAXP
- JGSS
- Libraries
- RMI
- Security
- Serialization
See Also
http://www.nessus.org/u?2e5158e8
http://www.nessus.org/u?31d5ce9a
http://www.nessus.org/u?4da55863
http://www.nessus.org/u?af476d66
Solution
Upgrade to Oracle JDK / JRE 8 Update 65, 7 Update 91, 6 Update 105, or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 77126
BID 77148
BID 77159
BID 77160
BID 77162
BID 77163
BID 77164
BID 77181
BID 77192
BID 77194
BID 77200
BID 77207
BID 77209
BID 77211
BID 77214
BID 77221
BID 77223
BID 77225
BID 77226
BID 77229
BID 77238
BID 77241
BID 77242
CVE CVE-2015-4835
CVE CVE-2015-4881
CVE CVE-2015-4843
CVE CVE-2015-4883
CVE CVE-2015-4860
CVE CVE-2015-4805
CVE CVE-2015-4844
CVE CVE-2015-4901
CVE CVE-2015-4868
CVE CVE-2015-4810
CVE CVE-2015-4806
CVE CVE-2015-4871
CVE CVE-2015-4902
CVE CVE-2015-4840
CVE CVE-2015-4882
CVE CVE-2015-4842
CVE CVE-2015-4734
CVE CVE-2015-4903
CVE CVE-2015-4803
CVE CVE-2015-4893
CVE CVE-2015-4911
CVE CVE-2015-4872
CVE CVE-2015-4906
CVE CVE-2015-4916
CVE CVE-2015-4908
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
According to its self-reported version number, the installation of Oracle VirtualBox on the remote Windows host
is no longer supported.
Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it
is likely to contain security vulnerabilities.
See Also
http://www.nessus.org/u?925c7fb8
http://www.nessus.org/u?466fb425
https://www.virtualbox.org/wiki/Download_Old_Builds
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4025333 or cumulative update 4025336. It is, therefore,
affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the Windows Performance Monitor Console due to improper
parsing of XML input that contains a reference to an external entity. An unauthenticated, remote attacker can
exploit this, by convincing a user to create a Data Collector Set and import a specially crafted XML file, to
disclose arbitrary files via an XML external entity (XXE) declaration. (CVE-2017-0170)
- A remote code execution vulnerability exists in Windows Explorer due to improper handling of executable files
and shares during rename operations. An unauthenticated, remote attacker can exploit this, by convincing a user
to open a specially crafted file, to execute arbitrary code in the context of the current user. (CVE-2017-8463)
- An elevation of privilege vulnerability exists in the Microsoft Graphics component due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to run arbitrary code in
kernel mode. (CVE-2017-8467)
- An information disclosure vulnerability exists in Win32k due to improper handling of objects in memory. A local
attacker can exploit this, via a specially crafted application, to disclose sensitive information.
(CVE-2017-8486)
- A security bypass vulnerability exists in Microsoft Windows when handling Kerberos ticket exchanges due to
a failure to prevent tampering with the SNAME field. A man-in-the-middle attacker can exploit this to bypass the
Extended Protection for Authentication security feature. (CVE-2017-8495)
- An elevation of privilege vulnerability exists in the Microsoft Graphics component due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to run arbitrary code in
kernel mode. (CVE-2017-8556)
- An information disclosure vulnerability exists in the Windows System Information Console due to improper
parsing of XML input that contains a reference to an external entity. An unauthenticated, remote attacker can
exploit this, by convincing a user to open a specially crafted file, to disclose arbitrary files via an XML external
entity (XXE) declaration.
(CVE-2017-8557)
- An elevation of privilege vulnerability exists in the Windows kernel due to improper handling of objects in
memory. A local attacker can exploit this, via a specially crafted application, to execute arbitrary code with
elevated permissions. (CVE-2017-8561)
- An elevation of privilege vulnerability exists in Windows due to improper handling of calls to Advanced Local
Procedure Call (ALPC). An authenticated, remote attacker can exploit this via a specially crafted application, to
run processes in an elevated context.
(CVE-2017-8562)
- An elevation of privilege vulnerability exists in Windows due to Kerberos falling back to NT LAN Manager
(NTLM) Authentication Protocol as the default authentication protocol. An authenticated, remote attacker can
exploit this, via an application that sends specially crafted traffic to a domain controller, to run processes in an
elevated context. (CVE-2017-8563)
- An information disclosure vulnerability exists in the Windows kernel due to improper initialization of objects in
memory. An authenticated, remote attacker can exploit this, via a specially crafted application, to bypass Kernel
Address Space Layout Randomization (KASLR) and disclose the base address of the kernel driver.
(CVE-2017-8564)
- A remote code execution vulnerability exists in PowerShell when handling a PSObject that wraps a CIM
instance. An authenticated, remote attacker can exploit this, via a specially crafted script, to execute arbitrary
code in a PowerShell remote session.
(CVE-2017-8565)
- An elevation of privilege vulnerability exists in the Microsoft Graphics component due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to run arbitrary code in
kernel mode. (CVE-2017-8573)
- Multiple elevation of privilege vulnerabilities exist in the Microsoft Graphics Component due to improper
handling of objects in memory. A local attacker can exploit these, via a specially crafted application, to run
arbitrary code in kernel mode. (CVE-2017-8577, CVE-2017-8578, CVE-2017-8580)
- An elevation of privilege vulnerability exists in Windows due to improper handling of objects in memory. A local
attacker can exploit this, via a specially crafted application, to run arbitrary code in kernel mode.
(CVE-2017-8581)
- An information disclosure vulnerability exists in the HTTP.sys server application component due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, via a specially crafted
request, to disclose sensitive information.
(CVE-2017-8582)
- A denial of service vulnerability exists in Windows Explorer that is triggered when Explorer attempts to open a
non-existent file. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially
crafted website, to cause a user's system to stop responding. (CVE-2017-8587)
- A remote code execution vulnerability exists in WordPad due to improper parsing of specially crafted files. An
unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted file, to execute
arbitrary code in the context of the current user. (CVE-2017-8588)
- A remote code execution vulnerability exists in the Windows Search component due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this, by sending specially crafted messages
to the Windows Search service, to elevate privileges and execute arbitrary code. (CVE-2017-8589)
- An elevation of privilege vulnerability exists in the Windows Common Log File System (CLFS) driver due to
improper handling of objects in memory. A local attacker can exploit this, via a specially crafted application, to
run processes in an elevated context. (CVE-2017-8590)
- A security bypass vulnerability exists in Microsoft browsers due to improper handling of redirect requests.
An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to
bypass CORS redirect restrictions. (CVE-2017-8592)
- A remote code execution vulnerability exists in Internet Explorer due to improper handling of objects in
memory.
An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to
execute arbitrary code in the context of the current user. (CVE-2017-8594)
- A spoofing vulnerability exists in Microsoft browsers due to improper parsing of HTTP content. An
unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to
redirect the user to a malicious website.
(CVE-2017-8602)
- A remote code execution vulnerability exists in Microsoft browsers in the JavaScript engines due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website, to execute arbitrary code in the context of the current user. (CVE-2017-8606)
- A remote code execution vulnerability exists in Microsoft browsers in the JavaScript engines due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website, to execute arbitrary code in the context of the current user. (CVE-2017-8607)
- A remote code execution vulnerability exists in Microsoft browsers in the JavaScript engines due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website, to execute arbitrary code in the context of the current user. (CVE-2017-8608)
- A remote code execution vulnerability exists in Internet Explorer in the VBScript engine due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website, to execute arbitrary code in the context of the current user. (CVE-2017-8618)
See Also
http://www.nessus.org/u?60b27ab9
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.8 (CVSS:3.0/E:P/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.8 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 99387
BID 99389
BID 99390
BID 99394
BID 99396
BID 99397
BID 99398
BID 99399
BID 99400
BID 99401
BID 99402
BID 99408
BID 99409
BID 99410
BID 99412
BID 99413
BID 99414
BID 99416
BID 99419
BID 99421
BID 99423
BID 99424
BID 99425
BID 99426
BID 99427
BID 99428
BID 99429
BID 99431
BID 99439
CVE CVE-2017-0170
CVE CVE-2017-8463
CVE CVE-2017-8467
CVE CVE-2017-8486
CVE CVE-2017-8495
CVE CVE-2017-8556
CVE CVE-2017-8557
CVE CVE-2017-8561
CVE CVE-2017-8562
CVE CVE-2017-8563
CVE CVE-2017-8564
CVE CVE-2017-8565
CVE CVE-2017-8573
CVE CVE-2017-8577
CVE CVE-2017-8578
CVE CVE-2017-8580
CVE CVE-2017-8581
CVE CVE-2017-8582
CVE CVE-2017-8587
CVE CVE-2017-8588
CVE CVE-2017-8589
CVE CVE-2017-8590
CVE CVE-2017-8592
CVE CVE-2017-8594
CVE CVE-2017-8602
CVE CVE-2017-8606
CVE CVE-2017-8607
CVE CVE-2017-8608
CVE CVE-2017-8618
MSKB 4025333
MSKB 4025336
XREF MSFT:MS17-4025333
XREF MSFT:MS17-4025336
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4022717 or cumulative update 4022726. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists in Windows Hyper-V instruction emulation due to a failure to
properly enforce privilege levels. An attacker on a guest operating system can exploit this to gain elevated
privileges on the guest. Note that the host operating system is not vulnerable. (CVE-2017-0193)
- Multiple information disclosure vulnerabilities exist in Windows Uniscribe due to improper handling of objects
in memory. An unauthenticated, remote attacker can exploit these, by convincing a user to visit a specially
crafted website or open a specially crafted document, to disclose the contents of memory. (CVE-2017-0282,
CVE-2017-0284, CVE-2017-0285)
- Multiple remote code execution vulnerabilities exist in Windows Uniscribe due to improper handling of objects
in memory. An unauthenticated, remote attacker can exploit these, by convincing a user to visit a specially
crafted website or open a specially crafted document, to execute arbitrary code in the context of the current user.
(CVE-2017-0283, CVE-2017-8528)
- Multiple information disclosure vulnerabilities exist in the Windows GDI component due to improper handling
of objects in memory. An unauthenticated, remote attacker can exploit these, by convincing a user to visit a
specially crafted website or open a specially crafted document, to disclose the contents of memory.
(CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, CVE-2017-8533)
- Multiple remote code execution vulnerabilities exist in Microsoft Windows due to improper parsing of PDF files.
An unauthenticated, remote attacker can exploit these, by convincing a user to open a specially crafted PDF file,
to execute arbitrary code in the context of the current user. (CVE-2017-0291, CVE-2017-0292)
- A remote code execution vulnerability exists in Microsoft Windows due to improper handling of cabinet files. An
unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted cabinet file, to
execute arbitrary code in the context of the current user. (CVE-2017-0294)
- An elevation of privilege vulnerability exists in tdx.sys due to a failure to check the length of a buffer prior to
copying memory to it. A local attacker can exploit this, via a specially crafted application, to execute arbitrary
code in an elevated context.
(CVE-2017-0296)
- An elevation of privilege vulnerability exists in the Windows kernel due to improper handling of objects in
memory. A local attacker can exploit this, via a specially crafted application, to execute arbitrary code with
elevated permissions. (CVE-2017-0297)
- An elevation of privilege vulnerability exists in the DCOM object in Helppane.exe, when configured to run as the
interactive user, due to a failure to properly authenticate the client. An authenticated, remote attacker can exploit
this, via a specially crafted application, to run arbitrary code in another user's session after that user has logged
on to the same system using Terminal Services or Fast User Switching.
(CVE-2017-0298)
- Multiple information disclosure vulnerabilities exist in the Windows kernel due to improper initialization of
objects in memory. An authenticated, remote attacker can exploit these, via a specially crafted application, to
disclose the base address of the kernel driver.
(CVE-2017-0299, CVE-2017-0300, CVE-2017-8462, CVE-2017-8485)
- An information disclosure vulnerability exists in Microsoft Windows due to improper parsing of PDF files.
An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted PDF file, to
disclose the contents of memory. (CVE-2017-8460)
- A remote code execution vulnerability exists in Windows due to improper handling of shortcuts. An
unauthenticated, remote attacker can exploit this, by convincing a user to insert a removable drive containing
a malicious shortcut and binary, to automatically execute arbitrary code in the context of the current user.
(CVE-2017-8464)
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these, via a specially crafted application, to run processes in
an elevated context. (CVE-2017-8465, CVE-2017-8466, CVE-2017-8468)
- Multiple information disclosure vulnerabilities exist in the Windows kernel due to improper initialization of
objects in memory. An authenticated, remote attacker can exploit these, via a specially crafted application,
to disclose sensitive information. (CVE-2017-8469, CVE-2017-8470, CVE-2017-8471, CVE-2017-8473,
CVE-2017-8474, CVE-2017-8475, CVE-2017-8476, CVE-2017-8477, CVE-2017-8478, CVE-2017-8479,
CVE-2017-8480, CVE-2017-8481, CVE-2017-8482, CVE-2017-8483, CVE-2017-8484, CVE-2017-8488,
CVE-2017-8489, CVE-2017-8490, CVE-2017-8491, CVE-2017-8492)
- A security bypass vulnerability exists due to a failure to enforce case sensitivity for certain variable checks.
A local attacker can exploit this, via a specially crafted application, to bypass Unified Extensible Firmware
Interface (UEFI) variable security.
(CVE-2017-8493)
- A remote code execution vulnerability exists in the Windows font library due to improper handling of embedded
fonts. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted
website or open a specially crafted Microsoft document, to execute arbitrary code in the context of the current
user. (CVE-2017-8527)
- A remote code execution vulnerability exists in the Windows Search functionality due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this, via a specially crafted SMB message,
to execute arbitrary code. (CVE-2017-8543)
- An information disclosure vulnerability exists in the Windows Search functionality due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this, via a specially crafted SMB message,
to disclose sensitive information. (CVE-2017-8544)
- Multiple information disclosure vulnerabilities exist in the Windows kernel due to improper handling of objects in
memory. An authenticated, remote attacker can exploit these, via a specially crafted application, to disclose the
contents of memory. (CVE-2017-8553, CVE-2017-8554)
See Also
http://www.nessus.org/u?5f83ad76
Solution
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
References
BID 98818
BID 98819
BID 98820
BID 98821
BID 98824
BID 98826
BID 98835
BID 98836
BID 98837
BID 98839
BID 98840
BID 98842
BID 98843
BID 98844
BID 98845
BID 98846
BID 98847
BID 98848
BID 98849
BID 98850
BID 98852
BID 98853
BID 98854
BID 98856
BID 98857
BID 98858
BID 98859
BID 98860
BID 98862
BID 98864
BID 98865
BID 98867
BID 98869
BID 98870
BID 98878
BID 98884
BID 98885
BID 98887
BID 98900
BID 98901
BID 98902
BID 98903
BID 98914
BID 98918
BID 98920
BID 98922
BID 98923
BID 98929
BID 98933
BID 98940
BID 98942
BID 98949
CVE CVE-2017-0193
CVE CVE-2017-0282
CVE CVE-2017-0283
CVE CVE-2017-0284
CVE CVE-2017-0285
CVE CVE-2017-0287
CVE CVE-2017-0288
CVE CVE-2017-0289
CVE CVE-2017-0291
CVE CVE-2017-0292
CVE CVE-2017-0294
CVE CVE-2017-0296
CVE CVE-2017-0297
CVE CVE-2017-0298
CVE CVE-2017-0299
CVE CVE-2017-0300
CVE CVE-2017-8460
CVE CVE-2017-8462
CVE CVE-2017-8464
CVE CVE-2017-8465
CVE CVE-2017-8466
CVE CVE-2017-8468
CVE CVE-2017-8469
CVE CVE-2017-8470
CVE CVE-2017-8471
CVE CVE-2017-8473
CVE CVE-2017-8474
CVE CVE-2017-8475
CVE CVE-2017-8476
CVE CVE-2017-8477
CVE CVE-2017-8478
CVE CVE-2017-8479
CVE CVE-2017-8480
CVE CVE-2017-8481
CVE CVE-2017-8482
CVE CVE-2017-8483
CVE CVE-2017-8484
CVE CVE-2017-8485
CVE CVE-2017-8488
CVE CVE-2017-8489
CVE CVE-2017-8490
CVE CVE-2017-8491
CVE CVE-2017-8492
CVE CVE-2017-8493
CVE CVE-2017-8527
CVE CVE-2017-8528
CVE CVE-2017-8531
CVE CVE-2017-8532
CVE CVE-2017-8533
CVE CVE-2017-8543
CVE CVE-2017-8544
CVE CVE-2017-8553
CVE CVE-2017-8554
MSKB 4022717
MSKB 4022726
XREF MSFT:MS17-4022717
XREF MSFT:MS17-4022726
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4019213 or cumulative update 4019215. It is, therefore,
affected by multiple vulnerabilities :
- A security bypass vulnerability exists in Internet Explorer due to an unspecified flaw. An unauthenticated,
remote attacker can exploit this, by convincing a user to visit a specially crafted website, to bypass mixed
content warnings and load insecure content (HTTP) from secure locations (HTTPS). (CVE-2017-0064)
- An elevation of privilege vulnerability exists in Windows in the Microsoft DirectX graphics kernel subsystem
(dxgkrnl.sys) due to improper handling of objects in memory. A local attacker can exploit this, via a specially
crafted application, to execute arbitrary code in an elevated context. (CVE-2017-0077)
- A denial of service vulnerability exists in the Windows DNS server when it's configured to answer version
queries. An unauthenticated, remote attacker can exploit this, via a malicious DNS query, to cause the DNS
server to become nonresponsive. (CVE-2017-0171)
- An information disclosure vulnerability exists in the Windows Graphics Device Interface (GDI) due to improper
handling of objects in memory. A local attacker can exploit this, via a specially crafted application, to disclose
sensitive information. (CVE-2017-0190)
- An elevation of privilege vulnerability exists in the Windows COM Aggregate Marshaler due to an unspecified
flaw. A local attacker can exploit this, via a specially crafted application, to execute arbitrary code with elevated
privileges. (CVE-2017-0213)
- An elevation of privilege vulnerability exists in Windows due to improper validation of user-supplied input
when loading type libraries. A local attacker can exploit this, via a specially crafted application, to gain elevated
privileges. (CVE-2017-0214)
- A remote code execution vulnerability exists in Microsoft Internet Explorer due to improper handling of objects
in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted
website, to execute arbitrary code in the context of the current user. (CVE-2017-0222)
- A remote code execution vulnerability exists in Microsoft Internet Explorer due to improper handling of objects
in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted
website, to execute arbitrary code in the context of the current user. (CVE-2017-0226)
- A remote code execution vulnerability exists in Microsoft browsers in the JavaScript engines due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website or open a specially crafted Microsoft Office document, to execute arbitrary code in the
context of the current user. (CVE-2017-0228)
- A spoofing vulnerability exists in Microsoft browsers due to improper rendering of the SmartScreen filter. An
unauthenticated, remote attacker can exploit this, via a specially crafted URL, to redirect users to a malicious
website that appears to be a legitimate website.
(CVE-2017-0231)
- A remote code execution vulnerability exists in Microsoft browsers in the JavaScript scripting engines due to
improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a
user to visit a specially crafted website or open a specially crafted Office document, to execute arbitrary code in
the context of the current user. (CVE-2017-0238)
- An elevation of privilege vulnerability exists in the win32k component due to improper handling of objects
in memory. A local attacker can exploit this, via a specially crafted application, to execute arbitrary code with
elevated permissions. Note that an attacker can also cause a denial of service condition on Windows 7 x64 or
later systems. (CVE-2017-0246)
- A security bypass vulnerability exists in the Microsoft .NET Framework and .NET Core components due to
a failure to completely validate certificates. An attacker can exploit this to present a certificate that is marked
invalid for a specific use, but the component uses it for that purpose, resulting in a bypass of the Enhanced Key
Usage taggings. (CVE-2017-0248)
- An information disclosure vulnerability exists in the Windows kernel due to improper initialization of objects in
memory. A local attacker can exploit this, via a specially crafted application, to disclose sensitive information.
(CVE-2017-0258)
- An information disclosure vulnerability exists in the Windows kernel due to improper initialization of objects in
memory. A local attacker can exploit this, via a specially crafted application, to disclose sensitive information.
(CVE-2017-0259)
- An elevation of privilege vulnerability exists in the Windows kernel-mode driver due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to run arbitrary code in
kernel mode. (CVE-2017-0263)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0267)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0268)
- A denial of service vulnerability exists in Microsoft Server Message Block (SMB) when handling a specially
crafted request to the server. An unauthenticated, remote attacker can exploit this, via a crafted SMB request, to
cause the system to stop responding.
(CVE-2017-0269)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0270)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0271)
- A remote code execution vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
execute arbitrary code on a target server.
(CVE-2017-0272)
- A denial of service vulnerability exists in Microsoft Server Message Block (SMB) when handling a specially
crafted request to the server. An unauthenticated, remote attacker can exploit this, via a crafted SMB request, to
cause the system to stop responding.
(CVE-2017-0273)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0274)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0275)
- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
disclose sensitive information.
(CVE-2017-0276)
- A remote code execution vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
execute arbitrary code on a target server.
(CVE-2017-0277)
- A remote code execution vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
execute arbitrary code on a target server.
(CVE-2017-0278)
- A remote code execution vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when
handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to
execute arbitrary code on a target server.
(CVE-2017-0279)
- A denial of service vulnerability exists in Microsoft Server Message Block (SMB) when handling a specially
crafted request to the server. An unauthenticated, remote attacker can exploit this, via a crafted SMB request, to
cause the system to stop responding.
(CVE-2017-0280)
See Also
http://www.nessus.org/u?09cc032f
Solution
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 98097
BID 98102
BID 98103
BID 98108
BID 98112
BID 98113
BID 98114
BID 98117
BID 98121
BID 98127
BID 98139
BID 98164
BID 98173
BID 98237
BID 98258
BID 98259
BID 98260
BID 98261
BID 98263
BID 98264
BID 98265
BID 98266
BID 98267
BID 98268
BID 98270
BID 98271
BID 98272
BID 98273
BID 98274
BID 98298
CVE CVE-2017-0064
CVE CVE-2017-0077
CVE CVE-2017-0171
CVE CVE-2017-0190
CVE CVE-2017-0213
CVE CVE-2017-0214
CVE CVE-2017-0222
CVE CVE-2017-0226
CVE CVE-2017-0228
CVE CVE-2017-0231
CVE CVE-2017-0238
CVE CVE-2017-0246
CVE CVE-2017-0248
CVE CVE-2017-0258
CVE CVE-2017-0259
CVE CVE-2017-0263
CVE CVE-2017-0267
CVE CVE-2017-0268
CVE CVE-2017-0269
CVE CVE-2017-0270
CVE CVE-2017-0271
CVE CVE-2017-0272
CVE CVE-2017-0273
CVE CVE-2017-0274
CVE CVE-2017-0275
CVE CVE-2017-0276
CVE CVE-2017-0277
CVE CVE-2017-0278
CVE CVE-2017-0279
CVE CVE-2017-0280
MSKB 4019215
MSKB 4019213
XREF MSFT:MS17-4019215
XREF IAVA:2017-A-0148
XREF MSFT:MS17-4019213
Exploitable With
Core Impact (true)
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4038793 or cumulative update 4038792. It is, therefore,
affected by multiple vulnerabilities :
- A race condition that could lead to a remote code execution vulnerability exists in NetBT Session Services
when NetBT fails to maintain certain sequencing requirements. (CVE-2017-0161)
- A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. An attacker who
successfully exploited this vulnerability could perform a man-in-the-middle attack and force a user's computer
to unknowingly route traffic through the attacker's computer. The attacker can then monitor and read the traffic
before sending it on to the intended recipient.
(CVE-2017-8628)
- An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly
handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in
kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with
full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could
then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in
memory.
(CVE-2017-8675)
- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the
information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if
the attacker uses it in combination with another vulnerability. (CVE-2017-8676)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted
embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected
system. An attacker could then install programs; view, change, or delete data; or create new accounts with full
user rights. (CVE-2017-8682)
- An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly
handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. (CVE-2017-8683)
- A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel
memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further
compromise the users system. (CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, CVE-2017-8684)
- A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends
specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability
could either run arbitrary code on the DHCP failover server or cause the DHCP service to become
nonresponsive. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP
server. However, the DHCP server must be set to failover mode for the attack to succeed. The security update
addresses the vulnerability by correcting how DHCP failover servers handle network packets. (CVE-2017-8686)
- An Information disclosure vulnerability exists in Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who
successfully exploited this vulnerability could retrieve the memory address of a kernel object. (CVE-2017-8687)
- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface+ (GDI+)
handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the
information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if
the attacker uses it in combination with another vulnerability. (CVE-2017-8688)
- A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An
attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could
then install programs; view, change, or delete data; or create new accounts with full user rights.
(CVE-2017-8692)
- An information disclosure vulnerability exists when Windows Uniscribe improperly discloses the contents of its
memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise
the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a
user to open a specially crafted document or by convincing a user to visit an untrusted webpage.
The update addresses the vulnerability by correcting how Windows Uniscribe handles objects in memory.
(CVE-2017-8695)
- A remote code execution vulnerability exists when Windows Shell does not properly validate file copy
destinations. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of
the current user.
(CVE-2017-8699)
- An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory
address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout
Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the base
address of the kernel driver from a compromised process. (CVE-2017-8708)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails
to properly validate input from an authenticated user on a guest operating system. (CVE-2017-8707,
CVE-2017-8713)
- A remote code execution vulnerability exists in the VM Host Agent Service of Remote Desktop Virtual Host
role when it fails to properly validate input from an authenticated user on a guest operating system. To exploit
the vulnerability, an attacker could issue a specially crafted certificate on the guest operating system that could
cause the VM host agent service on the host operating system to execute arbitrary code. The Remote Desktop
Virtual Host role is not enabled by default. An attacker who successfully exploited the vulnerability could execute
arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how
VM host agent service validates guest operating system user input.
(CVE-2017-8714)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2017-8678, CVE-2017-8679, CVE-2017-8709, CVE-2017-8719)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2017-8720)
- A spoofing vulnerability exists when Internet Explorer improperly handles specific HTML content. An attacker
who successfully exploited this vulnerability could trick a user into believing that the user was visiting a legitimate
website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other
vulnerabilities in web services. To exploit the vulnerability, the user must either browse to a malicious website
or be redirected to it. In an email attack scenario, an attacker could send an email message in an attempt to
convince the user to click a link to the malicious website. (CVE-2017-8733)
- An information disclosure vulnerability exists in Microsoft browsers due to improper parent domain verification
in certain functionality. An attacker who successfully exploited the vulnerability could obtain specific information
that is used in the parent domain.
(CVE-2017-8736)
- A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects
in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in
the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user
rights as the current user. (CVE-2017-8728, CVE-2017-8737)
- A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render
content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker
could execute arbitrary code in the context of the current user. (CVE-2017-8741, CVE-2017-8748)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. (CVE-2017-8747, CVE-2017-8749)
- A remote code execution vulnerability exists when Microsoft browsers improperly access objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. (CVE-2017-8750)
- A remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input. An
attacker who successfully exploited this vulnerability in software using the .NET framework could take control
of an affected system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights. (CVE-2017-8759)
See Also
http://www.nessus.org/u?085e4d22
http://www.nessus.org/u?cf3ecec7
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.7 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2017-0161
CVE CVE-2017-8628
CVE CVE-2017-8675
CVE CVE-2017-8676
CVE CVE-2017-8677
CVE CVE-2017-8678
CVE CVE-2017-8679
CVE CVE-2017-8680
CVE CVE-2017-8681
CVE CVE-2017-8682
CVE CVE-2017-8683
CVE CVE-2017-8684
CVE CVE-2017-8686
CVE CVE-2017-8687
CVE CVE-2017-8688
CVE CVE-2017-8692
CVE CVE-2017-8695
CVE CVE-2017-8699
CVE CVE-2017-8707
CVE CVE-2017-8708
CVE CVE-2017-8709
CVE CVE-2017-8713
CVE CVE-2017-8714
CVE CVE-2017-8719
CVE CVE-2017-8720
CVE CVE-2017-8728
CVE CVE-2017-8733
CVE CVE-2017-8736
CVE CVE-2017-8737
CVE CVE-2017-8741
CVE CVE-2017-8747
CVE CVE-2017-8748
CVE CVE-2017-8749
CVE CVE-2017-8750
CVE CVE-2017-8759
MSKB 4038792
MSKB 4038793
XREF MSFT:MS17-4038792
XREF MSFT:MS17-4038793
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
According to its version, the installation of Wireshark / Ethereal on the remote host is no longer supported.
Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it
is likely to contain security vulnerabilities.
See Also
https://wiki.wireshark.org/Development/LifeCycle
Solution
Risk Factor
Critical
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
The remote Windows host is missing security update 4056898 or cumulative update 4056895. It is, therefore,
affected by multiple vulnerabilities :
- An vulnerability exists within microprocessors utilizing speculative execution and indirect branch prediction,
which may allow an attacker with local user access to disclose information via a side-channel analysis.
(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)
- An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when
it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could
execute arbitrary code and take control of an affected system. An attacker could then install programs; view,
change, or delete data; or create new accounts with full user rights. (CVE-2018-0788)
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2018-0744)
- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who
successfully exploited the vulnerability could retrieve the memory address of a kernel object. (CVE-2018-0746,
CVE-2018-0747)
- An information disclosure vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll)
when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability
could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an
attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that
could be used to try to further compromise the affected system. (CVE-2018-0754)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-0762, CVE-2018-0772)
- An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions.
An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process
communication, or interrupt system functionality.
(CVE-2018-0748, CVE-2018-0751, CVE-2018-0752)
- An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server when an
attacker with valid credentials attempts to open a specially crafted file over the SMB protocol on the same
machine. An attacker who successfully exploited this vulnerability could bypass certain security checks in the
operating system. (CVE-2018-0749)
192.168.100.4 110
- A denial of service vulnerability exists in the way that Windows handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. Note that the denial of
service condition would not allow an attacker to execute code or to elevate user privileges. However, the denial
of service condition could prevent authorized users from using system resources. The security update addresses
the vulnerability by correcting how Windows handles objects in memory. (CVE-2018-0753)
See Also
http://www.nessus.org/u?86127709
http://www.nessus.org/u?2641284e
https://support.microsoft.com/en-us/help/4072699/windows-security-updates-and-antivirus-software
Solution
Apply Security Only update KB4056898 or Cumulative Update KB4056895 as well as refer to the KB4072698
article for additional information.
Note: Due to a compatibility issue with some antivirus software products, it may not be possible to apply the
required updates.
See Microsoft KB article 4072699 for more information.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 102378
CVE CVE-2017-5715
192.168.100.4 11
CVE CVE-2017-5753
CVE CVE-2017-5754
CVE CVE-2018-0744
CVE CVE-2018-0746
CVE CVE-2018-0747
CVE CVE-2018-0748
CVE CVE-2018-0749
CVE CVE-2018-0751
CVE CVE-2018-0752
CVE CVE-2018-0753
CVE CVE-2018-0754
CVE CVE-2018-0762
CVE CVE-2018-0772
CVE CVE-2018-0788
MSKB 4056898
MSKB 4056895
XREF IAVA:2018-A-0019
XREF IAVA:2018-A-0020
XREF MSFT:MS18-4056898
XREF MSFT:MS18-4056895
Exploitable With
CANVAS (true)
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4074597 or cumulative update 4074594. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0866)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-0757, CVE-2018-0829, CVE-2018-0830)
- An information disclosure vulnerability exists when VBScript improperly discloses the contents of its memory,
which could provide an attacker with information to further compromise the users computer or data.
(CVE-2018-0847)
- A remote code execution vulnerability exists in StructuredQuery when the software fails to properly handle
objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the
context of the current user. If the current user is logged on with administrative user rights, an attacker could take
control of the affected system. An attacker could then install programs; view, change, or delete data; or create
new accounts with full user rights.
(CVE-2018-0825)
- An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory.
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
(CVE-2018-0742, CVE-2018-0820)
- A denial of service vulnerability exists in implementations of the Microsoft Server Message Block 2.0 and 3.0
(SMBv2/SMBv3) client. The vulnerability is due to improper handling of certain requests sent by a malicious
SMB server to the client. An attacker who successfully exploited this vulnerability could cause the affected
system to stop responding until it is manually restarted. (CVE-2018-0833)
- A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker
who successfully exploited these vulnerabilities could take control of an affected system. (CVE-2018-0842)
- An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver
improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run
processes in an elevated context. (CVE-2018-0844, CVE-2018-0846)
- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who
successfully exploited the vulnerability could retrieve the memory address of a kernel object. (CVE-2018-0832)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-0840)
See Also
http://www.nessus.org/u?81ed62f4
http://www.nessus.org/u?c03fa8a5
Solution
Risk Factor
High
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-0742
CVE CVE-2018-0757
CVE CVE-2018-0820
CVE CVE-2018-0825
CVE CVE-2018-0829
CVE CVE-2018-0830
CVE CVE-2018-0832
CVE CVE-2018-0833
CVE CVE-2018-0840
CVE CVE-2018-0842
CVE CVE-2018-0844
CVE CVE-2018-0846
CVE CVE-2018-0847
CVE CVE-2018-0866
MSKB 4074594
MSKB 4074597
XREF MSFT:MS18-4074594
XREF MSFT:MS18-4074597
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4088879 or cumulative update 4088876. It is, therefore,
affected by multiple vulnerabilities :
- An vulnerability exists within microprocessors utilizing speculative execution and indirect branch prediction,
which may allow an attacker with local user access to disclose information via a side-channel analysis.
(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)
- An information disclosure vulnerability exists when Windows Remote Assistance incorrectly processes XML
External Entities (XXE). An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. (CVE-2018-0878)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2018-0929)
- A remote code execution vulnerability exists when Windows Shell does not properly validate file copy
destinations. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of
the current user. If the current user is logged on with administrative user rights, an attacker could take control
of the affected system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system
could be less impacted than users who operate with administrative user rights. (CVE-2018-0883)
- An elevation of privilege vulnerability exists in Windows when the Microsoft Video Control mishandles objects
in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in system mode. An
attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-0881)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in
memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2018-0927, CVE-2018-0932)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0889, CVE-2018-0935)
- An elevation of privilege vulnerability exists when Internet Explorer fails a check, allowing sandbox escape.
An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on
an affected system. This vulnerability by itself does not allow arbitrary code execution; however, it could allow
arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code
execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated
privileges when code execution is attempted. The update addresses the vulnerability by correcting how Internet
Explorer handles zone and integrity settings. (CVE-2018-0942)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
(CVE-2018-0811, CVE-2018-0813, CVE-2018-0814)
- A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly
validate input from a privileged user on a guest operating system. An attacker who successfully exploited the
vulnerability could cause the host server to crash. (CVE-2018-0885)
- A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP).
An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute
code on the target system. CredSSP is an authentication provider which processes authentication requests for
other applications; any application which depends on CredSSP for authentication may be vulnerable to this type
of attack. As an example of how an attacker would exploit this vulnerability against Remote Desktop Protocol,
the attacker would need to run a specially crafted application and perform a man-in-the-middle attack against
a Remote Desktop Protocol session. An attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights. The security update addresses the vulnerability by correcting how
Credential Security Support Provider protocol (CredSSP) validates requests during the authentication process.
To be fully protected against this vulnerability users must enable Group Policy settings on their systems and
update their Remote Desktop clients. The Group Policy settings are disabled by default to prevent connectivity
problems and users must follow the instructions documented HERE to be fully protected. (CVE-2018-0886)
- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who
successfully exploited the vulnerability could retrieve the memory address of a kernel object. (CVE-2018-0894,
CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900,
CVE-2018-0901, CVE-2018-0904)
- An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to
properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run
arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting
the input sanitization error to preclude unintended elevation. (CVE-2018-0868)
- An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in
kernel mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-0816, CVE-2018-0817)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to
properly validate input from an authenticated user on a guest operating system. (CVE-2018-0888)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2018-0891)
See Also
http://www.nessus.org/u?2ace7125
http://www.nessus.org/u?99648598
http://www.nessus.org/u?573cb1ef
Solution
Apply Security Only update KB4088879 or Cumulative Update KB4088876 as well as refer to the KB article for
additional information.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 103230
BID 103231
BID 103232
BID 103236
BID 103238
BID 103240
BID 103241
BID 103242
BID 103243
BID 103244
BID 103245
BID 103246
BID 103248
BID 103249
BID 103250
BID 103251
BID 103256
BID 103259
BID 103261
BID 103262
BID 103265
BID 103295
BID 103298
BID 103299
BID 103307
BID 103309
BID 103310
BID 103312
CVE CVE-2018-0811
CVE CVE-2018-0813
CVE CVE-2018-0814
CVE CVE-2018-0816
CVE CVE-2018-0817
CVE CVE-2018-0868
CVE CVE-2018-0878
CVE CVE-2018-0881
CVE CVE-2018-0883
CVE CVE-2018-0885
CVE CVE-2018-0886
CVE CVE-2018-0888
CVE CVE-2018-0889
CVE CVE-2018-0891
CVE CVE-2018-0894
CVE CVE-2018-0895
CVE CVE-2018-0896
CVE CVE-2018-0897
CVE CVE-2018-0898
CVE CVE-2018-0899
CVE CVE-2018-0900
CVE CVE-2018-0901
CVE CVE-2018-0904
CVE CVE-2018-0927
CVE CVE-2018-0929
CVE CVE-2018-0932
CVE CVE-2018-0935
CVE CVE-2018-0942
CVE CVE-2017-5715
CVE CVE-2017-5753
CVE CVE-2017-5754
MSKB 4088876
MSKB 4088879
XREF IAVA:2018-A-0019
XREF IAVA:2018-A-0020
XREF MSFT:MS18-4088876
XREF MSFT:MS18-4088879
Exploitable With
CANVAS (true)
Plugin Information
Plugin Output
tcp/445
The following registry keys need to be set to the appropriate values as dictated in ADV180002.
This is required to enable the fix for CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754:
192.168.100.4 120
108965 - KB4093115: Windows 8.1 and Windows Server 2012 R2 April 2018 Security Update
Synopsis
Description
The remote Windows host is missing security update 4093115 or cumulative update 4093114. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and
incorrectly maps kernel memory. (CVE-2018-1009)
- An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when
it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could
execute arbitrary code and take control of an affected system. An attacker could then install programs; view,
change, or delete data; or create new accounts with full user rights. (CVE-2018-1008)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to
properly validate input from an authenticated user on a guest operating system. (CVE-2018-0957)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Internet Explorer. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system.
(CVE-2018-0987)
- A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code
execution on an affected system. An attacker who successfully exploited this vulnerability could take control
of an affected system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system
could be less impacted than users who operate with administrative user rights. (CVE-2018-1003)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-0870, CVE-2018-0991, CVE-2018-0997, CVE-2018-1018, CVE-2018-1020)
- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who
successfully exploited the vulnerability could retrieve the memory address of a kernel object. (CVE-2018-0968,
CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974,
CVE-2018-0975)
- A denial of service vulnerability exists in the way that Windows handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. Note that the denial of
service condition would not allow an attacker to execute code or to elevate user privileges. However, the denial
of service condition could prevent authorized users from using system resources. The security update addresses
the vulnerability by correcting how Windows handles objects in memory. (CVE-2018-8116)
- A denial of service vulnerability exists in the way that Windows SNMP Service handles malformed SNMP traps.
An attacker who successfully exploited the vulnerability could cause a target system to stop responding. Note
that the denial of service condition would not allow an attacker to execute code or to elevate user privileges.
192.168.100.4 12
However, the denial of service condition could prevent authorized users from using system resources. The
security update addresses the vulnerability by correcting how Windows SNMP Service processes SNMP traps.
(CVE-2018-0967)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-1004)
- An information disclosure vulnerability exists in the way that the scripting engine handles objects in memory
in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could provide an
attacker with information to further compromise the user's computer or data. (CVE-2018-0981, CVE-2018-0989,
CVE-2018-1000)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-0960)
- A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the
target system using RDP and sends specially crafted requests. An attacker who successfully exploited this
vulnerability could cause the RDP service on the target system to stop responding. (CVE-2018-0976)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted
embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected
system. An attacker could then install programs; view, change, or delete data; or create new accounts with full
user rights. (CVE-2018-1010, CVE-2018-1012, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016)
- An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory
address. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2018-0887)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0988, CVE-2018-0996, CVE-2018-1001)
See Also
http://www.nessus.org/u?98d37603
http://www.nessus.org/u?b665658e
Solution
Risk Factor
High
8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.0 (CVSS:3.0/E:H/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-0870
CVE CVE-2018-0887
CVE CVE-2018-0957
CVE CVE-2018-0960
CVE CVE-2018-0967
CVE CVE-2018-0968
CVE CVE-2018-0969
CVE CVE-2018-0970
CVE CVE-2018-0971
CVE CVE-2018-0972
CVE CVE-2018-0973
CVE CVE-2018-0974
CVE CVE-2018-0975
CVE CVE-2018-0976
CVE CVE-2018-0981
CVE CVE-2018-0987
CVE CVE-2018-0988
CVE CVE-2018-0989
CVE CVE-2018-0991
CVE CVE-2018-0996
CVE CVE-2018-0997
CVE CVE-2018-1000
CVE CVE-2018-1001
CVE CVE-2018-1003
CVE CVE-2018-1004
CVE CVE-2018-1008
CVE CVE-2018-1009
CVE CVE-2018-1010
CVE CVE-2018-1012
CVE CVE-2018-1013
CVE CVE-2018-1015
CVE CVE-2018-1016
CVE CVE-2018-1018
CVE CVE-2018-1020
CVE CVE-2018-8116
MSKB 4093115
MSKB 4093114
XREF MSFT:MS18-4093115
XREF MSFT:MS18-4093114
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4103715 or cumulative update 4103725. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2018-8897)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8178)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-0954, CVE-2018-1022)
- A security feature bypass vulnerability exists in .Net Framework which could allow an attacker to bypass Device
Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity
(UMCI) policy on the machine. (CVE-2018-1039)
- An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory,
which could provide an attacker with information to further compromise the users computer or data.
(CVE-2018-8145)
- A remote code execution vulnerability exists in the way that Windows handles objects in memory. An attacker
who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target
system. (CVE-2018-8136)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-8127)
- An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver
improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run
processes in an elevated context. (CVE-2018-8167)
- A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate
input from an authenticated user on a guest operating system. (CVE-2018-0959)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in
memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2018-1025)
- A remote code execution vulnerability exists in Microsoft COM for Windows when it fails to properly handle
serialized objects. An attacker who successfully exploited the vulnerability could use a specially crafted file or
script to perform actions. In an email attack scenario, an attacker could exploit the vulnerability by sending the
specially crafted file to the user and convincing the user to open the file.
(CVE-2018-0824)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8174)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8124, CVE-2018-8164,
CVE-2018-8166)
- An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions.
An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process
communication, or interrupt system functionality.
(CVE-2018-8134)
- A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents. An
attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to a .NET
(or .NET core) application. The update addresses the vulnerability by correcting how .NET and .NET Core
applications handle XML document processing.
(CVE-2018-0765)
See Also
http://www.nessus.org/u?781c2262
http://www.nessus.org/u?dba0079e
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-0765
CVE CVE-2018-0824
CVE CVE-2018-0954
CVE CVE-2018-0955
CVE CVE-2018-0959
CVE CVE-2018-1022
CVE CVE-2018-1025
CVE CVE-2018-1039
CVE CVE-2018-8114
CVE CVE-2018-8122
CVE CVE-2018-8124
CVE CVE-2018-8127
CVE CVE-2018-8134
CVE CVE-2018-8136
CVE CVE-2018-8145
CVE CVE-2018-8164
CVE CVE-2018-8166
CVE CVE-2018-8167
CVE CVE-2018-8174
CVE CVE-2018-8178
CVE CVE-2018-8897
MSKB 4103715
MSKB 4103725
XREF MSFT:MS18-4103715
XREF MSFT:MS18-4103725
Exploitable With
Plugin Information
Published: 2018/05/08, Modified: 2019/04/08
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4284878 or cumulative update 4284815. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists when the (Human Interface Device) HID Parser Library driver
improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run
processes in an elevated context. (CVE-2018-8169)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-0978, CVE-2018-8249)
- A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in
memory.
An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data;
or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability,
such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious
webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation
handles objects in memory. (CVE-2018-8251)
- A remote code execution vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails
to properly handle DNS responses. An attacker who successfully exploited the vulnerability could run arbitrary
code in the context of the Local System Account. (CVE-2018-8225)
- A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. (CVE-2018-8205)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8267)
- A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker
who successfully exploited these vulnerabilities could take control of an affected system. (CVE-2018-8210)
- A denial of service vulnerability exists in the way that the Windows Code Integrity Module performs hashing.
An attacker who successfully exploited the vulnerability could cause a system to stop responding. Note that the
denial of service condition would not allow an attacker to execute code or to elevate user privileges. However,
the denial of service condition could prevent authorized users from using system resources. An attacker could
host a specially crafted file in a website or SMB share.
The attacker could also take advantage of compromised websites, or websites that accept or host user-provided
content or advertisements, by adding specially crafted content that could exploit the vulnerability. However,
in all cases an attacker would have no way to force users to view the attacker-controlled content. Instead, an
attacker would have to convince users to take action, typically via an enticement in email or instant message, or
by getting them to open an email attachment. The security update addresses the vulnerability by modifying how
the Code Integrity Module performs hashing.
(CVE-2018-1040)
- An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who
successfully exploited this vulnerability could run processes in an elevated context. (CVE-2018-1036)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-8207)
See Also
http://www.nessus.org/u?224e0ffb
http://www.nessus.org/u?43458adc
Solution
Risk Factor
High
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
BID 104356
BID 104360
BID 104363
BID 104364
BID 104379
BID 104389
BID 104391
BID 104395
BID 104398
BID 104404
BID 104407
CVE CVE-2018-0978
CVE CVE-2018-1036
CVE CVE-2018-1040
192.168.100.4 130
CVE CVE-2018-8169
CVE CVE-2018-8205
CVE CVE-2018-8207
CVE CVE-2018-8210
CVE CVE-2018-8225
CVE CVE-2018-8249
CVE CVE-2018-8251
CVE CVE-2018-8267
MSKB 4284878
MSKB 4284815
XREF MSFT:MS18-4284878
XREF MSFT:MS18-4284815
Plugin Information
Plugin Output
tcp/445
192.168.100.4 13
110981 - KB4338824: Windows 8.1 and Windows Server 2012 R2 July 2018 Security Update
Synopsis
Description
The remote Windows host is missing security update 4338824 or cumulative update 4338815. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their
privilege level. (CVE-2018-8202)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8242, CVE-2018-8296)
- A denial of service vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to
properly handle DNS responses. An attacker who successfully exploited the vulnerability could cause a system
to stop responding. Note that the denial of service condition would not allow an attacker to execute code or
to elevate user privileges. However, the denial of service condition could prevent authorized users from using
system resources. (CVE-2018-8304)
- A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. (CVE-2018-8309)
- An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly
handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in
kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with
full user rights.
(CVE-2018-8282)
- A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP)
connections. An attacker who successfully exploited the vulnerability could cause a target system to stop
responding. (CVE-2018-8206)
- A security feature bypass vulnerability exists when Microsoft Internet Explorer improperly handles requests
involving UNC resources. An attacker who successfully exploited the vulnerability could force the browser to load
data that would otherwise be restricted.
(CVE-2018-0949)
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2018-8308)
- A security feature bypass vulnerability exists when Microsoft WordPad improperly handles embedded OLE
objects. An attacker who successfully exploited the vulnerability could bypass content blocking. In a file- sharing
attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability,
and then convince a user to open the document file. The security update addresses the vulnerability by
correcting how Microsoft WordPad handles input. (CVE-2018-8307)
- A Remote Code Execution vulnerability exists in .NET software when the software fails to check the source
markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context
of the current user. If the current user is logged on with administrative user rights, an attacker could take control
of the affected system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights.
(CVE-2018-8260)
- An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions.
An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process
communication, or interrupt system functionality.
(CVE-2018-8313)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-8287, CVE-2018-8288, CVE-2018-8291)
- A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input
properly. An attacker who successfully exploited this vulnerability could take control of an affected system.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
(CVE-2018-8284)
- An elevation of privilege vulnerability exists when Windows fails a check, allowing a sandbox escape. An
attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an
affected system. This vulnerability by itself does not allow arbitrary code execution. However, the vulnerability
could allow arbitrary code to run if an attacker uses it in combination with another vulnerability, such as a
remote code execution vulnerability or another elevation of privilege vulnerability, that can leverage the elevated
privileges when code execution is attempted. The security update addresses the vulnerability by correcting how
Windows file picker handles paths. (CVE-2018-8314)
- A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly
validate certificates. An attacker could present expired certificates when challenged. The security update
addresses the vulnerability by ensuring that .NET Framework components correctly validate certificates.
(CVE-2018-8356)
See Also
http://www.nessus.org/u?e0106ae8
http://www.nessus.org/u?be1b803d
Solution
Risk Factor
High
CVSS v3.0 Base Score
8.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 104617
BID 104620
BID 104622
BID 104629
BID 104631
BID 104634
BID 104636
BID 104637
BID 104638
BID 104648
BID 104652
BID 104664
BID 104665
BID 104666
BID 104667
BID 104668
BID 104669
BID 104670
CVE CVE-2018-0949
CVE CVE-2018-8202
CVE CVE-2018-8206
CVE CVE-2018-8242
CVE CVE-2018-8260
CVE CVE-2018-8282
CVE CVE-2018-8284
CVE CVE-2018-8287
CVE CVE-2018-8288
CVE CVE-2018-8291
CVE CVE-2018-8296
CVE CVE-2018-8304
CVE CVE-2018-8307
CVE CVE-2018-8308
CVE CVE-2018-8309
CVE CVE-2018-8313
CVE CVE-2018-8314
CVE CVE-2018-8356
MSKB 4338815
MSKB 4338824
XREF MSFT:MS18-4338815
XREF MSFT:MS18-4338824
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4343888 or cumulative update 4343898. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8403)
- An information disclosure vulnerability exists in Microsoft .NET Framework that could allow an attacker to
access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in
high-load/high-density network connections where content from one stream can blend into another stream.
(CVE-2018-8360)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-8341, CVE-2018-8348)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted
embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected
system. An attacker could then install programs; view, change, or delete data; or create new accounts with full
user rights. (CVE-2018-8344)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8404)
- A remote code execution vulnerability exists when Internet Explorer improperly validates hyperlinks before
loading executable libraries. An attacker who successfully exploited this vulnerability could take control of an
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights.
(CVE-2018-8316)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-8355, CVE-2018-8372, CVE-2018-8385)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8353, CVE-2018-8371, CVE-2018-8373, CVE-2018-8389)
- A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if
a .LNK file is processed. An attacker who successfully exploited this vulnerability could gain the same user rights
as the local user. (CVE-2018-8345)
- An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly
handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an
elevated context. (CVE-2018-8405)
- An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys
fails to check the length of a buffer prior to copying memory to it. (CVE-2018-8343)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2018-8394, CVE-2018-8398)
- A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to
properly handle serialized objects. An attacker who successfully exploited the vulnerability could use a specially
crafted file or script to perform actions. In an email attack scenario, an attacker could exploit the vulnerability by
sending the specially crafted file to the user and convincing the user to open the file.
(CVE-2018-8349)
- An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to
properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run
arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting
the input sanitization error to preclude unintended elevation. (CVE-2018-8339)
- A security feature bypass vulnerability exists when Active Directory Federation Services (AD FS) improperly
handles multi-factor authentication requests.
(CVE-2018-8340)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly allow cross-frame
interaction. An attacker who successfully exploited this vulnerability could allow an attacker to obtain browser
frame or window state from a different domain. For an attack to be successful, an attacker must persuade a user
to open a malicious website from a secure website.
This update addresses the vulnerability by denying permission to read the state of the object model, to which
frames or windows on different domains should not have access. (CVE-2018-8351)
See Also
http://www.nessus.org/u?82e63681
http://www.nessus.org/u?1fda3003
Solution
Apply Security Only update KB4343888 or Cumulative Update KB4343898 as well as refer to the KB article for
additional information.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 104978
BID 104982
BID 104983
BID 104984
BID 104986
BID 104987
BID 104992
BID 104995
BID 104999
BID 105001
BID 105011
BID 105027
BID 105029
BID 105030
CVE CVE-2018-3615
CVE CVE-2018-3620
CVE CVE-2018-3646
CVE CVE-2018-8316
CVE CVE-2018-8339
CVE CVE-2018-8340
CVE CVE-2018-8341
CVE CVE-2018-8343
CVE CVE-2018-8344
CVE CVE-2018-8345
CVE CVE-2018-8348
CVE CVE-2018-8349
CVE CVE-2018-8351
CVE CVE-2018-8353
CVE CVE-2018-8355
CVE CVE-2018-8360
CVE CVE-2018-8371
CVE CVE-2018-8372
CVE CVE-2018-8373
CVE CVE-2018-8385
CVE CVE-2018-8389
CVE CVE-2018-8394
CVE CVE-2018-8398
CVE CVE-2018-8403
CVE CVE-2018-8404
CVE CVE-2018-8405
MSKB 4343898
MSKB 4343888
XREF MSFT:MS18-4343898
XREF MSFT:MS18-4343888
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4457143 or cumulative update 4457129. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-8457)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2018-8424)
- An elevation of privilege vulnerability exists in Windows that allows a sandbox escape. An attacker who
successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected
system. This vulnerability by itself does not allow arbitrary code execution. However, the vulnerability could
allow arbitrary code to run if an attacker uses it in combination with another vulnerability, such as a remote code
execution vulnerability or another elevation of privilege vulnerability, that can leverage the elevated privileges
when code execution is attempted.
The security update addresses the vulnerability by correcting how Windows parses files. (CVE-2018-8468)
- A remote code execution vulnerability exists when Windows does not properly handle specially crafted image
files. An attacker who successfully exploited the vulnerability could execute arbitrary code.
(CVE-2018-8475)
- An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local
Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the
security context of the local system. An attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights.
(CVE-2018-8440)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the
users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application.
The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
(CVE-2018-8442, CVE-2018-8443)
- A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate
input from an authenticated user on a guest operating system. (CVE-2018-8439)
192.168.100.4 140
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2018-8452)
- A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code
execution on an affected system. An attacker who successfully exploited this vulnerability could take control
of an affected system. An attacker could then install programs; view, change, or delete data; or create
new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the
system could be less impacted than users who operate with administrative user rights. (CVE-2018-8392,
CVE-2018-8393)
- A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes
user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take
control of the users system. (CVE-2018-8420)
- A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly
validate input from a privileged user on a guest operating system. An attacker who successfully exploited the
vulnerability could cause the host server to crash. (CVE-2018-8438)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to
properly validate input from an authenticated user on a guest operating system. (CVE-2018-8434)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted
embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected
system. An attacker could then install programs; view, change, or delete data; or create new accounts with full
user rights. (CVE-2018-8332)
- An information disclosure vulnerability exists when the browser scripting engine improperly handle object types.
An attacker who has successfully exploited this vulnerability might be able to read privileged data across trust
boundaries. In browsing scenarios, an attacker could convince a user to visit a malicious site and leverage
the vulnerability to obtain privileged information from the browser process, such as sensitive data from other
opened tabs. An attacker could also inject malicious code into advertising networks used by trusted sites or
embed malicious code on a compromised, but trusted, site. The security update addresses the vulnerability by
correcting how the browser scripting engine handles object types. (CVE-2018-8315)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-8446)
- A denial of service vulnerability exists in the Microsoft Server Block Message (SMB) when an attacker sends
specially crafted requests to the server. An attacker who exploited this vulnerability could cause the affected
system to crash. To attempt to exploit this issue, an attacker would need to send specially crafted SMB requests
to the target system. Note that the denial of service vulnerability would not allow an attacker to execute code
or to elevate their user rights, but it could cause the affected system to stop accepting requests. The security
update addresses the vulnerability by correcting the manner in which SMB handles specially crafted client
requests.
(CVE-2018-8335)
- An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2)
server handles certain requests. An attacker who successfully exploited this vulnerability could craft a special
packet, which could lead to information disclosure from the server. (CVE-2018-8444)
- An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory.
An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
(CVE-2018-8455)
192.168.100.4 14
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8447)
- An information disclosure vulnerability exists in Windows when the Windows bowser.sys kernel-mode driver
fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could
potentially disclose contents of System memory.
(CVE-2018-8271)
- An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory
address. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2018-8419)
- A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker
who successfully exploited this vulnerability could take control of an affected system. (CVE-2018-8421)
- An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects
in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted
system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application.
The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly
handles objects in memory.
(CVE-2018-8410)
- An information disclosure vulnerability exists when the Windows Graphics component improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further
compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially
crafted application. The update addresses the vulnerability by correcting how the Windows Graphics Component
handles objects in memory. (CVE-2018-8433)
- A security feature bypass vulnerability exists in Internet Explorer due to how scripts are handled that allows
a universal cross-site scripting (UXSS) condition. An attacker could use the UXSS vulnerability to access any
session belonging to web pages currently opened (or cached) by the browser at the time the attack is triggered.
(CVE-2018-8470)
See Also
http://www.nessus.org/u?f733ae62
http://www.nessus.org/u?7080d669
Solution
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-8271
CVE CVE-2018-8315
CVE CVE-2018-8332
CVE CVE-2018-8335
CVE CVE-2018-8392
CVE CVE-2018-8393
CVE CVE-2018-8410
CVE CVE-2018-8419
CVE CVE-2018-8420
CVE CVE-2018-8421
CVE CVE-2018-8424
CVE CVE-2018-8433
CVE CVE-2018-8434
CVE CVE-2018-8438
CVE CVE-2018-8439
CVE CVE-2018-8440
CVE CVE-2018-8442
CVE CVE-2018-8443
CVE CVE-2018-8444
CVE CVE-2018-8446
CVE CVE-2018-8447
CVE CVE-2018-8452
CVE CVE-2018-8455
CVE CVE-2018-8457
CVE CVE-2018-8468
CVE CVE-2018-8470
CVE CVE-2018-8475
MSKB 4457143
MSKB 4457129
XREF MSFT:MS18-4457143
XREF MSFT:MS18-4457129
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4462941 or cumulative update 4462926. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8460, CVE-2018-8491)
- A security feature bypass vulnerability exists in DNS Global Blocklist feature. An attacker who successfully
exploited this vulnerability could redirect traffic to malicious DNS endpoints. The update addresses the
vulnerability by updating DNS Server Role record additions to not bypass the Global Query Blocklist.
(CVE-2018-8320)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2018-8330)
- An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker
who successfully exploited this vulnerability could obtain information to further compromise the users system.
An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update
addresses the vulnerability by correcting how DirectX handles objects in memory.
(CVE-2018-8486)
- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the
information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if
the attacker uses it in combination with another vulnerability. (CVE-2018-8472)
- A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate
input from an authenticated user on a guest operating system. (CVE-2018-8489)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8453)
- An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented
IP packets. An attacker who successfully exploited this vulnerability could obtain information to further
compromise the users system. (CVE-2018-8493)
- An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who
successfully exploited this vulnerability could run processes in an elevated context. (CVE-2018-8411)
- A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes
user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take
control of the users system. (CVE-2018-8494)
- An information disclosure vulnerability exists when Windows Media Player improperly discloses file information.
Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk.
(CVE-2018-8481, CVE-2018-8482)
- A remote code execution vulnerability exists when "Windows Theme API" does not properly
decompress files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context
of the current user. If the current user is logged on with administrative user rights, an attacker could take control
of the affected system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights.
Users whose accounts are configured to have fewer user rights on the system could be less impacted than users
who operate with administrative user rights.
(CVE-2018-8413)
- An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly
handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an
elevated context. (CVE-2018-8484)
- A remote code execution vulnerability exists in the Microsoft JET Database Engine. An attacker who
successfully exploited this vulnerability could take control of an affected system. An attacker could then install
programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts
are configured to have fewer user rights on the system could be less impacted than users who operate with
administrative user rights. (CVE-2018-8423)
- An Elevation of Privilege vulnerability exists in Filter Manager when it improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could execute elevated code and take control of an
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights. (CVE-2018-8333)
See Also
http://www.nessus.org/u?554e569a
http://www.nessus.org/u?9d16a66a
Solution
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 105477
CVE CVE-2018-8320
CVE CVE-2018-8330
CVE CVE-2018-8333
CVE CVE-2018-8411
CVE CVE-2018-8413
CVE CVE-2018-8423
CVE CVE-2018-8453
CVE CVE-2018-8460
CVE CVE-2018-8472
CVE CVE-2018-8481
CVE CVE-2018-8482
CVE CVE-2018-8484
CVE CVE-2018-8486
CVE CVE-2018-8489
CVE CVE-2018-8491
CVE CVE-2018-8493
CVE CVE-2018-8494
MSKB 4462926
MSKB 4462941
XREF MSFT:MS18-4462926
XREF MSFT:MS18-4462941
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4467703 or cumulative update 4467697. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8552)
- A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker
who successfully exploited this vulnerability could take control of the affected system. An attacker could then
install programs; view, change, or delete data; or create new accounts with full user rights.
(CVE-2018-8450)
- A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files.
An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system.
(CVE-2018-8256)
- A security feature bypass exists when Windows incorrectly validates kernel driver signatures. An attacker who
successfully exploited this vulnerability could bypass security features and load improperly signed drivers into
the kernel. In an attack scenario, an attacker could bypass security features intended to prevent improperly
signed drivers from being loaded by the kernel. The update addresses the vulnerability by correcting how
Windows validates kernel driver signatures. (CVE-2018-8549)
- An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker
who successfully exploited this vulnerability could obtain information to further compromise the users system.
An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update
addresses the vulnerability by correcting how DirectX handles objects in memory.
(CVE-2018-8563)
- A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code.
(CVE-2018-8415)
- A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server
handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code
with elevated permissions on a target system.
(CVE-2018-8476)
- An information disclosure vulnerability exists when the win32k component improperly provides kernel
information.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2018-8565)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8544)
- An elevation of privilege exists in Windows COM Aggregate Marshaler. An attacker who successfully exploited
the vulnerability could run arbitrary code with elevated privileges. (CVE-2018-8550)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
(CVE-2018-8408)
- A cross-site-scripting (XSS) vulnerability exists when an open source customization for Microsoft Active
Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected
AD FS server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to
an affected AD FS server. The attacker who successfully exploited the vulnerability could then perform cross-
site scripting attacks on affected systems and run scripts in the security context of the current user. The attacks
could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to
take actions on the AD FS site on behalf of the user, such as change permissions and delete content, and
inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to
ensure that the open source customization for AD FS properly sanitizes web requests.
(CVE-2018-8547)
- A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects
in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target
system. (CVE-2018-8553)
- An information disclosure vulnerability exists when "Kernel Remote Procedure Call Provider" driver
improperly initializes objects in memory.
(CVE-2018-8407)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2018-8562)
- An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker
who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then
install programs; view, change, or delete data; or create new accounts with full user rights.
(CVE-2018-8485, CVE-2018-8561)
See Also
http://www.nessus.org/u?0d78fde5
http://www.nessus.org/u?98f43c31
Solution
Risk Factor
High
192.168.100.4 150
CVSS v3.0 Base Score
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 105770
BID 105774
BID 105777
BID 105778
BID 105781
BID 105786
BID 105787
BID 105789
BID 105790
BID 105791
BID 105792
BID 105794
BID 105797
BID 105801
BID 105803
BID 105805
BID 105813
CVE CVE-2018-8256
CVE CVE-2018-8407
CVE CVE-2018-8408
CVE CVE-2018-8415
CVE CVE-2018-8450
CVE CVE-2018-8476
CVE CVE-2018-8485
CVE CVE-2018-8544
CVE CVE-2018-8547
CVE CVE-2018-8549
192.168.100.4 15
CVE CVE-2018-8550
CVE CVE-2018-8552
CVE CVE-2018-8553
CVE CVE-2018-8561
CVE CVE-2018-8562
CVE CVE-2018-8563
CVE CVE-2018-8565
MSKB 4467703
MSKB 4467697
XREF MSFT:MS18-4467703
XREF MSFT:MS18-4467697
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4480964 or cumulative update 4480963. It is, therefore,
affected by multiple vulnerabilities :
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2019-0536, CVE-2019-0549, CVE-2019-0554)
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on
a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted
file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles
objects in memory. (CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578,
CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584)
- An information disclosure vulnerability exists in .NET Framework and .NET Core which allows bypassing
Cross- origin Resource Sharing (CORS) configurations. An attacker who successfully exploited the vulnerability
could retrieve content, that is normally restricted, from a web application. The security update addresses the
vulnerability by enforcing CORS configuration to prevent its bypass. (CVE-2019-0545)
- An elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to
escape from the AppContainer sandbox in the browser.
An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge
AppContainer sandbox. The vulnerability by itself does not allow arbitrary code to run. However, this vulnerability
could be used in conjunction with one or more vulnerabilities (for example a remote code execution vulnerability
and another elevation of privilege vulnerability) to take advantage of the elevated privileges when running.
The security update addresses the vulnerability by modifying how the Microsoft XmlDocument class enforces
sandboxing.
(CVE-2019-0555)
- An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An
attacker could exploit this vulnerability by running a specially crafted application on the victim system. The
update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
(CVE-2019-0570)
- A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An
attacker could execute arbitrary code in the context of the current user. (CVE-2019-0541)
- An elevation of privilege exists in Windows COM Desktop Broker. An attacker who successfully exploited the
vulnerability could run arbitrary code with elevated privileges. (CVE-2019-0552)
- An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An
attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker
could exploit this vulnerability by running a specially crafted application on the victim system. The update
addresses the vulnerability by correcting the way Windows handles authentication requests. (CVE-2019-0543)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the
users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application.
The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
(CVE-2019-0569)
See Also
http://www.nessus.org/u?5fa9f1a3
http://www.nessus.org/u?fd4ff768
Solution
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-3639
CVE CVE-2019-0536
CVE CVE-2019-0538
CVE CVE-2019-0541
CVE CVE-2019-0543
CVE CVE-2019-0545
CVE CVE-2019-0549
CVE CVE-2019-0552
CVE CVE-2019-0554
CVE CVE-2019-0555
CVE CVE-2019-0569
CVE CVE-2019-0570
CVE CVE-2019-0575
CVE CVE-2019-0576
CVE CVE-2019-0577
CVE CVE-2019-0578
CVE CVE-2019-0579
CVE CVE-2019-0580
CVE CVE-2019-0581
CVE CVE-2019-0582
CVE CVE-2019-0583
CVE CVE-2019-0584
MSKB 4480963
MSKB 4480964
XREF MSFT:MS19-4480963
XREF MSFT:MS19-4480964
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4487028 or cumulative update 4487000. It is, therefore,
affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2019-0656)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0623)
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to
properly validate input from an authenticated user on a guest operating system. (CVE-2019-0635)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles
objects in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660,
CVE-2019-0664)
- An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly
handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to
further compromise the victims system. (CVE-2019-0600, CVE-2019-0601)
- A remote code execution vulnerability exists in .NET Framework and Visual Studio software when the software
fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run
arbitrary code in the context of the current user. If the current user is logged on with administrative user rights,
an attacker could take control of the affected system. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights. (CVE-2019-0613)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2019-0621)
- An information disclosure vulnerability exists when the win32k component improperly provides kernel
information.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2019-0628)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack
to be successful, an attacker must persuade a user to open a malicious website. The security update addresses
the vulnerability by changing the way Internet Explorer handles objects in memory.
(CVE-2019-0676)
- A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's. An
attacker who successfully exploited this vulnerability could use it to bypass security logic intended to ensure that
a user-provided URL belonged to a specific hostname or a subdomain of that hostname. This could be used to
cause privileged communication to be made to an untrusted service as if it was a trusted service.
(CVE-2019-0657)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0606)
- A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights. (CVE-2019-0618, CVE-2019-0662)
- An information vulnerability exists when Windows improperly discloses file information. Successful exploitation
of the vulnerability could allow the attacker to read the contents of files on disk.
(CVE-2019-0636)
- A spoofing vulnerability exists when Microsoft browsers improperly handles specific redirects. An attacker
who successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate
website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other
vulnerabilities in web services.
(CVE-2019-0654)
- A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2)
server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to
execute code on the target server.
(CVE-2019-0630, CVE-2019-0633)
- A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends
specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run
arbitrary code on the DHCP server. (CVE-2019-0626)
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on
a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted
file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles
objects in memory. (CVE-2019-0595, CVE-2019-0596, CVE-2019-0597, CVE-2019-0598, CVE-2019-0599,
CVE-2019-0625)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who
successfully exploited this vulnerability could obtain information to further compromise the user's system.
(CVE-2019-0663)
See Also
http://www.nessus.org/u?220ebfca
http://www.nessus.org/u?1a603136
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.8 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2019-0595
CVE CVE-2019-0596
CVE CVE-2019-0597
CVE CVE-2019-0598
CVE CVE-2019-0599
CVE CVE-2019-0600
CVE CVE-2019-0601
CVE CVE-2019-0602
CVE CVE-2019-0606
CVE CVE-2019-0613
CVE CVE-2019-0615
CVE CVE-2019-0616
CVE CVE-2019-0618
CVE CVE-2019-0619
CVE CVE-2019-0621
CVE CVE-2019-0623
CVE CVE-2019-0625
CVE CVE-2019-0626
CVE CVE-2019-0628
CVE CVE-2019-0630
CVE CVE-2019-0633
CVE CVE-2019-0635
CVE CVE-2019-0636
CVE CVE-2019-0654
CVE CVE-2019-0656
CVE CVE-2019-0657
CVE CVE-2019-0660
CVE CVE-2019-0662
CVE CVE-2019-0663
CVE CVE-2019-0664
CVE CVE-2019-0676
MSKB 4487028
MSKB 4487000
XREF MSFT:MS19-4487028
XREF MSFT:MS19-4487000
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4489883 or cumulative update 4489881. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a
victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The
update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in
memory. (CVE-2019-0617)
- A security feature bypass vulnerability exists when Internet Explorer fails to validate the correct Security Zone
of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted
Internet Security Zone than intended.
(CVE-2019-0761)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0780)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-0609)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2019-0702, CVE-2019-0755, CVE-2019-0775)
- An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain
requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet,
which could lead to information disclosure from the server. (CVE-2019-0703, CVE-2019-0704, CVE-2019-0821)
- An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects
in memory. An attacker who successfully exploited this vulnerability could use the information to further exploit
the victim system. (CVE-2019-0759)
- An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory
address. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2019-0782)
- A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different
origins. The vulnerability allows Microsoft browsers to bypass Same-Site cookie restrictions, and to allow
requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force
the browser to send data that would otherwise be restricted. (CVE-2019-0762)
192.168.100.4 160
- A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly
validate input from a privileged user on a guest operating system. An attacker who successfully exploited the
vulnerability could cause the host server to crash. (CVE-2019-0690)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0797)
- A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. (CVE-2019-0754)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-0680, CVE-2019-0783)
- A remote code execution vulnerability exists in the way that the ActiveX Data objects (ADO) handles objects in
memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user
rights as the current user. (CVE-2019-0784)
- A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server
handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code
with elevated permissions on a target system.
(CVE-2019-0603)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2019-0614, CVE-2019-0774)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
(CVE-2019-0767)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0763)
- A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in
memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user. (CVE-2019-0746)
- A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes
user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take
control of the users system. (CVE-2019-0756)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
192.168.100.4 16
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0665, CVE-2019-0666, CVE-2019-0667, CVE-2019-0772)
- A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The
vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of
the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the
current user. (CVE-2019-0765)
See Also
http://www.nessus.org/u?b8fed4ae
http://www.nessus.org/u?ec929c9e
Solution
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
CVE CVE-2019-0603
CVE CVE-2019-0609
CVE CVE-2019-0614
CVE CVE-2019-0617
CVE CVE-2019-0665
CVE CVE-2019-0666
CVE CVE-2019-0667
CVE CVE-2019-0680
CVE CVE-2019-0690
CVE CVE-2019-0702
CVE CVE-2019-0703
CVE CVE-2019-0704
CVE CVE-2019-0746
CVE CVE-2019-0754
CVE CVE-2019-0755
CVE CVE-2019-0756
CVE CVE-2019-0759
CVE CVE-2019-0761
CVE CVE-2019-0762
CVE CVE-2019-0763
CVE CVE-2019-0765
CVE CVE-2019-0767
CVE CVE-2019-0772
CVE CVE-2019-0774
CVE CVE-2019-0775
CVE CVE-2019-0780
CVE CVE-2019-0782
CVE CVE-2019-0783
CVE CVE-2019-0784
CVE CVE-2019-0797
CVE CVE-2019-0821
MSKB 4489881
MSKB 4489883
XREF MSFT:MS19-4489881
XREF MSFT:MS19-4489883
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4493467 or cumulative update 4493446. It is, therefore,
affected by multiple vulnerabilities :
- A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard
when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited
this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine.
(CVE-2019-0732)
- An information disclosure vulnerability exists when the Terminal Services component improperly discloses
the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise a users system. (CVE-2019-0839)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0842)
- A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker
who successfully exploited these vulnerabilities could take control of an affected system. (CVE-2019-0856)
- An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented
IP packets. An attacker who successfully exploited this vulnerability could obtain information to further
compromise the users system. (CVE-2019-0688)
- A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes
user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to
take control of the users system. (CVE-2019-0790, CVE-2019-0791, CVE-2019-0792, CVE-2019-0793,
CVE-2019-0795)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0803, CVE-2019-0859)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-0752, CVE-2019-0753, CVE-2019-0862)
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a
victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The
update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in
memory. (CVE-2019-0846, CVE-2019-0847, CVE-2019-0851, CVE-2019-0877, CVE-2019-0879)
- An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver
(luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security
context of the local system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights.
(CVE-2019-0730, CVE-2019-0731, CVE-2019-0805, CVE-2019-0836)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2019-0802, CVE-2019-0849)
- An information disclosure vulnerability exists when Windows Task Scheduler improperly discloses credentials
to Windows Credential Manager. An attacker who successfully exploited the vulnerability could obtain
information to further compromise the users system. An attacker could then install programs; view, change, or
delete data; or create new accounts with full user rights. (CVE-2019-0838)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise
the users system. (CVE-2019-0835)
- An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver
(luafv.sys). An attacker who successfully exploited this vulnerability could set the short name of a file with a long
name to an arbitrary short name, overriding the file system with limited privileges. (CVE-2019-0796)
- An information disclosure vulnerability exists when the win32k component improperly provides kernel
information.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2019-0848)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2019-0844)
- An elevation of privilege vulnerability exists when the Windows Client Server Run-Time Subsystem (CSRSS)
fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run
arbitrary code. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0735)
- A remote code execution vulnerability exists when OLE automation improperly handles objects in memory. An
attacker who successfully exploited the vulnerability could gain execution on the victim system.
(CVE-2019-0794)
- A remote code execution vulnerability exists when the IOleCvt interface renders ASP webpage content. An
attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the
users system. (CVE-2019-0845)
- A tampering vulnerability exists when Microsoft browsers do not properly validate input under specific
conditions. An attacker who exploited the vulnerability could pass custom command line parameters.
(CVE-2019-0764)
- A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights. (CVE-2019-0853)
See Also
http://www.nessus.org/u?60dedb61
http://www.nessus.org/u?4c9ecc3f
Solution
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2019-0688
CVE CVE-2019-0730
CVE CVE-2019-0731
CVE CVE-2019-0732
CVE CVE-2019-0735
CVE CVE-2019-0752
CVE CVE-2019-0753
CVE CVE-2019-0764
CVE CVE-2019-0790
CVE CVE-2019-0791
CVE CVE-2019-0792
CVE CVE-2019-0793
CVE CVE-2019-0794
CVE CVE-2019-0795
CVE CVE-2019-0796
CVE CVE-2019-0802
CVE CVE-2019-0803
CVE CVE-2019-0805
CVE CVE-2019-0835
CVE CVE-2019-0836
CVE CVE-2019-0838
CVE CVE-2019-0839
CVE CVE-2019-0842
CVE CVE-2019-0844
CVE CVE-2019-0845
CVE CVE-2019-0846
CVE CVE-2019-0847
CVE CVE-2019-0848
CVE CVE-2019-0849
CVE CVE-2019-0851
CVE CVE-2019-0853
CVE CVE-2019-0856
CVE CVE-2019-0859
CVE CVE-2019-0862
CVE CVE-2019-0877
CVE CVE-2019-0879
MSKB 4493446
MSKB 4493467
XREF MSFT:MS19-4493446
XREF MSFT:MS19-4493467
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4499165 or cumulative update 4499151. It is, therefore,
affected by multiple vulnerabilities :
- A new subclass of speculative execution side channel vulnerabilities, known as Microarchitectural Data
Sampling, exist in Windows.
An attacker who successfully exploited these vulnerabilities may be able to read privileged data across trust
boundaries. In shared resource environments (such as exists in some cloud services configurations), these
vulnerabilities could allow one virtual machine to improperly access information from another. In non-browsing
scenarios on standalone systems, an attacker would need prior access to the system or an ability to run a
specially crafted application on the target system to leverage these vulnerabilities.
(CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130)
- A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx
strings. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET
application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted
requests to a .NET Framework (or .NET core) application. The update addresses the vulnerability by correcting
how .NET Framework and .NET Core applications handle RegEx string processing. (CVE-2019-0820)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0940)
- A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input.
An attacker could exploit the vulnerability to execute malicious code. (CVE-2019-0885)
- An elevation of privilege vulnerability exists when the Windows Kernel improperly handles key enumeration.
An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.
A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The
security update addresses the vulnerability by helping to ensure that the Windows Kernel properly handles key
enumeration. (CVE-2019-0881)
- An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle
certain symbolic links. An attacker who successfully exploited this vulnerability could potentially set certain items
to run at a higher level and thereby elevate permissions. (CVE-2019-0936)
- An spoofing vulnerability exists when Internet Explorer improperly handles URLs. An attacker who successfully
exploited this vulnerability could trick a user by redirecting the user to a specially crafted website. The specially
crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web
services. (CVE-2019-0921)
- An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys
fails to check the length of a buffer prior to copying memory to it. (CVE-2019-0707)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-0884, CVE-2019-0911, CVE-2019-0918)
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on
a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted
file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles
objects in memory. (CVE-2019-0889, CVE-2019-0890, CVE-2019-0891, CVE-2019-0893, CVE-2019-0894,
CVE-2019-0895, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900,
CVE-2019-0901, CVE-2019-0902)
- A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially
crafted packets. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP
server. (CVE-2019-0725)
- A denial of service vulnerability exists when .NET Framework improperly handles objects in heap memory. An
attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application.
(CVE-2019-0864)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2019-0758, CVE-2019-0882, CVE-2019-0961)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2019-0930)
- An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able
to successfully decode and replace authentication request using Kerberos, allowing an attacker to be validated
as an Administrator. The update addresses this vulnerability by changing how these requests are validated.
(CVE-2019-0734)
- An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files. An
attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker
could then install programs; view, change, or delete data; or create new accounts with administrator privileges.
(CVE-2019-0863)
- A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests.
An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET
Framework or .NET Core web application. The vulnerability can be exploited remotely, without authentication. A
remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET
Framework or .NET Core application.
The update addresses the vulnerability by correcting how .NET Framework or .NET Core web applications
handles web requests. (CVE-2019-0980, CVE-2019-0981)
- A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights. (CVE-2019-0903)
192.168.100.4 170
See Also
http://www.nessus.org/u?f1eae74c
http://www.nessus.org/u?9defcbe8
Solution
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-11091
CVE CVE-2018-12126
CVE CVE-2018-12127
CVE CVE-2018-12130
CVE CVE-2019-0707
CVE CVE-2019-0725
CVE CVE-2019-0734
CVE CVE-2019-0758
CVE CVE-2019-0820
CVE CVE-2019-0863
CVE CVE-2019-0864
CVE CVE-2019-0881
CVE CVE-2019-0882
CVE CVE-2019-0884
CVE CVE-2019-0885
192.168.100.4 17
CVE CVE-2019-0889
CVE CVE-2019-0890
CVE CVE-2019-0891
CVE CVE-2019-0893
CVE CVE-2019-0894
CVE CVE-2019-0895
CVE CVE-2019-0896
CVE CVE-2019-0897
CVE CVE-2019-0898
CVE CVE-2019-0899
CVE CVE-2019-0900
CVE CVE-2019-0901
CVE CVE-2019-0902
CVE CVE-2019-0903
CVE CVE-2019-0911
CVE CVE-2019-0918
CVE CVE-2019-0921
CVE CVE-2019-0930
CVE CVE-2019-0936
CVE CVE-2019-0940
CVE CVE-2019-0961
CVE CVE-2019-0980
CVE CVE-2019-0981
MSKB 4499151
MSKB 4499165
XREF MSFT:MS19-4499151
XREF MSFT:MS19-4499165
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4503290 or cumulative update 4503276. It is, therefore,
affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly
parses XML input containing a reference to an external entity. An attacker who successfully exploited this
vulnerability could read arbitrary files via an XML external entity (XXE) declaration. (CVE-2019-0948)
- A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate
input from an authenticated user on a guest operating system. (CVE-2019-0620, CVE-2019-0722)
- A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key
and sign messages. (CVE-2019-1019)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2019-1014, CVE-2019-1017)
- A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully
bypass the NTLM MIC (Message Integrity Check) protection. An attacker who successfully exploited this
vulnerability could gain the ability to downgrade NTLM security features. (CVE-2019-1040)
- A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input
from a privileged user on a guest operating system. (CVE-2019-0710, CVE-2019-0711, CVE-2019-0713)
- A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The
vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of
the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the
current user. (CVE-2019-1043)
- An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to
properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run
arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting
the input sanitization error to preclude unintended elevation. (CVE-2019-0973)
- A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on
a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted
file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles
objects in memory. (CVE-2019-0904, CVE-2019-0905, CVE-2019-0906, CVE-2019-0907, CVE-2019-0908,
CVE-2019-0909, CVE-2019-0974)
- An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local
Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the
security context of the local system. An attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights.
(CVE-2019-0943)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-0920, CVE-2019-1005, CVE-2019-1055, CVE-2019-1080)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1038)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in
memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2019-1081)
- An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the
vulnerability could run arbitrary code with elevated privileges. (CVE-2019-1028)
- A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who
successfully exploited the vulnerability could cause a target system to stop responding. (CVE-2019-1025)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-0988)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
(CVE-2019-1039)
- This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS)
caused when an authenticated attacker sends a specially crafted authentication request. A remote attacker who
successfully exploited this vulnerability could cause a denial of service on the target system's LSASS service,
which triggers an automatic reboot of the system. The security update addresses the vulnerability by changing
the way that LSASS handles specially crafted authentication requests. (CVE-2019-0972)
- An elevation of privilege vulnerability exists in the way that the Windows Network File System (NFS) handles
objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated
permissions. (CVE-2019-1045)
- An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts. An
attacker who successfully exploited the vulnerability could elevate privileges by escaping a sandbox.
(CVE-2019-1053)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2019-1010, CVE-2019-1012, CVE-2019-1046, CVE-2019-1050)
- A remote code execution vulnerability exists in the way that ActiveX Data Objects (ADO) handle objects in
memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with the victim
users privileges. An attacker could craft a website that exploits the vulnerability and then convince a victim user
to visit the website. The security update addresses the vulnerability by modifying how ActiveX Data Objects
handle objects in memory.
(CVE-2019-0888)
- An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver
improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run
processes in an elevated context. (CVE-2019-0984)
- A denial of service exists in Microsoft IIS Server when the optional request filtering feature improperly handles
requests. An attacker who successfully exploited this vulnerability could perform a temporary denial of service
against pages configured to use request filtering. (CVE-2019-0941)
- An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly
handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an
elevated context. (CVE-2019-0986)
See Also
http://www.nessus.org/u?953a7c84
http://www.nessus.org/u?1dd73841
Solution
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 108570
BID 108577
BID 108581
BID 108583
BID 108584
BID 108585
BID 108586
BID 108591
BID 108594
BID 108597
BID 108599
BID 108600
BID 108603
BID 108604
BID 108606
BID 108607
BID 108609
BID 108612
BID 108613
BID 108614
BID 108620
BID 108624
BID 108630
BID 108632
BID 108633
BID 108638
BID 108641
BID 108644
BID 108646
BID 108648
BID 108650
BID 108651
BID 108654
BID 108655
BID 108656
BID 108666
BID 108667
BID 108668
BID 108669
BID 108708
BID 108709
CVE CVE-2019-0620
CVE CVE-2019-0710
CVE CVE-2019-0711
CVE CVE-2019-0713
CVE CVE-2019-0722
CVE CVE-2019-0888
CVE CVE-2019-0904
CVE CVE-2019-0905
CVE CVE-2019-0906
CVE CVE-2019-0907
CVE CVE-2019-0908
CVE CVE-2019-0909
CVE CVE-2019-0920
CVE CVE-2019-0941
CVE CVE-2019-0943
CVE CVE-2019-0948
CVE CVE-2019-0972
CVE CVE-2019-0973
CVE CVE-2019-0974
CVE CVE-2019-0984
CVE CVE-2019-0986
CVE CVE-2019-0988
CVE CVE-2019-1005
CVE CVE-2019-1010
CVE CVE-2019-1012
CVE CVE-2019-1014
CVE CVE-2019-1017
CVE CVE-2019-1019
CVE CVE-2019-1025
CVE CVE-2019-1028
CVE CVE-2019-1038
CVE CVE-2019-1039
CVE CVE-2019-1040
CVE CVE-2019-1043
CVE CVE-2019-1045
CVE CVE-2019-1046
CVE CVE-2019-1050
CVE CVE-2019-1053
CVE CVE-2019-1055
CVE CVE-2019-1080
CVE CVE-2019-1081
MSKB 4503276
MSKB 4503290
XREF MSFT:MS19-4503276
XREF MSFT:MS19-4503290
Plugin Information
Published: 2019/06/11, Modified: 2019/07/16
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4507457 or cumulative update 4507448. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in .NET software when the software fails to check the source
markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context
of the current user. If the current user is logged on with administrative user rights, an attacker could take control
of the affected system. An attacker could then install programs; view, change, or delete data; or create new
accounts with full user rights.
(CVE-2019-1113)
- A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who
successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to
medium-integrity. This vulnerability by itself does not allow arbitrary code execution; however, it could allow
arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code
execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated
privileges when code execution is attempted. (CVE-2019-0880)
- An information disclosure vulnerability exists when the Windows RDP client improperly discloses the contents
of its memory. An attacker who successfully exploited this vulnerability could obtain information to further
compromise the users system. (CVE-2019-1108)
- An information disclosure vulnerability exists when the win32k component improperly provides kernel
information.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2019-1096)
- An elevation of privilege vulnerability exists in Microsoft Windows where a certain dll, with Local Service
privilege, is vulnerable to race planting a customized dll. An attacker who successfully exploited this vulnerability
could potentially elevate privilege to SYSTEM. The update addresses this vulnerability by requiring system
privileges for a certain DLL.
(CVE-2019-1082)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-1001)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1063)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1104)
- An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open
a specially crafted document, or by convincing a user to visit an untrusted webpage.
The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
(CVE-2019-1093, CVE-2019-1097)
- An information disclosure vulnerability exists when the Windows GDI component improperly discloses the
contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such
as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted
webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects
in memory. (CVE-2019-1094, CVE-2019-1095)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the
users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application.
The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
(CVE-2019-1071)
- An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited
the vulnerability could run arbitrary code with elevated privileges. (CVE-2019-1086, CVE-2019-1087,
CVE-2019-1088)
- An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly
handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated
context. An attacker could then install programs; view, change or delete data. (CVE-2019-1130)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-1004, CVE-2019-1056, CVE-2019-1059)
- A security feature bypass vulnerability exists in Active Directory Federation Services (ADFS) which could allow
an attacker to bypass the extranet lockout policy.
(CVE-2019-1126)
- A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services
when an authenticated attacker abuses clipboard redirection. An attacker who successfully exploited this
vulnerability could execute arbitrary code on the victim system. An attacker could then install programs; view,
change, or delete data; or create new accounts with full user rights. (CVE-2019-0887)
- An elevation of privilege vulnerability exists in the way that the wlansvc.dll handles objects in memory. An
attacker who successfully exploited the vulnerability could execute code with elevated permissions.
(CVE-2019-1085)
- A denial of service vulnerability exists when Microsoft Common Object Runtime Library improperly handles
web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against
192.168.100.4 180
a .NET web application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially
crafted requests to the .NET application. The update addresses the vulnerability by correcting how the .NET web
application handles web requests. (CVE-2019-1083)
- A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends
specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability
could either run arbitrary code on the DHCP failover server or cause the DHCP service to become
nonresponsive.
(CVE-2019-0785)
- An elevation of privilege vulnerability exists in rpcss.dll when the RPC service Activation Kernel improperly
handles an RPC request. (CVE-2019-1089)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2019-1073)
- A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights. (CVE-2019-1102)
- An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows
Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys. This vulnerability
allows an attacker to impersonate another user, which can lead to elevation of privileges. The vulnerability exists
in WCF, WIF 3.5 and above in .NET Framework, WIF 1.0 component in Windows, WIF Nuget package, and
WIF implementation in SharePoint. An unauthenticated attacker can exploit this by signing a SAML token with
any arbitrary symmetric key. This security update addresses the issue by ensuring all versions of WCF and WIF
validate the key used to sign SAML tokens correctly.
(CVE-2019-1006)
- A denial of service vulnerability exists in Windows DNS Server when it fails to properly handle DNS queries.
An attacker who successfully exploited this vulnerability could cause the DNS Server service to become
nonresponsive. (CVE-2019-0811)
- An information disclosure vulnerability exists when certain central processing units (CPU) speculatively
access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust
boundaries. (CVE-2019-1125)
See Also
http://www.nessus.org/u?d231fad3
http://www.nessus.org/u?1d422a75
Solution
Risk Factor
High
192.168.100.4 18
8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.6 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
CVE CVE-2019-0785
CVE CVE-2019-0811
CVE CVE-2019-0880
CVE CVE-2019-0887
CVE CVE-2019-1001
CVE CVE-2019-1004
CVE CVE-2019-1006
CVE CVE-2019-1056
CVE CVE-2019-1059
CVE CVE-2019-1063
CVE CVE-2019-1071
CVE CVE-2019-1073
CVE CVE-2019-1082
CVE CVE-2019-1083
CVE CVE-2019-1085
CVE CVE-2019-1086
CVE CVE-2019-1087
CVE CVE-2019-1088
CVE CVE-2019-1089
CVE CVE-2019-1093
CVE CVE-2019-1094
CVE CVE-2019-1095
CVE CVE-2019-1096
CVE CVE-2019-1097
CVE CVE-2019-1102
CVE CVE-2019-1104
CVE CVE-2019-1108
CVE CVE-2019-1113
CVE CVE-2019-1125
CVE CVE-2019-1126
CVE CVE-2019-1130
MSKB 4507448
MSKB 4507457
XREF MSFT:MS19-4507448
XREF MSFT:MS19-4507457
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host is missing an update that disables selected ActiveX controls.
Description
The remote Windows host is missing one or more kill bits for ActiveX controls that are known to contain
vulnerabilities.
If any of these ActiveX controls are ever installed on the remote host, either now or in the future, they would
expose the host to various security issues.
Note that the affected controls are from third-party vendors that have asked Microsoft to prevent their controls
from being run in Internet Explorer.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3118753
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
References
MSKB 3118753
Plugin Information
Plugin Output
tcp/445
The kill bit has not been set for the following control :
{D4C0DB38-B682-42A8-AF62-DB9247543354}
71312 - MS13-097: Cumulative Security Update for Internet Explorer (2898785)
Synopsis
The remote host has a web browser that is affected by multiple vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2898785.
The installed version of IE is affected by multiple elevation of privilege and memory corruption vulnerabilities that
could allow an attacker to execute arbitrary code on the remote host.
See Also
https://www.zerodayinitiative.com/advisories/ZDI-13-271/
https://www.zerodayinitiative.com/advisories/ZDI-13-272/
https://www.zerodayinitiative.com/advisories/ZDI-13-273/
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-097
Solution
Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 64115
BID 64117
BID 64119
BID 64120
BID 64123
BID 64124
BID 64126
CVE CVE-2013-5045
CVE CVE-2013-5046
CVE CVE-2013-5047
CVE CVE-2013-5048
CVE CVE-2013-5049
CVE CVE-2013-5051
CVE CVE-2013-5052
MSKB 2898785
XREF MSFT:MS13-097
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 2898785
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16476
72433 - MS14-010: Cumulative Security Update for Internet Explorer (2909921)
Synopsis
The remote host has a web browser that is affected by multiple vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2909921.
The installed version of IE is affected by multiple privilege escalation and memory corruption vulnerabilities that
could allow an attacker to execute arbitrary code on the remote host. Additionally, the installed version of IE is
affected by an information disclosure vulnerability.
See Also
https://www.zerodayinitiative.com/advisories/ZDI-14-021/
https://www.zerodayinitiative.com/advisories/ZDI-14-022/
https://www.zerodayinitiative.com/advisories/ZDI-14-023/
https://www.zerodayinitiative.com/advisories/ZDI-14-024/
https://www.zerodayinitiative.com/advisories/ZDI-14-025/
https://www.zerodayinitiative.com/advisories/ZDI-14-026/
https://www.zerodayinitiative.com/advisories/ZDI-14-027/
https://www.zerodayinitiative.com/advisories/ZDI-14-028/
https://www.zerodayinitiative.com/advisories/ZDI-14-061/
https://www.zerodayinitiative.com/advisories/ZDI-14-062/
https://www.securityfocus.com/archive/1/531600/30/0/threaded
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-010
Solution
Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 65361
BID 65363
BID 65367
BID 65370
BID 65371
BID 65372
BID 65373
BID 65375
BID 65376
BID 65377
BID 65378
BID 65380
BID 65381
BID 65382
BID 65383
BID 65384
BID 65385
BID 65386
BID 65388
BID 65389
BID 65390
BID 65392
BID 65394
BID 65395
CVE CVE-2014-0267
CVE CVE-2014-0268
CVE CVE-2014-0269
CVE CVE-2014-0270
CVE CVE-2014-0271
CVE CVE-2014-0272
CVE CVE-2014-0273
CVE CVE-2014-0274
CVE CVE-2014-0275
CVE CVE-2014-0276
CVE CVE-2014-0277
CVE CVE-2014-0278
CVE CVE-2014-0279
CVE CVE-2014-0280
CVE CVE-2014-0281
CVE CVE-2014-0283
CVE CVE-2014-0284
CVE CVE-2014-0285
CVE CVE-2014-0286
CVE CVE-2014-0287
CVE CVE-2014-0288
CVE CVE-2014-0289
CVE CVE-2014-0290
CVE CVE-2014-0293
MSKB 2909921
XREF MSFT:MS14-010
Plugin Information
Plugin Output
tcp/445
KB : 2909921
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16518
192.168.100.4 190
72434 - MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution
(2928390)
Synopsis
Arbitrary code can be executed on the remote host through the installed VBScript Scripting Engine.
Description
The installed version of the VBScript Scripting Engine has a memory corruption vulnerability due to improper
handling of objects in memory.
If an attacker can trick a user on the system into viewing or opening malicious content, this issue could be
leveraged to execute arbitrary code on the affected system, subject to the user's privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-011
Solution
Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 2008 R2, 7, 8, 8.1, 2012, and 2012
R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 65395
CVE CVE-2014-0271
MSKB 2909210
MSKB 2909212
MSKB 2909213
XREF MSFT:MS14-011
Plugin Information
192.168.100.4 19
Plugin Output
tcp/445
KB : 2909210
- C:\Windows\system32\Vbscript.dll has not been patched.
Remote version : 5.8.9600.16384
Should be : 5.8.9600.16483
72930 - MS14-012: Cumulative Security Update for Internet Explorer (2925418)
Synopsis
The remote host has a web browser that is affected by multiple vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2925418.
The installed version of IE is affected by multiple privilege escalation and memory corruption vulnerabilities that
could allow an attacker to execute arbitrary code on the remote host. Additionally, the installed version of IE is
affected by an information disclosure vulnerability.
See Also
https://www.zerodayinitiative.com/advisories/ZDI-14-030/
https://www.zerodayinitiative.com/advisories/ZDI-14-031/
https://www.zerodayinitiative.com/advisories/ZDI-14-032/
https://www.zerodayinitiative.com/advisories/ZDI-14-033/
https://www.zerodayinitiative.com/advisories/ZDI-14-034/
https://www.zerodayinitiative.com/advisories/ZDI-14-035/
https://www.zerodayinitiative.com/advisories/ZDI-14-036/
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-012
Solution
Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 65551
BID 66023
BID 66025
BID 66026
BID 66027
BID 66028
BID 66029
BID 66030
BID 66031
BID 66032
BID 66033
BID 66034
BID 66035
BID 66036
BID 66037
BID 66038
BID 66039
BID 66040
BID 70266
CVE CVE-2014-0297
CVE CVE-2014-0298
CVE CVE-2014-0299
CVE CVE-2014-0302
CVE CVE-2014-0303
CVE CVE-2014-0304
CVE CVE-2014-0305
CVE CVE-2014-0306
CVE CVE-2014-0307
CVE CVE-2014-0308
CVE CVE-2014-0309
CVE CVE-2014-0311
CVE CVE-2014-0312
CVE CVE-2014-0313
CVE CVE-2014-0314
CVE CVE-2014-0321
CVE CVE-2014-0322
CVE CVE-2014-0324
CVE CVE-2014-4112
MSKB 2925418
XREF CERT:732479
XREF EDB-ID:32851
XREF EDB-ID:32438
XREF EDB-ID:32904
XREF MSFT:MS14-012
Exploitable With
CANVAS (true) Core Impact (true) Metasploit (true)
Plugin Information
Plugin Output
tcp/445
KB : 2925418
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16521
73415 - MS14-018: Cumulative Security Update for Internet Explorer (2950467)
Synopsis
The remote host has a web browser that is affected by multiple vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2950467.
The installed version of IE is affected by multiple memory corruption vulnerabilities that could allow an attacker to
execute arbitrary code on the remote host.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-018
https://www.zerodayinitiative.com/advisories/ZDI-14-078/
Solution
Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 66646
BID 66647
BID 66648
BID 66652
BID 66653
BID 66654
CVE CVE-2014-0325
CVE CVE-2014-1751
CVE CVE-2014-1752
CVE CVE-2014-1753
CVE CVE-2014-1755
CVE CVE-2014-1760
MSKB 2936068
XREF MSFT:MS14-018
Plugin Information
Plugin Output
tcp/445
KB : 2936068
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16659
73805 - MS14-021: Security Update for Internet Explorer (2965111)
Synopsis
The remote host has a web browser that is affected by a memory corruption vulnerability.
Description
The remote host is missing Internet Explorer (IE) Security Update 2965111.
The installed version of IE is affected by a memory corruption vulnerability that could allow an attacker to
execute arbitrary code on the remote host.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021
Solution
Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 67075
CVE CVE-2014-1776
MSKB 2964358
MSKB 2964444
XREF CERT:222929
XREF MSFT:MS14-021
Exploitable With
Plugin Information
Published: 2014/05/01, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 2964444
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16661
73988 - MS14-029: Security Update for Internet Explorer (2962482)
Synopsis
The remote host has a web browser that is affected by multiple memory corruption vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2962482.
The installed version of IE is affected by multiple memory corruption vulnerabilities that could allow an attacker to
execute arbitrary code on the remote host.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-029
Solution
Microsoft has released a set of patches for 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 67299
BID 67301
CVE CVE-2014-0310
CVE CVE-2014-1815
MSKB 2953522
MSKB 2961851
XREF EDB-ID:34458
XREF MSFT:MS14-029
Plugin Information
tcp/445
KB : 2961851
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16663
74427 - MS14-035: Cumulative Security Update for Internet Explorer (2969262)
Synopsis
The remote host has a web browser that is affected by multiple vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2969262.
The version of Internet Explorer installed on the remote host is affected by multiple vulnerabilities, the majority of
which are remote code execution vulnerabilities. An attacker could exploit these vulnerabilities by convincing a
user to visit a specially crafted web page.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-035
https://www.securityfocus.com/archive/1/532798/30/0/threaded
https://www.securityfocus.com/archive/1/532799/30/0/threaded
https://www.zerodayinitiative.com/advisories/ZDI-14-194/
https://www.zerodayinitiative.com/advisories/ZDI-14-193/
https://www.zerodayinitiative.com/advisories/ZDI-14-192/
https://www.zerodayinitiative.com/advisories/ZDI-14-191/
https://www.zerodayinitiative.com/advisories/ZDI-14-190/
https://www.zerodayinitiative.com/advisories/ZDI-14-189/
https://www.zerodayinitiative.com/advisories/ZDI-14-188/
https://www.zerodayinitiative.com/advisories/ZDI-14-187/
https://www.zerodayinitiative.com/advisories/ZDI-14-186/
https://www.zerodayinitiative.com/advisories/ZDI-14-185/
https://www.zerodayinitiative.com/advisories/ZDI-14-184/
https://www.zerodayinitiative.com/advisories/ZDI-14-183/
https://www.zerodayinitiative.com/advisories/ZDI-14-182/
https://www.zerodayinitiative.com/advisories/ZDI-14-181/
https://www.zerodayinitiative.com/advisories/ZDI-14-180/
https://www.zerodayinitiative.com/advisories/ZDI-14-179/
https://www.zerodayinitiative.com/advisories/ZDI-14-178/
https://www.zerodayinitiative.com/advisories/ZDI-14-177/
https://www.zerodayinitiative.com/advisories/ZDI-14-176/
https://www.zerodayinitiative.com/advisories/ZDI-14-175/
https://www.zerodayinitiative.com/advisories/ZDI-14-174/
https://www.zerodayinitiative.com/advisories/ZDI-14-140/
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 67295
BID 67511
BID 67518
BID 67544
BID 67827
BID 67831
BID 67833
BID 67834
BID 67835
BID 67836
BID 67838
BID 67839
BID 67840
BID 67841
BID 67842
BID 67843
BID 67845
BID 67846
BID 67847
BID 67848
BID 67849
BID 67850
BID 67851
BID 67852
BID 67854
BID 67855
BID 67856
BID 67857
BID 67858
BID 67859
BID 67860
BID 67861
BID 67862
BID 67864
BID 67866
BID 67867
BID 67869
BID 67871
BID 67873
BID 67874
BID 67875
BID 67876
BID 67877
BID 67878
BID 67879
BID 67880
BID 67881
BID 67882
BID 67883
BID 67884
BID 67885
BID 67886
BID 67887
BID 67889
BID 67890
BID 67891
BID 67892
BID 67915
BID 68101
CVE CVE-2014-0282
CVE CVE-2014-1762
CVE CVE-2014-1764
CVE CVE-2014-1766
CVE CVE-2014-1769
CVE CVE-2014-1770
CVE CVE-2014-1771
CVE CVE-2014-1772
CVE CVE-2014-1773
CVE CVE-2014-1774
CVE CVE-2014-1775
CVE CVE-2014-1777
CVE CVE-2014-1778
CVE CVE-2014-1779
CVE CVE-2014-1780
CVE CVE-2014-1781
CVE CVE-2014-1782
CVE CVE-2014-1783
CVE CVE-2014-1784
CVE CVE-2014-1785
CVE CVE-2014-1786
CVE CVE-2014-1788
CVE CVE-2014-1789
CVE CVE-2014-1790
CVE CVE-2014-1791
CVE CVE-2014-1792
CVE CVE-2014-1794
CVE CVE-2014-1795
CVE CVE-2014-1796
CVE CVE-2014-1797
CVE CVE-2014-1799
CVE CVE-2014-1800
CVE CVE-2014-1802
CVE CVE-2014-1803
CVE CVE-2014-1804
CVE CVE-2014-1805
CVE CVE-2014-2753
CVE CVE-2014-2754
CVE CVE-2014-2755
CVE CVE-2014-2756
CVE CVE-2014-2757
CVE CVE-2014-2758
CVE CVE-2014-2759
CVE CVE-2014-2760
CVE CVE-2014-2761
CVE CVE-2014-2763
CVE CVE-2014-2764
CVE CVE-2014-2765
CVE CVE-2014-2766
CVE CVE-2014-2767
CVE CVE-2014-2768
CVE CVE-2014-2769
CVE CVE-2014-2770
CVE CVE-2014-2771
CVE CVE-2014-2772
CVE CVE-2014-2773
CVE CVE-2014-2775
CVE CVE-2014-2776
CVE CVE-2014-2777
CVE CVE-2014-2782
MSKB 2957689
MSKB 2963950
XREF CERT:239151
XREF EDB-ID:33860
XREF EDB-ID:35213
XREF MSFT:MS14-035
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 2963950
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16668
74428 - MS14-036: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code
Execution (2967487)
Synopsis
The remote Windows host is affected by multiple remote code execution vulnerabilities.
Description
The version of Microsoft's Graphics Component installed on the remote host is affected by code execution
vulnerabilities due to the way GDI+ handles image record types in specially crafted files. A remote,
unauthenticated attacker could exploit these issues by tricking a user into viewing content that contains
malicious files, which could result in arbitrary code execution.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-036
Solution
Microsoft has released a set of patches for Windows Server 2003, Vista, Server 2008, 7, 2008 R2, 8, 8.1, 2012,
2012 R2, Office 2007, Office 2010, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013, and
Lync Basic 2013.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 67897
BID 67904
CVE CVE-2014-1817
CVE CVE-2014-1818
MSKB 2957503
MSKB 2957509
MSKB 2964736
MSKB 2965155
MSKB 2964718
MSKB 2878233
MSKB 2881069
MSKB 2863942
MSKB 2881071
MSKB 2963285
MSKB 2963282
MSKB 2963284
MSKB 2881013
MSKB 2965161
MSKB 2968966
XREF MSFT:MS14-036
XREF IAVA:2014-A-0080
Plugin Information
Plugin Output
tcp/445
KB : 2965161
- C:\Windows\system32\Fntcache.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.16662
76406 - MS14-037: Cumulative Security Update for Internet Explorer (2975687)
Synopsis
The remote host has a web browser that is affected by multiple vulnerabilities.
Description
The remote host is missing Internet Explorer (IE) Security Update 2975687.
The version of Internet Explorer installed on the remote host is affected by multiple vulnerabilities, the majority of
which are remote code execution vulnerabilities. An attacker could exploit these vulnerabilities by convincing a
user to visit a specially crafted web page.
See Also
https://www.securityfocus.com/archive/1/532797/30/0/threaded
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-037
https://www.zerodayinitiative.com/advisories/ZDI-14-217/
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 66200
BID 66244
BID 68369
BID 68371
BID 68372
BID 68373
BID 68374
BID 68375
BID 68376
BID 68377
BID 68378
BID 68379
BID 68380
BID 68381
BID 68382
BID 68383
BID 68384
BID 68385
BID 68386
BID 68387
BID 68388
BID 68389
BID 68390
BID 68391
BID 70103
CVE CVE-2014-1763
CVE CVE-2014-1765
CVE CVE-2014-2783
CVE CVE-2014-2785
CVE CVE-2014-2786
CVE CVE-2014-2787
CVE CVE-2014-2788
CVE CVE-2014-2789
CVE CVE-2014-2790
CVE CVE-2014-2791
CVE CVE-2014-2792
CVE CVE-2014-2794
CVE CVE-2014-2795
CVE CVE-2014-2797
CVE CVE-2014-2798
CVE CVE-2014-2800
CVE CVE-2014-2801
CVE CVE-2014-2802
CVE CVE-2014-2803
CVE CVE-2014-2804
192.168.100.4 210
CVE CVE-2014-2806
CVE CVE-2014-2807
CVE CVE-2014-2809
CVE CVE-2014-2813
CVE CVE-2014-4066
MSKB 2962872
MSKB 2963952
XREF MSFT:MS14-037
Plugin Information
Plugin Output
tcp/445
KB : 2963952
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.16672
192.168.100.4 21
76408 - MS14-039: Vulnerability in On-Screen Keyboard Could Allow Elevation of Privilege (2975685)
Synopsis
Description
A privilege escalation vulnerability exists on the remote Windows host due to improper handling of low integrity
processes with the On- Screen Keyboard (OSK). A local attacker could exploit this vulnerability to execute
arbitrary code on the remote host under the privileges of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-039
Solution
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
References
BID 68397
CVE CVE-2014-2781
MSKB 2973201
MSKB 2973906
XREF MSFT:MS14-039
XREF IAVA:2014-A-0096
Exploitable With
Plugin Output
tcp/445
KB : 2973906
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.16671
76409 - MS14-040: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege
(2975684)
Synopsis
The remote Windows host contains a driver that allows elevation of privilege.
Description
The remote Windows host contains a version of the Ancillary Function Driver (afd.sys) that is affected by a
privilege escalation vulnerability. The flaw is due to the Ancillary Function Driver not properly processing user-
supplied input, leading to a double free scenario, allowing a local attacker to elevate privileges by running a
specially crafted application.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-040
https://www.zerodayinitiative.com/advisories/ZDI-14-220/
Solution
Microsoft has released a set of patches for Windows 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8,
2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 68394
CVE CVE-2014-1767
MSKB 2973408
MSKB 2961072
XREF MSFT:MS14-040
Exploitable With
Plugin Output
tcp/445
KB : 2973408
- C:\Windows\system32\drivers\Afd.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.16668
77167 - MS14-049: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege
(2962490)
Synopsis
Description
A privilege escalation vulnerability exists on the remote Windows host due to improper handling of the repair
functionality in the Windows installer service. A local attacker could exploit this vulnerability to execute arbitrary
code on the remote host under the privileges of the system administrator.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-049
Solution
Microsoft has released a set of patches for 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 69112
CVE CVE-2014-1814
MSKB 2918614
XREF MSFT:MS14-049
Plugin Information
Plugin Output
tcp/445
KB : 2918614
- C:\Windows\system32\msi.dll has not been patched.
Remote version : 5.0.9600.16384
Should be : 5.0.9600.17198
77574 - MS14-054: Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege
(2988948)
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability. The vulnerability is due to improperly
conducted integrity checks on tasks by Windows Task Scheduler. An authenticated attacker can exploit this
vulnerability to execute arbitrary code in the context of the local system user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-054
Solution
Microsoft has released a set of patches for Windows 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 69593
CVE CVE-2014-4074
MSKB 2988948
XREF MSFT:MS14-054
Plugin Information
Plugin Output
tcp/445
KB : 2988948
- C:\Windows\system32\Schedsvc.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.17276
78433 - MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution
(3000061)
Synopsis
Description
- A privilege escalation vulnerability allows an attacker to run arbitrary code in kernel mode due to the kernel-
mode driver improperly handling objects in memory. (CVE-2014-4113)
- A remote code execution vulnerability allows a remote attacker to run arbitrary code in kernel mode due to the
kernel-mode driver improperly handling TrueType fonts.
An attacker can exploit this vulnerability by convincing a user to open a file or visit a website containing a
specially crafted TrueType font file. (CVE-2014-4148)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-058
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 70364
BID 70429
CVE CVE-2014-4113
CVE CVE-2014-4148
MSKB 3000061
XREF EDB-ID:35101
XREF MSFT:MS14-058
192.168.100.4 220
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3000061
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17353
192.168.100.4 22
78435 - MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability due to improperly handled OLE
objects. An attacker can exploit this vulnerability by convincing a user to open a file containing a specially crafted
OLE object, resulting in execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-060
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 70419
CVE CVE-2014-4114
MSKB 3000869
XREF EDB-ID:35019
XREF EDB-ID:35055
XREF MSFT:MS14-060
Exploitable With
Plugin Information
tcp/445
KB : 3000869
- C:\Windows\system32\packager.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17341
79125 - MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution (3011443)
Synopsis
Description
- A remote code execution vulnerability due to Internet Explorer improperly handling access to objects in
memory. A remote attacker can exploit this vulnerability by convincing a user to visit a specially crafted website
in Internet Explorer, resulting in execution of arbitrary code in the context of the current user.
(CVE-2014-6332)
- A remote code execution vulnerability due to a flaw in the OLE package manager. A remote attacker can
exploit this vulnerability by convincing a user to open an Office file containing specially crafted OLE objects,
resulting in execution of arbitrary code in the context of the current user. (CVE-2014-6352)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-064
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 70690
BID 70952
CVE CVE-2014-6332
CVE CVE-2014-6352
MSKB 3006226
MSKB 3010788
XREF CERT:158647
XREF EDB-ID:35229
XREF MSFT:MS14-064
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3010788
- C:\Windows\system32\packager.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17408
79311 - MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)
(ESKIMOROLL)
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability due to the Kerberos Key Distribution
Center (KDC) implementation not properly validating signatures. A remote attacker can exploit this vulnerability
to elevate an unprivileged domain user account to a domain administrator account.
ESKIMOROLL is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/14 by a group
known as the Shadow Brokers.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-068
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.8 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
I
References
BID 70958
CVE CVE-2014-6324
MSKB 3011780
XREF CERT:213119
XREF IAVA:2014-A-0180
XREF MSFT:MS14-068
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3011780
- C:\Windows\system32\kerberos.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.17423
79132 - MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege (3005210)
Synopsis
The version of the .NET Framework installed on the remote host is affected by a privilege elevation vulnerability.
Description
The remote Windows host has a version of the Microsoft .NET Framework that is affected by a vulnerability
related to how it handles TypeFilterLevel checks for some malformed objects. This can be used by a remote
attacker to gain privilege elevation via a specially crafted packet sent to a host that is using .NET Remoting.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-072
Solution
Microsoft has released a set of patches for .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, 4.5.1, and
4.5.2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 70979
CVE CVE-2014-4149
MSKB 2978114
MSKB 2978116
MSKB 2978120
MSKB 2978121
MSKB 2978122
MSKB 2978124
MSKB 2978125
MSKB 2978126
MSKB 2978127
MSKB 2978128
XREF MSFT:MS14-072
XREF IAVA:2014-A-0173
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a denial of service vulnerability due to the Windows kernel-mode driver
not properly validating array indexes when loading TrueType font files. An attacker can exploit this vulnerability
by convincing a user to open a file or visit a website containing a specially crafted TrueType font file, resulting in
a restart of the user's system.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-079
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 70949
CVE CVE-2014-6317
MSKB 3002885
XREF MSFT:MS14-079
Plugin Information
Plugin Output
tcp/445
192.168.100.4 230
KB : 3002885
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17393
192.168.100.4 23
80490 - MS15-001: Vulnerability in Windows Application Compatibility Cache Could Allow Elevation
of Privilege (3023266)
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability due to improper validation of the
authorization of a caller's impersonation token in the Microsoft Windows Application Compatibility Infrastructure
(AppCompat) component. A local attacker, with a specially crafted program, can bypass the authorization check
to create cache entries, resulting in an escalation of privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-001
Solution
Microsoft has released a set of patches for Windows 2008, 7, 2008 R2, 8, 8.1, 2012 and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 71972
CVE CVE-2015-0002
MSKB 3023266
XREF MSFT:MS15-001
Exploitable With
Metasploit (true)
Plugin Information
tcp/445
KB : 3023266
- C:\Windows\system32\drivers\ahcache.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17555
80492 - MS15-003: Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege
(3021674)
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability due to improper validation of user
privilege in the Windows User Profile Service (ProfSvc). A local attacker, with a specially crafted application, can
load registry hives associated with other user accounts to execute arbitrary code with elevated permissions.
See Also
https://support.microsoft.com/en-us/help/3021674/ms15-003-vulnerability-in-windows-user-profile-service-could-
allow-ele
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-003
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 71967
CVE CVE-2015-0004
MSKB 3021674
XREF MSFT:MS15-003
XREF IAVA:2015-A-0008
Plugin Information
Plugin Output
tcp/445
KB : 3021674
- C:\Windows\system32\profsvc.dll has not been patched.
Remote version : 6.3.9600.16425
Should be : 6.3.9600.17552
81262 - MS15-009: Security Update for Internet Explorer (3034682)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3034682. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An attacker can exploit these by convincing a user to visit a specially crafted web page.
Hosts running Internet Explorer 9, Internet Explorer 10, or Internet Explorer 11 will not be fully protected until
both security update 3021952 and security update 3034196 are applied to the system.
Security update 3034196 may require manual installation depending on your patching method.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-009
https://www.zerodayinitiative.com/advisories/ZDI-14-403/
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 71483
BID 72402
BID 72403
BID 72404
BID 72409
BID 72410
BID 72411
BID 72412
BID 72413
BID 72414
BID 72415
BID 72416
BID 72417
BID 72418
BID 72419
BID 72420
BID 72421
BID 72422
BID 72423
BID 72424
BID 72425
BID 72426
BID 72436
BID 72437
BID 72438
BID 72439
BID 72440
BID 72441
BID 72442
BID 72443
BID 72444
BID 72445
BID 72446
BID 72447
BID 72448
BID 72453
BID 72454
BID 72455
BID 72478
BID 72479
BID 72480
CVE CVE-2014-8967
CVE CVE-2015-0017
CVE CVE-2015-0018
CVE CVE-2015-0019
CVE CVE-2015-0020
CVE CVE-2015-0021
CVE CVE-2015-0022
CVE CVE-2015-0023
CVE CVE-2015-0025
CVE CVE-2015-0026
CVE CVE-2015-0027
CVE CVE-2015-0028
CVE CVE-2015-0029
CVE CVE-2015-0030
CVE CVE-2015-0031
CVE CVE-2015-0035
CVE CVE-2015-0036
CVE CVE-2015-0037
CVE CVE-2015-0038
CVE CVE-2015-0039
CVE CVE-2015-0040
CVE CVE-2015-0041
CVE CVE-2015-0042
CVE CVE-2015-0043
CVE CVE-2015-0044
CVE CVE-2015-0045
CVE CVE-2015-0046
CVE CVE-2015-0048
CVE CVE-2015-0049
CVE CVE-2015-0050
CVE CVE-2015-0051
CVE CVE-2015-0052
CVE CVE-2015-0053
CVE CVE-2015-0054
CVE CVE-2015-0055
CVE CVE-2015-0066
CVE CVE-2015-0067
CVE CVE-2015-0068
CVE CVE-2015-0069
CVE CVE-2015-0070
CVE CVE-2015-0071
MSKB 3021952
MSKB 3034196
XREF MSFT:MS15-009
Plugin Information
Plugin Output
tcp/445
KB : 3021952
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17631
KB : 3034196
- C:\Windows\system32\jscript9.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17640
81263 - MS15-010: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code
Execution (3036220)
Synopsis
Description
The remote Windows host is missing a security patch. It is, therefore, affected by the following vulnerabilities :
- A privilege escalation vulnerability exists in the Windows kernel-mode driver that is caused by improperly
handling objects in memory. (CVE-2015-0003, CVE-2015-0057)
- A security feature bypass vulnerability exists in the Cryptography Next Generation kernel-mode driver when
failing to properly validate and enforce impersonation levels. (CVE-2015-0010)
- A privilege escalation vulnerability exists in the Windows kernel-mode driver due to a double-free condition.
(CVE-2015-0058)
- A remote code execution vulnerability exists in the Windows kernel-mode driver that is caused when improperly
handling TrueType fonts. (CVE-2015-0059)
- A denial of service vulnerability exists in the Windows kernel-mode driver that is caused when the Windows
font mapper attempts to scale a font.
(CVE-2015-0060)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-010
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 72457
192.168.100.4 240
BID 72461
BID 72466
BID 72468
BID 72470
BID 72472
CVE CVE-2015-0003
CVE CVE-2015-0010
CVE CVE-2015-0057
CVE CVE-2015-0058
CVE CVE-2015-0059
CVE CVE-2015-0060
MSKB 3013455
MSKB 3023562
MSKB 3036220
XREF MSFT:MS15-010
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3013455
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17630
192.168.100.4 24
81264 - MS15-011: Vulnerability in Group Policy Could Allow Remote Code Execution (3000483)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability due to how the Group Policy
service manages policy data when a domain-joined system connects to a domain controller. An attacker, using a
controlled network, can exploit this to gain complete control of the host.
Note that Microsoft has no plans to release an update for Windows 2003 even though it is affected by this
vulnerability.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-011
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
References
BID 72477
CVE CVE-2015-0008
MSKB 3000483
XREF CERT:787252
XREF MSFT:MS15-011
XREF IAVA:2015-A-0033
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3000483
- C:\Windows\system32\gpsvc.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17630
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability due to improper validation of the
authorization of a caller's impersonation token when the caller's process uses SeAssignPrimaryTokenPrivilege.
A local attacker, using a specially crafted program, can bypass the authorization check, resulting in an escalation
of privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-015
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 72458
CVE CVE-2015-0062
MSKB 3031432
XREF MSFT:MS15-015
XREF IAVA:2015-A-0035
Plugin Information
tcp/445
KB : 3031432
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.17630
81733 - MS15-018: Cumulative Security Update for Internet Explorer (3032359)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3032359. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An attacker can exploit these by convincing a user to visit a specially crafted website.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-018
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 72489
BID 72910
BID 72923
BID 72924
BID 72925
BID 72926
BID 72927
BID 72928
BID 72929
BID 72930
BID 72931
BID 72932
CVE CVE-2015-0032
CVE CVE-2015-0056
CVE CVE-2015-0072
CVE CVE-2015-0099
CVE CVE-2015-0100
CVE CVE-2015-1622
CVE CVE-2015-1623
CVE CVE-2015-1624
CVE CVE-2015-1625
CVE CVE-2015-1626
CVE CVE-2015-1627
CVE CVE-2015-1634
MSKB 3032359
XREF MSFT:MS15-018
Plugin Information
Plugin Output
tcp/445
KB : 3032359
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17690
81735 - MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution
(3041836) (EASYHOOKUP)
Synopsis
The remote Windows host is affected by multiple remote code execution vulnerabilities.
Description
The remote Windows host is missing a security update. It is, therefore, affected by the following vulnerabilities :
- A remote code execution vulnerability exists in Windows Text Services due to improper handling of objects in
memory. A remote attacker can exploit this vulnerability by convincing a user to visit a specially crafted website
or open a specially crafted file, resulting in the execution of arbitrary code. (CVE-2015-0059)
- A remote code execution vulnerability exists due to improper loading of DLL files. A remote attacker can exploit
this vulnerability by convincing a user to visit a specially crafted website or remote network share, resulting in the
execution of arbitrary code.
(CVE-2015-0096) (EASYHOOKUP)
EASYHOOKUP is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/14 by a
group known as the Shadow Brokers.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-020
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 72886
BID 72894
CVE CVE-2015-0081
CVE CVE-2015-0096
MSKB 3033889
MSKB 3039066
XREF MSFT:MS15-020
XREF IAVA:2015-A-0053
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3033889
- C:\Windows\system32\msctf.dll has not been patched.
Remote version : 6.3.9600.16418
Should be : 6.3.9600.17664
81736 - MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution
(3032323)
Synopsis
The Adobe Font driver on the remote host is affected by multiple vulnerabilities.
Description
The remote Windows host is affected by the following vulnerabilities in the Adobe Font driver :
- A flaw exists in the Adobe Font Driver due to improper allocation of memory. This allows a remote attacker,
using a specially crafted font in a file or website, to cause a denial of service. (CVE-2015-0074)
- Multiple flaws exist in the Adobe Font Driver that allow a remote attacker, using specially crafted fonts, to obtain
sensitive information from kernel memory.
(CVE-2015-0087, CVE-2015-0089)
- Multiple flaws exist in the Adobe Font Driver due to improper validation of user-supplied input. A remote
attacker can exploit this, using a specially crafted font in a file or website, to execute arbitrary code.
(CVE-2015-0088, CVE-2015-0090, CVE-2015-0091, CVE-2015-0092, CVE-2015-0093)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-021
Solution
Microsoft has released a set of patches for 2003, Vista, 2008, 7, 2008 R2, 8, Windows RT, 2012, 8.1, Windows
RT 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 72892
BID 72893
BID 72896
BID 72898
192.168.100.4 250
BID 72904
BID 72905
BID 72906
BID 72907
CVE CVE-2015-0074
CVE CVE-2015-0087
CVE CVE-2015-0088
CVE CVE-2015-0089
CVE CVE-2015-0090
CVE CVE-2015-0091
CVE CVE-2015-0092
CVE CVE-2015-0093
MSKB 3032323
XREF MSFT:MS15-021
Plugin Information
Plugin Output
tcp/445
KB : 3032323
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.241
192.168.100.4 25
81739 - MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (3038680)
Synopsis
Description
- An elevation of privilege vulnerability exists due to Windows Registry Virtualization improperly allowing
a user to modify the virtual store of another user. A local attacker, with a specially crafted application, can
exploit this vulnerability to take control of the account of another user who is logged on to the affected system.
(CVE-2015-0073)
- An elevation of privilege vulnerability exists due to a failure to properly validate and enforce impersonation
levels. A local attacker, with a specially crafted application, can exploit this vulnerability to bypass user account
checks. (CVE-2015-0075)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-025
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
KB3035131 (MS15-025) has affected binaries in common with Security Advisory 3033929, which was released
simultaneously. If you download and install updates manually, you should first install KB3035131 (MS15-025)
before installing KB3033929. See the MS15-025 bulletin Update FAQ for more information.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 72908
BID 72915
CVE CVE-2015-0073
CVE CVE-2015-0075
MSKB 3038680
MSKB 3035131
MSKB 3033929
MSKB 3033395
XREF MSFT:MS15-025
XREF IAVA:2015-A-0048
Plugin Information
Plugin Output
tcp/445
KB : 3035131
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.17668
81742 - MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass
(3030377)
Synopsis
Description
The remote Windows host is affected by a security bypass vulnerability due to Windows Task Scheduler not
properly validating and enforcing impersonation levels. Attackers can exploit this flaw to elevate privileges in
order to execute files they have no permission to run.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-028
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 72913
CVE CVE-2015-0084
MSKB 3030377
XREF MSFT:MS15-028
XREF IAVB:2015-B-0037
Plugin Information
tcp/445
KB : 3030377
- C:\Windows\system32\ubpm.dll has not been patched.
Remote version : 6.3.9600.16469
Should be : 6.3.9600.17671
82770 - MS15-032: Cumulative Security Update for Internet Explorer (3038314)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3038314. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website.
Note that KB3038314 was updated on April 22, 2015, for Internet Explorer for Windows Server 2003. If this
update was installed prior to April 22, it will need to be reinstalled to be fully protected.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-032
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 73990
BID 73993
BID 73994
BID 73996
BID 73997
BID 74000
BID 74001
BID 74003
BID 74004
BID 74006
CVE CVE-2015-1652
CVE CVE-2015-1657
CVE CVE-2015-1659
CVE CVE-2015-1660
CVE CVE-2015-1661
CVE CVE-2015-1662
CVE CVE-2015-1665
CVE CVE-2015-1666
CVE CVE-2015-1667
CVE CVE-2015-1668
MSKB 3038314
XREF MSFT:MS15-032
Plugin Information
Plugin Output
tcp/445
KB : 3038314
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17728
82774 - MS15-038: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege (3049576)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple privilege escalation
vulnerabilities :
- A elevation of privilege vulnerability exists due to NtCreateTransactionManager type confusion that allows an
authenticated attacker to bypass impersonation-level security checks by running a specially crafted application.
(CVE-2015-1643)
- A elevation of privilege vulnerability exists due to a MS-DOS device name handling flaw that allows an
authenticated attacker to bypass impersonation-level security checks by running a specially crafted application.
(CVE-2015-1644)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-038
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 73998
BID 74014
CVE CVE-2015-1643
CVE CVE-2015-1644
MSKB 3045685
MSKB 3045999
XREF MSFT:MS15-038
XREF IAVA:2015-A-0091
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3045999
- C:\Windows\system32\ntdll.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.17736
83358 - MS15-043: Cumulative Security Update for Internet Explorer (3049563)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3049563. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-043
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 74504
BID 74505
BID 74506
BID 74507
BID 74508
BID 74509
BID 74510
BID 74511
BID 74512
BID 74513
BID 74514
BID 74515
BID 74516
192.168.100.4 260
BID 74517
BID 74518
BID 74519
BID 74520
BID 74521
BID 74522
BID 74530
BID 74606
BID 74607
CVE CVE-2015-1658
CVE CVE-2015-1684
CVE CVE-2015-1685
CVE CVE-2015-1686
CVE CVE-2015-1688
CVE CVE-2015-1689
CVE CVE-2015-1691
CVE CVE-2015-1692
CVE CVE-2015-1694
CVE CVE-2015-1703
CVE CVE-2015-1704
CVE CVE-2015-1705
CVE CVE-2015-1706
CVE CVE-2015-1708
CVE CVE-2015-1709
CVE CVE-2015-1710
CVE CVE-2015-1711
CVE CVE-2015-1712
CVE CVE-2015-1713
CVE CVE-2015-1714
CVE CVE-2015-1717
CVE CVE-2015-1718
MSKB 3049563
XREF MSFT:MS15-043
Plugin Information
Plugin Output
tcp/445
KB : 3049563
192.168.100.4 26
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17801
83440 - MS15-044: Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution
(3057110)
Synopsis
Description
- An information disclosure vulnerability exists due to improper handling of OpenType fonts by the Windows
DirectWrite library. A remote attacker can exploit this vulnerability by convincing a user to open a file or visit
a website containing a specially crafted OpenType font, resulting in the disclosure of sensitive information.
(CVE-2015-1670)
- A remote code execution vulnerability exists due to improper handling of TrueType font files by the Windows
DirectWrite library. A remote attacker can exploit this vulnerability by convincing a user to open a specially
crafted document or visit a website containing a specially crafted TrueType font file, resulting in execution of
arbitrary code in the context of the current user. (CVE-2015-1671)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-044
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Live Meeting 2007 Console,
Lync 2010, Lync 2010 Attendee, Lync 2013, Lync Basic 2013; and .NET Framework 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1,
and 4.5.2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 74485
BID 74490
CVE CVE-2015-1670
CVE CVE-2015-1671
MSKB 3048068
MSKB 3048070
MSKB 3048071
MSKB 3048072
MSKB 3048073
MSKB 3048074
MSKB 3048077
MSKB 3045171
MSKB 3065979
MSKB 2883029
MSKB 2881073
MSKB 3051467
MSKB 3051464
MSKB 3051465
MSKB 3051466
MSKB 3039779
MSKB 3056819
XREF MSFT:MS15-044
Plugin Information
Plugin Output
tcp/445
KB : 3045171
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17796
83356 - MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134)
Synopsis
The version of the .NET Framework installed on the remote host is affected by multiple vulnerabilities.
Description
The remote Windows host is running a version of the Microsoft .NET Framework that is affected by multiple
vulnerabilities :
- A denial of service vulnerability exists in the Microsoft .NET Framework due to a recursion flaw that occurs
when decrypting XML data. A remote attacker can exploit this, via specially crafted XML data, to degrade the
performance of a .NET website. (CVE-2015-1672)
- A privilege escalation vulnerability exists in the Microsoft .NET Framework due to improper handling of objects
in memory by .NET's Windows Forms (WinForms) libraries. A remote attacker can exploit this, via a specially
crafted partial trust application, to escalate privileges. (CVE-2015-1673)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-048
Solution
Microsoft has released a set of patches for .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, 4.5.1, and
4.5.2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 74482
BID 74487
CVE CVE-2015-1672
CVE CVE-2015-1673
MSKB 3023211
MSKB 3023213
MSKB 3023215
MSKB 3023217
MSKB 3023219
MSKB 3023220
MSKB 3023221
MSKB 3023222
MSKB 3023223
MSKB 3023224
MSKB 3032655
MSKB 3032662
MSKB 3032663
MSKB 3035485
MSKB 3035486
MSKB 3035487
MSKB 3035488
MSKB 3035489
MSKB 3035490
XREF MSFT:MS15-048
XREF IAVA:2015-A-0105
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability in Windows Service Control Manager
(SCM) due to improper verification of impersonation levels. A local attacker can exploit this, via a specially
crafted application, to escalate their privileges and make calls to SCM for which they lack sufficient privilege.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-050
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 74492
CVE CVE-2015-1702
MSKB 3055642
XREF MSFT:MS15-050
XREF IAVA:2015-A-0107
Plugin Information
tcp/445
KB : 3055642
- C:\Windows\system32\services.exe has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17793
83370 - MS15-051: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege (3057191)
Synopsis
Description
The version of Windows running on the remote host is affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist due to the Win32k.sys kernel-mode driver improperly
handling objects in memory. A local attacker can exploit this to reveal private address information during
a function call, resulting in the disclosure of kernel memory contents. (CVE-2015-1676, CVE-2015-1677,
CVE-2015-1678, CVE-2015-1679, CVE-2015-1680)
- A privilege escalation vulnerability exists due to the Win32k.sys kernel-mode driver improperly handling objects
in memory. A local attacker can exploit this flaw, via a specially crafted application, to execute arbitrary code in
kernel mode. This vulnerability is reportedly being exploited in the wild. (CVE-2015-1701)
See Also
http://www.nessus.org/u?37b0306c
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-051
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 74245
BID 74483
BID 74494
BID 74495
BID 74496
BID 74497
CVE CVE-2015-1676
CVE CVE-2015-1677
CVE CVE-2015-1678
CVE CVE-2015-1679
CVE CVE-2015-1680
CVE CVE-2015-1701
MSKB 3045171
MSKB 3057191
MSKB 3065979
XREF MSFT:MS15-051
XREF IAVA:2015-A-0108
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3045171
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17796
192.168.100.4 270
84053 - MS15-056: Cumulative Security Update for Internet Explorer (3058515)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3058515. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website.
Note that the majority of the vulnerabilities addressed by Cumulative Security Update 3058515 are mitigated by
the Enhanced Security Configuration (ESC) mode which is enabled by default on Windows Server 2003, 2008,
2008 R2, 2012, and 2012 R2.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-056
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 74972
BID 74973
BID 74974
BID 74975
BID 74976
BID 74978
BID 74979
BID 74981
BID 74982
BID 74983
192.168.100.4 27
BID 74984
BID 74985
BID 74986
BID 74987
BID 74988
BID 74989
BID 74990
BID 74991
BID 74992
BID 74993
BID 74994
BID 74995
BID 74996
BID 74997
BID 75182
CVE CVE-2015-1687
CVE CVE-2015-1730
CVE CVE-2015-1731
CVE CVE-2015-1732
CVE CVE-2015-1735
CVE CVE-2015-1736
CVE CVE-2015-1737
CVE CVE-2015-1739
CVE CVE-2015-1740
CVE CVE-2015-1741
CVE CVE-2015-1742
CVE CVE-2015-1743
CVE CVE-2015-1744
CVE CVE-2015-1745
CVE CVE-2015-1747
CVE CVE-2015-1748
CVE CVE-2015-1750
CVE CVE-2015-1751
CVE CVE-2015-1752
CVE CVE-2015-1753
CVE CVE-2015-1754
CVE CVE-2015-1755
CVE CVE-2015-1765
CVE CVE-2015-1766
MSKB 3058515
XREF MSFT:MS15-056
Plugin Information
Published: 2015/06/09, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3058515
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17842
84056 - MS15-060: Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution
(3059317)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability due to a user-after-free error
in Microsoft Common Controls. A remote attacker can exploit this vulnerability by convincing a user to click a
specially crafted link, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-060
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 75017
CVE CVE-2015-1756
MSKB 3059317
XREF MSFT:MS15-060
XREF IAVA:2015-A-0125
Plugin Information
tcp/445
KB : 3059317
None of the versions of 'comctl32.dll' under C:\Windows\WinSxS
have been patched.
Fixed version : 5.82.9600.17810
84059 - MS15-061: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege (3057839)
Synopsis
Description
- An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling
of buffer elements. A local attacker can exploit this vulnerability to request the contents of specific memory
addresses. (CVE-2015-1719)
- An elevation of privilege vulnerability exists in the Windows kernel-mode driver due to a user-after-free error. A
remote attacker can exploit this vulnerability by convincing a user to run a specially crafted application, resulting
in the execution of arbitrary code in kernel mode. (CVE-2015-1720)
- A elevation of privilege vulnerability exists in the Windows kernel-mode driver due to a NULL pointer
dereference flaw. A remote attacker can exploit this vulnerability by convincing a user to run a specially crafted
application, resulting in the execution of arbitrary code in kernel mode. (CVE-2015-1721)
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to
escalate privileges to full administrative rights.
(CVE-2015-1722, CVE-2015-1723, CVE-2015-1724, CVE-2015-1726)
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improperly
validated user-supplied input. A local attacker can exploit these vulnerabilities, with a specially crafted
application, to escalate privileges to full administrative rights. (CVE-2015-1725, CVE-2015-1727)
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due a failure to properly
free memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to execute
arbitrary code in the context of another user. (CVE-2015-1725, CVE-2015-1727)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-061
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.7 (CVSS2#E:F/RL:OF/RC:C)
References
BID 74998
BID 74999
BID 75000
BID 75005
BID 75006
BID 75008
BID 75009
BID 75010
BID 75012
BID 75024
BID 75025
CVE CVE-2015-1719
CVE CVE-2015-1720
CVE CVE-2015-1721
CVE CVE-2015-1722
CVE CVE-2015-1723
CVE CVE-2015-1724
CVE CVE-2015-1725
CVE CVE-2015-1726
CVE CVE-2015-1727
CVE CVE-2015-1768
CVE CVE-2015-2360
MSKB 3057839
XREF MSFT:MS15-061
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3057839
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17837
84761 - MS15-065: Cumulative Security Update for Internet Explorer (3076321)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3076321. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website.
Hosts running Internet Explorer 10 or Internet Explorer 11 will not be fully protected until both security update
3065822 and security update 3075516 are applied to the system. Security update 3075516 may require manual
installation depending on your patching method.
Note that the majority of the vulnerabilities addressed by Cumulative Security Update 3076321 are mitigated by
the Enhanced Security Configuration (ESC) mode which is enabled by default on Windows Server 2003, 2008,
2008 R2, 2012, and 2012 R2.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-065
Solution
Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 75626
BID 75631
BID 75636
BID 75677
BID 75679
BID 75687
BID 75689
BID 75690
BID 75745
CVE CVE-2015-1729
CVE CVE-2015-1733
CVE CVE-2015-1738
CVE CVE-2015-1767
CVE CVE-2015-2372
CVE CVE-2015-2383
CVE CVE-2015-2384
CVE CVE-2015-2385
CVE CVE-2015-2388
CVE CVE-2015-2389
CVE CVE-2015-2390
CVE CVE-2015-2391
CVE CVE-2015-2397
CVE CVE-2015-2398
CVE CVE-2015-2401
CVE CVE-2015-2402
CVE CVE-2015-2403
CVE CVE-2015-2404
CVE CVE-2015-2406
CVE CVE-2015-2408
CVE CVE-2015-2410
CVE CVE-2015-2411
CVE CVE-2015-2412
CVE CVE-2015-2413
CVE CVE-2015-2414
CVE CVE-2015-2419
CVE CVE-2015-2421
CVE CVE-2015-2422
CVE CVE-2015-2425
MSKB 3065822
MSKB 3075516
XREF MSFT:MS15-065
Plugin Information
Plugin Output
tcp/445
192.168.100.4 280
KB : 3065822
- C:\Windows\system32\Mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17905
KB : 3075516
- C:\Windows\system32\jscript9.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.17923
192.168.100.4 28
84762 - MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution
(3072000)
Synopsis
The remote Windows host is affected by multiple remote code execution vulnerabilities.
Description
The remote Windows host is affected by multiple remote code execution vulnerabilities in Hyper-V :
- An error exists in how Hyper-V handles packet size memory initialization in guest virtual machines. An
authenticated attacker with access to a guest virtual machine can exploit this by running a specially crafted
application to execute arbitrary code in a host context.
(CVE-2015-2361)
- An error exists in how Hyper-V initializes system data structures in guest virtual machines. An authenticated
attacker with access to a guest virtual machine can exploit this by running a specially crafted application to
execute arbitrary code in a host context.
(CVE-2015-2362)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-068
Solution
Microsoft has released a set of patches for Windows 2008, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
CVE CVE-2015-2361
CVE CVE-2015-2362
MSKB 3046339
MSKB 3046359
XREF MSFT:MS15-068
XREF IAVB:2015-B-0091
Plugin Information
Plugin Output
tcp/445
KB : 3046359
- C:\Windows\system32\drivers\storvsp.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17723
84734 - MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution (3072631)
Synopsis
The remote Windows host is affected by multiple remote code execution vulnerabilities.
Description
The remote Windows host is affected by multiple remote code execution vulnerabilities :
- A remote code execution vulnerability exists due to improper handling of the loading of dynamic link library
(DLL) files. A remote attacker can exploit this vulnerability by placing a specially crafted DLL file in a user's
current working directory and then convincing the user to launch a program designed to load the DLL, resulting
in the execution of arbitrary code in the context of the current user. (CVE-2015-2368)
- A remote code execution vulnerability exists in Microsoft Windows Media Device Manager due to improper
handling of the loading of dynamic link library (DLL) files. A remote attacker can exploit this vulnerability by
placing a specially crafted DLL file in a user's current working directory and then convincing the user to open
a specially crafted .RTF file, resulting in the execution of arbitrary code in the context of the current user.
(CVE-2015-2369)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-069
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
CVE CVE-2015-2368
CVE CVE-2015-2369
MSKB 3072631
MSKB 3067903
MSKB 3070738
MSKB 3061512
XREF MSFT:MS15-069
XREF IAVA:2015-A-0167
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability due to improper processing of bitmap
conversions in the Windows graphics component. An authenticated attacker can exploit this, via a specially
crafted application, to gain administrative privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-072
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2015-2364
MSKB 3069392
XREF MSFT:MS15-072
Plugin Information
Plugin Output
tcp/445
KB : 3069392
- C:\Windows\system32\gdi32.dll has not been patched.
Remote version : 6.3.9600.16421
Should be : 6.3.9600.17902
84747 - MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege
(3070102)
Synopsis
Description
- Multiple privilege escalation vulnerabilities exist in the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to
elevate privileges to full administrative rights.
(CVE-2015-2363, CVE-2015-2365, CVE-2015-2366)
- An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling of
non-initialized values in memory. An attacker can exploit this vulnerability, with a specially crafted application,
to leak memory addresses or other sensitive kernel information that can be used for further exploitation of the
system. (CVE-2015-2367)
- An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling
of private address information during a function call. An attacker can exploit this vulnerability, with a specially
crafted application, to request the contents of specific memory addresses. (CVE-2015-2381, CVE-2015-2382)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-073
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1,
and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
CVE CVE-2015-2363
CVE CVE-2015-2365
CVE CVE-2015-2366
CVE CVE-2015-2367
CVE CVE-2015-2381
CVE CVE-2015-2382
MSKB 3070102
XREF MSFT:MS15-073
XREF IAVA:2015-A-0162
Plugin Information
Plugin Output
tcp/445
KB : 3070102
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17915
84748 - MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of
Privilege (3067505)
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability in the Microsoft Remote Procedure
Call (RPC) due to incorrectly allowing DCE/RPC connection reflection. A remote, authenticated attacker can
exploit this vulnerability, with a specially crafted application, to elevate privileges.
Note that in order to exploit this issue, an attacker would first have to log onto the system.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-076
https://code.google.com/p/google-security-research/issues/detail?id=325
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.0 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
CVE CVE-2015-2370
MSKB 3067505
XREF MSFT:MS15-076
XREF IAVA:2015-A-0165
192.168.100.4 290
Plugin Information
Plugin Output
tcp/445
KB : 3067505
- C:\Windows\system32\Rpcrt4.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17919
192.168.100.4 29
84746 - MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657)
Synopsis
The Adobe Font driver on the remote host is affected by a privilege escalation vulnerability.
Description
The remote Windows host is affected by a privilege escalation vulnerability in the Adobe Type Manager Font
Driver (ATMFD) due to a failure to properly handle objects in memory. A local attacker can exploit this by running
a specially crafted application, resulting in arbitrary code execution with elevated privileges.
See Also
https://twitter.com/hackerfantastic/status/618104999785156608
http://www.nessus.org/u?f3f38e4f
https://code.google.com/p/google-security-research/issues/detail?id=473
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-077
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1,
and 2012 R2.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2015-2387
MSKB 3077657
XREF MSFT:MS15-077
Exploitable With
CANVAS (true)
Plugin Information
Published: 2015/07/14, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3077657
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.242
84882 - MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution
(3079904)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability in the Adobe Type Manager
Library due to improper handling of OpenType fonts. A remote attacker can exploit this vulnerability by
convincing a user to open a document or visit a website containing specially crafted OpenType fonts, resulting in
the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-078
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 75951
CVE CVE-2015-2426
MSKB 3079904
XREF MSFT:MS15-078
Exploitable With
Plugin Information
Published: 2015/07/20, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3079904
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.243
85348 - MS15-080 : Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code
Execution (3078662)
Synopsis
Description
- Multiple remote code execution vulnerabilities exist due to the Windows Adobe Type Manager Library not
properly handling specially crafted OpenType fonts. An attacker can exploit these, by using a crafted document
or web page with embedded OpenType fonts, to execute arbitrary code in the context of the current user.
(CVE-2015-2432, CVE-2015-2458, CVE-2015-2459, CVE-2015-2460, CVE-2015-2461, CVE-2015-2462)
- Multiple remote code execution vulnerabilities exist in various components of Windows, .NET Framework,
Office, Lync, and Silverlight due to a failure to properly handle TrueType fonts. An attacker can exploit these, by
using a crafted document or web page with embedded TrueType fonts, to execute arbitrary code in the context
of the current user. (CVE-2015-2435, CVE-2015-2455, CVE-2015-2456 CVE-2015-2463, CVE-2015-2464)
- A remote code execution vulnerability exists due to Microsoft Office not properly handling Office Graphics
Library (OGL) fonts. An attacker can exploit this, by using a crafted document or web page with embedded OGL
fonts, to execute arbitrary code in the context of the user. (CVE-2015-2431)
- A security feature bypass vulnerability exists due to a failure by the Windows kernel to properly initialize
a memory address. An attacker, using a specially crafted application, can exploit this issue to bypass
Kernel Address Space Layout Randomization (KASLR) and retrieve the base address of the kernel driver.
(CVE-2015-2433)
- An elevation of privilege vulnerability exists due to a flaw in the Windows Client/Server Run-time Subsystem
(CSRSS) when terminating a process when a user logs off.
An attacker can exploit this vulnerability to run code that monitors the actions of users who log on to the system,
allowing the disclosure of sensitive information which could be used to elevate privileges or execute code.
(CVE-2015-2453)
- A security feature bypass vulnerability exists due to the Windows kernel-mode driver not properly validating
and enforcing impersonation levels. An attacker can exploit this to gain elevated privileges on a targeted system.
(CVE-2015-2454)
- A security feature bypass vulnerability exists due to the Windows shell not properly validating and enforcing
impersonation levels. An attacker can exploit this to bypass impersonation-level security and gain elevated
privileges on a targeted system. (CVE-2015-2465)
See Also
https://technet.microsoft.com/library/security/MS15-080
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10. Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Microsoft Lync 2010,
2010 Attendee, 2013 SP1, Microsoft Live Meeting 2007; and .NET Framework 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2,
and 4.6.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 76203
BID 76207
BID 76209
BID 76210
BID 76211
BID 76213
BID 76215
BID 76216
BID 76218
BID 76223
BID 76225
BID 76235
BID 76238
BID 76239
BID 76240
BID 76241
CVE CVE-2015-2432
CVE CVE-2015-2458
CVE CVE-2015-2459
CVE CVE-2015-2460
CVE CVE-2015-2461
CVE CVE-2015-2462
CVE CVE-2015-2435
CVE CVE-2015-2455
CVE CVE-2015-2456
CVE CVE-2015-2463
CVE CVE-2015-2464
CVE CVE-2015-2431
CVE CVE-2015-2433
CVE CVE-2015-2453
CVE CVE-2015-2454
CVE CVE-2015-2465
MSKB 3054846
MSKB 3054890
MSKB 3055014
MSKB 3072303
MSKB 3072305
MSKB 3072306
MSKB 3072307
MSKB 3072309
MSKB 3072310
MSKB 3072311
MSKB 3075590
MSKB 3075591
MSKB 3075592
MSKB 3075593
MSKB 3078601
MSKB 3080333
MSKB 3081436
XREF MSFT:MS15-080
XREF IAVA:2015-A-0196
Exploitable With
Metasploit (true)
Plugin Information
Plugin Output
tcp/445
KB : 3078601
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.245
85330 - MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege (3082487)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Mount Manager component
due to improper processing of symbolic links. A local attacker can exploit this vulnerability by inserting a
malicious USB device into a user's system, allowing the writing of a malicious binary to disk and the execution of
arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-085
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 76222
CVE CVE-2015-1769
MSKB 3082487
MSKB 3071756
XREF MSFT:MS15-085
XREF IAVA:2015-A-0192
Plugin Information
Plugin Output
tcp/445
KB : 3071756
- C:\Windows\system32\ntdll.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.17936
85877 - MS15-097: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code
Execution (3089656)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists in the Windows Adobe Type Manager Library due to improper
handling of specially crafted OpenType fonts. An authenticated, remote attacker can exploit this vulnerability, via
a specially crafted application, to elevate privileges and execute arbitrary code.
(CVE-2015-2506)
- Multiple elevation of privilege vulnerabilities exist in the Windows Adobe Type Manager Library due to
improper handling of objects in memory. A local attacker can exploit these vulnerabilities, via a specially crafted
application, to execute arbitrary code. (CVE-2015-2507, CVE-2015-2508, CVE-2015-2512)
- A remote code execution vulnerability exists in components of Windows, Office, and Lync due to improper
handling of specially crafted OpenType fonts. An unauthenticated, remote attacker can exploit this vulnerability
by convincing a user to open a file or visit a website containing specially crafted OpenType fonts, resulting in
execution of arbitrary code in the context of the current user. (CVE-2015-2510)
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these vulnerabilities, via a specially crafted application, to
execute arbitrary code in kernel mode. (CVE-2015-2511, CVE-2015-2517, CVE-2015-2518, CVE-2015-2546)
- An elevation of privilege vulnerability exists in the Windows kernel-mode driver due to improper validation and
enforcement of integrity levels during certain process initialization scenarios. A local attacker can exploit this
vulnerability, via a specially crafted application, to execute arbitrary code in kernel mode.
(CVE-2015-2527)
- A security feature bypass vulnerability exists due to a failure by the Windows kernel to properly initialize a
memory address. A local attacker can exploit this, via a specially crafted application, to bypass Kernel Address
Space Layout Randomization (KASLR) and retrieve the base address of the kernel driver. (CVE-2015-2529)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-097
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10. Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Lync 2010, Lync 2010
Attendee, Lync 2013 (Skype for Business), Lync Basic 2013, and Live Meeting 2007.
Risk Factor
High
CVSS Base Score
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 76563
BID 76589
BID 76591
BID 76592
BID 76593
BID 76597
BID 76599
BID 76602
BID 76606
BID 76607
BID 76608
CVE CVE-2015-2506
CVE CVE-2015-2507
CVE CVE-2015-2508
CVE CVE-2015-2510
CVE CVE-2015-2511
CVE CVE-2015-2512
CVE CVE-2015-2517
CVE CVE-2015-2518
CVE CVE-2015-2527
CVE CVE-2015-2529
CVE CVE-2015-2546
MSKB 3085529
MSKB 3085546
MSKB 3085500
MSKB 3081087
MSKB 3081088
MSKB 3081089
MSKB 3081090
MSKB 3087039
MSKB 3087135
MSKB 3081455
XREF MSFT:MS15-097
XREF IAVA:2015-A-0212
Plugin Information
Plugin Output
tcp/445
KB : 3087039
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.246
85847 - MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3089662)
Synopsis
The version of the .NET Framework installed on the remote host is affected by multiple vulnerabilities.
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities in the
Microsoft .NET Framework :
- An elevation of privilege vulnerability exists due to improper validation of the number of objects in memory
before they are copied into an array. A remote, unauthenticated attacker can exploit this to bypass Code Access
Security (CAS) restrictions by convincing a user to run an untrusted .NET application or to visit a website
containing a malicious XAML browser application.
(CVE-2015-2504)
- A denial of service vulnerability exists due to improper handling of specially crafted requests to an ASP .NET
server. A remote, unauthenticated attacker can exploit this to degrade performance. (CVE-2015-2526)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-101
Solution
Microsoft has released a set of patches for .NET Framework 2.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 76560
BID 76567
CVE CVE-2015-2504
CVE CVE-2015-2526
MSKB 3074228
MSKB 3074229
MSKB 3074230
MSKB 3074231
MSKB 3074232
MSKB 3074233
MSKB 3074541
MSKB 3074543
MSKB 3074544
MSKB 3074545
MSKB 3074547
MSKB 3074548
MSKB 3074549
MSKB 3074550
MSKB 3074552
MSKB 3074553
MSKB 3074554
MSKB 3081455
XREF MSFT:MS15-101
XREF IAVA:2015-A-0213
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by multiple elevation of privilege vulnerabilities in Windows Task
Management :
- An elevation of privilege vulnerability exists due to a failure to properly validate and enforce impersonation
levels. An authenticated, remote attacker can exploit this, via a specially crafted application, to bypass
impersonation-level security checks and gain elevated privileges. (CVE-2015-2524)
- An elevation of privilege vulnerability exists in Windows Task Scheduler due to improper verification of certain
file system interactions. An authenticated, remote attacker can exploit this, via a specially crafted application, to
execute arbitrary code in the security context of the local system. (CVE-2015-2525)
- An elevation of privilege vulnerability exists due to a failure to properly validate and enforce impersonation
levels. An authenticated, remote attacker can exploit this, via a specially crafted application, to bypass
impersonation-level security checks and gain elevated privileges. CVE-2015-2528)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-102
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, 2012 R2, 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.4 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 76587
BID 76590
BID 76653
CVE CVE-2015-2524
CVE CVE-2015-2525
CVE CVE-2015-2528
MSKB 3084135
MSKB 3082089
MSKB 3081455
XREF MSFT:MS15-102
XREF IAVA:2015-A-0215
Exploitable With
CANVAS (true)
Plugin Information
Plugin Output
tcp/445
KB : 3084135
- C:\Windows\system32\schedsvc.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.18001
86366 - MS15-109: Security Update for Windows Shell to Address Remote Code Execution (3096443)
Synopsis
Description
- A remote code execution vulnerability exists in the Windows shell due to improper handling of objects in
memory. A remote attacker can exploit this vulnerability by convincing a user to open a specially crafted toolbar
object, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-2515)
- A privilege escalation vulnerability exists in the Microsoft Tablet Input Band due to improper handling of objects
in memory. A remote attacker can exploit this vulnerability to gain the same user rights as the current user by
convincing a user to visit a specially crafted website. (CVE-2015-2548)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-109
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 76981
BID 76989
CVE CVE-2015-2515
CVE CVE-2015-2548
MSKB 3080446
MSKB 3096443
MSKB 3093513
MSKB 3097617
XREF MSFT:MS15-109
XREF IAVA:2015-A-0245
Plugin Information
Plugin Output
tcp/445
KB : 3080446
- C:\Windows\system32\shell32.dll has not been patched.
Remote version : 6.3.9600.16660
Should be : 6.3.9600.18038
86373 - MS15-111: Security Update for Windows Kernel to Address Elevation of Privilege (3096447)
Synopsis
Description
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel due to improper handling of objects in
memory. A local attacker can exploit these vulnerabilities, via a specially crafted application, to execute arbitrary
code in kernel mode. (CVE-2015-2549, CVE-2015-2550, CVE-2015-2554)
- A security feature bypass vulnerability exists due to a failure to properly enforce the Windows Trusted Boot
policy. A local attacker can exploit this, via a specially crafted Boot Configuration Data (BCD) setting, to disable
code integrity checks, resulting in the execution of test-signed executables and drivers.
Additionally, a local attacker can exploit this vulnerability to bypass Trusted Boot integrity validation for BitLocker
and Device Encryption security features. (CVE-2015-2552)
- An elevation of privilege vulnerability exists due to improper validation of junctions in certain scenarios in which
mount points are being created. An unauthenticated, remote attacker can exploit this in conjunction with another
vulnerability to execute arbitrary code in the context of the current user.
(CVE-2015-2553)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-111
https://support.microsoft.com/en-us/help/3096447/ms15-111-security-update-for-windows-kernel-to-address-
elevation-of-pr
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.8 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
192.168.100.4 310
II
References
BID 76994
BID 76998
BID 76999
BID 77004
BID 77014
CVE CVE-2015-2549
CVE CVE-2015-2550
CVE CVE-2015-2552
CVE CVE-2015-2553
CVE CVE-2015-2554
MSKB 3088195
MSKB 3097617
XREF MSFT:MS15-111
XREF IAVA:2015-A-0242
Plugin Information
Plugin Output
tcp/445
KB : 3088195
- C:\Windows\system32\winload.exe has not been patched.
Remote version : 6.3.9600.16496
Should be : 6.3.9600.18066
192.168.100.4 31
86822 - MS15-115: Security Update for Microsoft Windows to Address Remote Code Execution
(3105864)
Synopsis
Description
- Multiple elevation of privilege vulnerabilities exist that are related to the handling of objects in memory.
A local attacker can exploit these, via a crafted application, to run arbitrary code in kernel mode.
(CVE-2015-6100, CVE-2015-6101)
- Multiple information disclosure vulnerabilities exist due to a failure to properly initialize memory addresses. A
local attacker can exploit these, via a specially crafted application, to bypass the Kernel Address Space Layout
Randomization (KASLR) and retrieve the base address of the Kernel driver from a compromised process.
(CVE-2015-6102, CVE-2015-6109)
- Multiple remote code execution vulnerabilities exist in the Adobe Type Manager Library due to improper
handling of specially crafted fonts. An unauthenticated, remote attacker can exploit these, via a crafted
document or web page, to execute arbitrary code.
(CVE-2015-6103, CVE-2015-6104)
- A security feature bypass vulnerability exists due to improper validation of permissions. A local attacker can
exploit this to interact with the file system in an inappropriate manner to modify files, by using a crafted, low-
integrity-level, user-mode application.
(CVE-2015-6113)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-115
Solution
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
BID 77458
BID 77460
BID 77462
BID 77463
BID 77464
BID 77465
BID 77466
CVE CVE-2015-6100
CVE CVE-2015-6101
CVE CVE-2015-6102
CVE CVE-2015-6103
CVE CVE-2015-6104
CVE CVE-2015-6109
CVE CVE-2015-6113
MSKB 3097877
MSKB 3101746
MSKB 3105211
MSKB 3105213
XREF MSFT:MS15-115
XREF IAVA:2015-A-0299
Plugin Information
Plugin Output
tcp/445
KB : 3097877
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18093
86826 - MS15-119: Security Update for Winsock to Address Elevation of Privilege (3104521)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability due to a flaw in Winsock in which
a call is made to a memory address without verifying that the address is valid. An authenticated, remote attacker
can exploit this, via a specially crafted application, to gain elevated privileges on the host.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-119
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 77478
CVE CVE-2015-2478
MSKB 3092601
MSKB 3105211
MSKB 3105213
XREF MSFT:MS15-119
XREF IAVA:2015-A-0276
Plugin Information
Plugin Output
tcp/445
KB : 3092601
- C:\Windows\system32\drivers\Afd.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18089
86828 - MS15-122: Security Update for Kerberos to Address Security Feature Bypass (3105256)
Synopsis
Description
The remote Windows host is affected by a security feature bypass vulnerability in Kerberos due to a failure to
check the password change of a user signing into a workstation. A remote attacker can exploit this vulnerability
by connecting a workstation to a malicious Kerberos Key Distribution Center (KDC), resulting in the ability to
decrypt drives protected by BitLocker.
Note that this vulnerability can only be exploited if the target system has BitLocker enabled without a PIN or USB
key, and the computer is domain-joined.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-122
https://support.microsoft.com/en-us/help/3101246/ms15-122-description-of-the-security-update-for-windows-
kerberos-novem
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N)
5.8 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 77475
CVE CVE-2015-6095
MSKB 3101246
MSKB 3105213
MSKB 3105211
XREF MSFT:MS15-122
XREF IAVA:2015-A-0278
Plugin Information
Plugin Output
tcp/445
KB : 3101246
- C:\Windows\system32\Kerberos.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18091
87253 - MS15-124: Cumulative Security Update for Internet Explorer (3116180)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3116180. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An unauthenticated, remote attacker can exploit these issues by convincing a user to visit a specially crafted
website, resulting in the execution of arbitrary code in the context of the current user.
See Also
http://www.nessus.org/u?f205555e
http://www.nessus.org/u?43c16242
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
9.0 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
8.6 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 78481
BID 78482
BID 78483
BID 78484
BID 78485
BID 78486
BID 78487
BID 78488
BID 78489
BID 78490
BID 78491
BID 78492
BID 78494
BID 78495
BID 78507
BID 78508
BID 78526
BID 78527
BID 78528
BID 78529
BID 78530
BID 78531
BID 78532
BID 78533
BID 78534
BID 78535
BID 78536
BID 78537
BID 78538
BID 78540
CVE CVE-2015-6083
CVE CVE-2015-6134
CVE CVE-2015-6135
CVE CVE-2015-6136
CVE CVE-2015-6138
CVE CVE-2015-6139
CVE CVE-2015-6140
CVE CVE-2015-6141
CVE CVE-2015-6142
CVE CVE-2015-6143
CVE CVE-2015-6144
CVE CVE-2015-6145
CVE CVE-2015-6146
CVE CVE-2015-6147
CVE CVE-2015-6148
CVE CVE-2015-6149
CVE CVE-2015-6150
CVE CVE-2015-6151
CVE CVE-2015-6152
CVE CVE-2015-6153
CVE CVE-2015-6154
CVE CVE-2015-6155
CVE CVE-2015-6156
CVE CVE-2015-6157
CVE CVE-2015-6158
CVE CVE-2015-6159
CVE CVE-2015-6160
CVE CVE-2015-6161
CVE CVE-2015-6162
CVE CVE-2015-6164
MSKB 3104002
MSKB 3116869
MSKB 3116900
MSKB 3125869
XREF MSFT:MS15-124
Plugin Information
Plugin Output
tcp/445
192.168.100.4 320
87257 - MS15-128: Security Update for Microsoft Graphics Component to Address Remote Code
Execution (3104503)
Synopsis
Description
The remote Windows host is affected by multiple remote code execution vulnerabilities due to improper handling
of embedded fonts by the Windows font library. A remote attacker can exploit these by convincing a user to open
a file or visit a website containing a specially crafted embedded font, resulting in execution of arbitrary code in
the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-128
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10. Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Word Viewer, Lync
2010, Lync 2010 Attendee, Lync 2013, Lync Basic 2013, Skype for Business 2016, Live Meeting 2007 Console,
Silverlight;
and .NET framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5.1, 4.5.2, and 4.6.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 78497
BID 78498
BID 78499
CVE CVE-2015-6106
192.168.100.4 32
CVE CVE-2015-6107
CVE CVE-2015-6108
MSKB 3085612
MSKB 3085616
MSKB 3099860
MSKB 3099862
MSKB 3099863
MSKB 3099864
MSKB 3099866
MSKB 3099869
MSKB 3099874
MSKB 3106614
MSKB 3109094
MSKB 3114351
MSKB 3114372
MSKB 3114478
MSKB 3115871
MSKB 3115872
MSKB 3115873
MSKB 3115875
MSKB 3116869
MSKB 3116900
XREF MSFT:MS15-128
XREF IAVA:2015-A-0308
Plugin Information
Plugin Output
tcp/445
KB : 3109094
- C:\Windows\system32\dwrite.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18123
87261 - MS15-132: Security Update for Microsoft Windows to Address Remote Code Execution
(3116162)
Synopsis
The remote Windows host is affected by multiple remote code execution vulnerabilities.
Description
The remote Windows host is affected by multiple remote code execution vulnerabilities due to improper input
validation when libraries are linked. A remote attacker can exploit these vulnerabilities by convincing a user to
open a specially crafted file, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-132
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 78496
BID 78614
BID 78615
CVE CVE-2015-6128
CVE CVE-2015-6132
CVE CVE-2015-6133
MSKB 3108347
MSKB 3108371
MSKB 3108381
MSKB 3116162
MSKB 3116869
MSKB 3116900
XREF MSFT:MS15-132
XREF IAVB:2015-B-0143
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3108347
- C:\Windows\system32\authui.dll has not been patched.
Remote version : 6.3.9600.16474
Should be : 6.3.9600.18111
87262 - MS15-133: Security Update for Windows PGM to Address Elevation of Privilege (3116130)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege
vulnerability in the Pragmatic General Multicast (PGM) protocol, installed with the MSMQ service, due to a race
condition that can result in references being made to already freed memory. An local attacker can exploit this,
via a specially crafted application, to gain elevated privileges on the affected host.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-133
Solution
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 78509
CVE CVE-2015-6126
MSKB 3109103
MSKB 3116869
MSKB 3116900
XREF MSFT:MS15-133
XREF IAVA:2015-A-0304
Plugin Information
Plugin Output
tcp/445
KB : 3109103
- C:\Windows\system32\drivers\Rmcast.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18119
87264 - MS15-135: Security Update for Windows Kernel-Mode Drivers to Address Elevation of
Privilege (3119075)
Synopsis
Description
The remote Windows host is affected by multiple elevation of privilege vulnerabilities due to improper handling of
objects in memory by the Windows kernel. An authenticated, remote attacker can exploit these vulnerabilities by
running a specially crafted application, resulting in an elevation of privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-135
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.4 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
References
BID 78506
BID 78510
BID 78513
BID 78514
CVE CVE-2015-6171
CVE CVE-2015-6173
CVE CVE-2015-6174
CVE CVE-2015-6175
MSKB 3109094
MSKB 3116869
MSKB 3116900
XREF MSFT:MS15-135
XREF IAVA:2015-A-0299
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3109094
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18123
87892 - MS16-005: Security Update for Windows Kernel-Mode Drivers to Address Remote Code
Execution (3124584)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the Windows graphics device interface due to improper
handling of objects in memory. An attacker can exploit this to bypass the Address Space Layout Randomization
(ASLR) feature, resulting in the ability to predict memory offsets in a call stack. (CVE-2016-0008)
- A remote code execution vulnerability exists due to improper handling of objects in memory. An attacker can
exploit this vulnerability by convincing a user to visit a specially crafted website, resulting in execution of arbitrary
code in the context of the current user.
(CVE-2016-0008)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-005
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Note that Windows 10 with Citrix XenDesktop installed will not be offered the patch due to an issue with the
XenDesktop software that prevents users from logging on when the patch is applied. To apply the patch you
must first uninstall XenDesktop or contact Citrix for help with the issue.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 79885
BID 79887
CVE CVE-2016-0008
CVE CVE-2016-0009
MSKB 3124000
MSKB 3124001
MSKB 3124263
MSKB 3124266
XREF MSFT:MS16-005
Plugin Information
Plugin Output
tcp/445
KB : 3124001
- C:\Windows\system32\gdi32.dll has not been patched.
Remote version : 6.3.9600.16421
Should be : 6.3.9600.18155
192.168.100.4 330
87890 - MS16-007: Security Update for Microsoft Windows to Address Remote Code Execution
(3124901)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist due to improper validation of user-supplied input before
loading DLL files. A local attacker can exploit these, via a crafted application, to elevate their privileges and take
control of the affected system. (CVE-2016-0014, CVE-2016-0020)
- A remote code execution vulnerability exists in DirectShow due to improper validation of user-supplied input. A
remote attacker can exploit this, by convincing a user to open a specially crafted file, to execute arbitrary code in
the context of the current user, resulting in taking control of the affected system.
(CVE-2016-0015)
- Multiple remote code execution vulnerabilities exist due to improper validation of user-supplied input before
loading DLL files. A local attacker can exploit these, via a specially crafted application, to execute arbitrary code.
(CVE-2016-0016, CVE-2016-0018)
- A security bypass vulnerability exists in the Windows Remote Desktop Protocol (RDP) due to a failure to
prevent remote logons to accounts that have no passwords set. A remote attacker can exploit this, by using an
older version of the RDP client to connect to a Windows 10 host, to generate a list of user accounts.
(CVE-2016-0019)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-007
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Note that Windows 10 with Citrix XenDesktop installed will not be offered the patch due to an issue with the
XenDesktop software that prevents users from logging on when the patch is applied. To apply the patch you
must first uninstall XenDesktop or contact Citrix for help with the issue.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
192.168.100.4 33
CVSS Temporal Score
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
References
BID 79896
BID 79900
BID 79902
BID 79906
BID 79908
BID 79909
CVE CVE-2016-0014
CVE CVE-2016-0015
CVE CVE-2016-0016
CVE CVE-2016-0018
CVE CVE-2016-0019
CVE CVE-2016-0020
MSKB 3108664
MSKB 3109560
MSKB 3110329
MSKB 3121461
MSKB 3121918
MSKB 3124263
MSKB 3124266
MSKB 3124901
XREF MSFT:MS16-007
XREF IAVA:2016-A-0014
Plugin Information
Plugin Output
tcp/445
KB : 3121918
- C:\Windows\system32\advapi32.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18155
KB : 3121918
- C:\Windows\system32\advapi32.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18155
87881 - MS16-008: Security Update for Windows Kernel to Address Elevation of Privilege (3124605)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities due to improper validation of reparse points that have been set by sandbox applications. A local
attacker can exploit these vulnerabilities, via a crafted application, to gain elevated privileges and take complete
control of the affected system.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-008
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Note that Windows 10 with Citrix XenDesktop installed will not be offered the patch due to an issue with the
XenDesktop software that prevents users from logging on when the patch is applied. To apply the patch you
must first uninstall XenDesktop or contact Citrix for help with the issue.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 79882
BID 79898
CVE CVE-2016-0006
CVE CVE-2016-0007
MSKB 3121212
MSKB 3124263
MSKB 3124266
XREF MSFT:MS16-008
Plugin Information
Plugin Output
tcp/445
KB : 3121212
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.18185
88646 - MS16-014: Security Update for Microsoft Windows to Address Remote Code Execution
(3134228)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists in the Windows kernel due to improper handling of objects in
memory. A local attacker can exploit this, via a crafted application, to run arbitrary code in kernel mode and
therefore take control of the affected system.
(CVE-2016-0040)
- Multiple code execution vulnerabilities exist due to improper validation of user-supplied input when loading
DLL files. A local attacker can exploit these, via a specially crafted application, to execute arbitrary code.
(CVE-2016-0041, CVE-2016-0042)
- A denial of service vulnerability exists in Microsoft Sync Framework due to improper processing of crafted input
that uses the 'change batch' structure. An authenticated, remote attacker can exploit this, via specially crafted
packets sent to the SyncShareSvc service, to cause the service to stop responding.
(CVE-2016-0044)
- A security feature bypass vulnerability exists when Kerberos fails to check the password change of a user
signing into a workstation. An attacker can exploit this, by connecting the workstation to a malicious Kerberos
Key distribution Center, to bypass Kerberos authentication on a target machine, thus allowing decryption of
drives protected by BitLocker.
(CVE-2016-0049)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-014
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
STIG Severity
II
References
BID 82505
BID 82510
BID 82511
BID 82515
CVE CVE-2016-0040
CVE CVE-2016-0041
CVE CVE-2016-0042
CVE CVE-2016-0044
CVE CVE-2016-0049
MSKB 3126041
MSKB 3126587
MSKB 3126593
MSKB 3126434
MSKB 3135174
MSKB 3135173
XREF MSFT:MS16-014
XREF IAVA:2016-A-0050
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3126587
- C:\Windows\system32\cfgbkend.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18192
KB : 3126593
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.18192
KB : 3126434
- C:\Windows\system32\winsync.dll has not been patched.
Remote version : 2007.94.9600.16384
Should be : 2007.94.9600.18183
KB : 3126041
- C:\Windows\system32\kerberos.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18192
88649 - MS16-017: Security Update for Remote Desktop Display Driver to Address Elevation of
Privilege (3134700)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Remote Desktop Protocol
(RDP) due to improper handling of objects in memory. An authenticated, remote attacker can exploit this
by logging on via RDP and sending specially crafted data over the authenticated connection, resulting in an
elevation of privilege.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-017
Solution
Microsoft has released a set of patches for Windows 7, 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 82799
CVE CVE-2016-0036
MSKB 3126446
MSKB 3135174
XREF MSFT:MS16-017
XREF IAVA:2016-A-0048
Plugin Information
Plugin Output
tcp/445
KB : 3126446
- C:\Windows\system32\rdpudd.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18167
192.168.100.4 340
88650 - MS16-018: Security Update for Windows Kernel-Mode Drivers to Address Elevation of
Privilege (3136082)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege
vulnerability in the Windows kernel-mode driver due to improper handling of objects in memory. An
authenticated, remote attacker can exploit this, via a specially crafted application, to execute arbitrary code in
kernel mode.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-018
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 82708
CVE CVE-2016-0048
MSKB 3134214
MSKB 3135174
MSKB 3135173
XREF MSFT:MS16-018
Plugin Information
192.168.100.4 34
Plugin Output
tcp/445
KB : 3134214
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18190
89749 - MS16-026: Security Update for Graphic Fonts to Address Remote Code Execution (3143148)
Synopsis
Description
The remote Windows host is affected by multiple vulnerabilities in the Adobe Type Manager Library :
- A denial of service vulnerability exists due to improper handling of OpenType fonts. A remote attacker can
exploit this vulnerability by convincing a user to open a file or visit a website containing specially crafted
embedded OpenType fonts, resulting in a denial of service condition. (CVE-2016-0120)
- A remote code execution vulnerability exists due to improper handling of specially crafted fonts. A remote
attacker can exploit this vulnerability by convincing a user to open a file or visit a website containing specially
crafted embedded OpenType fonts, resulting in the execution of arbitrary code in the context of the current user.
(CVE-2016-0121)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-026
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 84027
BID 84071
CVE CVE-2016-0120
CVE CVE-2016-0121
MSKB 3140735
MSKB 3140745
MSKB 3140768
XREF MSFT:MS16-026
Plugin Information
Plugin Output
tcp/445
KB : 3140735
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.247
89751 - MS16-028: Security Update for Microsoft Windows PDF Library to Address Remote Code
Execution (3143081)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple remote code
execution vulnerabilities in the Windows PDF library. A remote attacker can exploit these, by convincing user to
open a specially crafted PDF file, to execute arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-028
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 84109
BID 84112
CVE CVE-2016-0117
CVE CVE-2016-0118
MSKB 3137513
MSKB 3140745
MSKB 3140768
XREF MSFT:MS16-028
XREF IAVA:2016-A-0066
Plugin Information
Plugin Output
tcp/445
KB : 3137513
- C:\Windows\system32\windows.data.pdf.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18229
89753 - MS16-030: Security Update for Windows OLE to Address Remote Code Execution (3143136)
Synopsis
The remote Windows host is affected by multiple remote code execution vulnerabilities.
Description
The remote Windows host is affected by multiple remote code execution vulnerabilities in Microsoft Windows
OLE due to improper validation of user-supplied input. A remote attacker can exploit this vulnerability by
convincing a user to open a specially crafted file, resulting in the execution of arbitrary code in the context of the
current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-030
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 83944
BID 84125
CVE CVE-2016-0091
CVE CVE-2016-0092
MSKB 3139940
MSKB 3140745
MSKB 3140768
XREF MSFT:MS16-030
XREF IAVA:2016-A-0062
Plugin Information
Plugin Output
tcp/445
KB : 3139940
- C:\Windows\system32\ole32.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18227
89755 - MS16-032: Security Update for Secondary Logon to Address Elevation of Privilege (3143141)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Windows Secondary Logon
Service due to improper management of request handles in memory. An authenticated, remote attacker can
exploit this, via a specially crafted application, to elevate privileges, allowing the execution of arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-032
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.8 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 84034
CVE CVE-2016-0099
MSKB 3139914
MSKB 3140768
MSKB 3140745
XREF MSFT:MS16-032
XREF IAVB:2016-B-0049
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3139914
- C:\Windows\system32\seclogon.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18230
192.168.100.4 350
89779 - MS16-033: Security Update for Windows USB Mass Storage Class Driver to Address
Elevation of Privilege (3143142)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a flaw in the Windows USB
Mass Storage Class driver due to improper validation of objects in memory. A local attacker can exploit this, via
a specially crafted USB device, to elevate privileges, allowing the execution of arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-033
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
6.8 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
5.9 (CVSS:3.0/E:U/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 84035
192.168.100.4 35
CVE CVE-2016-0133
MSKB 3139398
MSKB 3140745
MSKB 3140768
XREF MSFT:MS16-033
XREF IAVB:2016-B-0048
Plugin Information
Plugin Output
tcp/445
KB : 3139398
- C:\Windows\system32\drivers\usbstor.sys has not been patched.
Remote version : 6.3.9600.16475
Should be : 6.3.9600.18224
89756 - MS16-034: Security Update for Windows Kernel-Mode Drivers to Address Elevation of
Privilege (3143145)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple flaws in the Win32k
kernel-mode driver due to improper handling of objects in memory. An authenticated, remote attacker can exploit
these, via a specially crafted application, to elevate privileges, allowing the execution of arbitrary code in kernel
mode.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-034
Solution
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 84054
BID 84066
BID 84069
BID 84072
CVE CVE-2016-0093
CVE CVE-2016-0094
CVE CVE-2016-0095
CVE CVE-2016-0096
MSKB 3140768
MSKB 3139852
MSKB 3143145
MSKB 3140745
XREF MSFT:MS16-034
Plugin Information
Plugin Output
tcp/445
KB : 3139852
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18228
90433 - MS16-039: Security Update for Microsoft Graphics Component (3148522)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to a failure to properly
handle objects in memory. An attacker can exploit these vulnerabilities to execute arbitrary code in kernel mode.
(CVE-2016-0143, CVE-2016-0165, CVE-2016-0167)
- A remote code execution vulnerability exists in the Windows font library due to improper handling of embedded
fonts. An attacker can exploit this vulnerability by convincing a user to open a file or visit a website containing
specially crafted embedded fonts, resulting in the execution of arbitrary code in the context of the current user.
(CVE-2016-0145)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-039
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10. Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Word Viewer, Skype for
Business 2016, Lync 2010, Lync 2013, Live Meeting 2007 Console, .NET framework 3.0 SP2, .NET framework
3.5, and .NET framework 3.5.1.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
8.1 (CVSS:3.0/E:F/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 85896
BID 85899
BID 85900
BID 85903
CVE CVE-2016-0143
CVE CVE-2016-0145
CVE CVE-2016-0165
CVE CVE-2016-0167
MSKB 3145739
MSKB 3147461
MSKB 3147458
MSKB 3114542
MSKB 3114566
MSKB 3114985
MSKB 3142041
MSKB 3142042
MSKB 3142045
MSKB 3142043
MSKB 3114960
MSKB 3114944
MSKB 3144427
MSKB 3144428
MSKB 3144429
MSKB 3144432
MSKB 4038788
XREF MSFT:MS16-039
XREF IAVA:2016-A-0091
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3145739
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18290
90434 - MS16-040: Security Update for Microsoft XML Core Services (3148541)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability in the Microsoft XML Core
Services (MSXML) parser due to improper validation of user-supplied input. An unauthenticated, remote attacker
can exploit this vulnerability, by convincing a user to visit a specially-crafted website that is designed to invoke
MSXML through Internet Explorer, to execute arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-040
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 85909
CVE CVE-2016-0147
MSKB 3146963
MSKB 3147458
MSKB 3147461
XREF MSFT:MS16-040
XREF IAVA:2016-A-0092
Plugin Information
Plugin Output
tcp/445
KB : 3146963
- C:\Windows\system32\Msxml3.dll has not been patched.
Remote version : 8.110.9600.16483
Should be : 8.110.9600.18258
90437 - MS16-044: Security Update for Windows OLE (3146706)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in Windows OLE due to improper validation of user-supplied input. An unauthenticated, remote
attacker can exploit this vulnerability by convincing a user to open a specially crafted file, resulting in the
execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-044
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, and 2012 R2.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 85912
CVE CVE-2016-0153
MSKB 3146706
XREF MSFT:MS16-044
XREF IAVB:2016-B-0068
Plugin Information
192.168.100.4 360
Plugin Output
tcp/445
KB : 3146706
- C:\Windows\system32\ole32.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18256
192.168.100.4 36
90441 - MS16-048: Security Update for CSRSS (3148528)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a security feature bypass
vulnerability in the Client-Server Run-time Subsystem (CSRSS) due to improper management of process tokens
in memory. A local attacker can exploit this vulnerability, via a specially crafted application, to escalate privileges
and execute arbitrary code as an administrator.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-048
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 85913
CVE CVE-2016-0151
MSKB 3146723
MSKB 3147458
MSKB 3147461
XREF MSFT:MS16-048
XREF IAVB:2016-B-0065
Plugin Information
Plugin Output
tcp/445
KB : 3146723
- C:\Windows\system32\basesrv.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18258
91005 - MS16-055: Security Update for Microsoft Graphics Component (3156754)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist in the Windows Graphics component. An unauthenticated,
remote attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website or
open open a specially crafted document, resulting in the disclosure of memory contents. (CVE-2016-0168,
CVE-2016-0169)
- A remote code execution vulnerability exists in the Windows Graphics component due to improper handling
of objects in memory. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user t
visit a specially crafted website or open open a specially crafted document, resulting in the execution of arbitrary
code in the context of the current user.
(CVE-2016-0170)
- A remote code execution vulnerability exists in the Direct3D component due to a use-after-free error. An
unauthenticated, remote attacker can exploit this vulnerability by convincing a user to visit a specially crafted
website or open open a specially crafted document, resulting in the execution of arbitrary code in the context of
the current user. (CVE-2016-0184)
- A remote code execution vulnerability exists in the Windows Imaging component due to improper handling
of objects in memory. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user t
visit a specially crafted website or open open a specially crafted document, resulting in the execution of arbitrary
code in the context of the current user.
(CVE-2016-0195)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-055
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 89862
BID 89863
BID 89864
BID 89892
BID 89901
CVE CVE-2016-0168
CVE CVE-2016-0169
CVE CVE-2016-0170
CVE CVE-2016-0184
CVE CVE-2016-0195
MSKB 3156013
MSKB 3156016
MSKB 3156019
MSKB 3156387
MSKB 3156421
XREF MSFT:MS16-055
Plugin Information
Plugin Output
tcp/445
KB : 3156019
- C:\Windows\system32\Windowscodecs.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18302
91007 - MS16-057: Security Update for Windows Shell (3156987)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in Windows Shell due to improper handling of objects in memory. An unauthenticated, remote
attacker can exploit this vulnerability by convincing a user to visit a crafted website, resulting in the execution of
arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-057
Solution
Microsoft has released a set of patches for Windows 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 89868
CVE CVE-2016-0179
MSKB 3156059
MSKB 3156387
MSKB 3156421
XREF MSFT:MS16-057
XREF IAVA:2016-A-0131
Plugin Information
Plugin Output
tcp/445
KB : 3156059
- C:\Windows\system32\Windows.ui.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18302
91010 - MS16-060: Security Update for Windows Kernel (3154846)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a privilege escalation
vulnerability due to improper parsing of certain symbolic links. A local attacker can exploit this vulnerability, via a
specially crafted application, to access privileged registry keys, resulting in an elevation of privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-060
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 90028
CVE CVE-2016-0180
MSKB 3153171
MSKB 3156387
MSKB 3156421
XREF MSFT:MS16-060
XREF IAVA:2016-A-0126
Plugin Information
Plugin Output
tcp/445
KB : 3153171
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.18289
91011 - MS16-061: Security Update for Microsoft RPC (3155520)
Synopsis
Description
The remote Windows host is affected by a remote code execution vulnerability in the Microsoft RPC Network
Data Representation (NDR) Engine due to improper handling of memory. An authenticated, remote attacker can
exploit this vulnerability, via malformed RPC requests, to execute arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-061
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 90032
CVE CVE-2016-0178
MSKB 3153171
MSKB 3153704
MSKB 3156387
MSKB 3156421
XREF MSFT:MS16-061
XREF IAVA:2016-A-0130
192.168.100.4 370
Plugin Information
Plugin Output
tcp/445
KB : 3153704
- C:\Windows\system32\Rpcrt4.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18292
192.168.100.4 37
91012 - MS16-062: Security Update for Windows Kernel-Mode Drivers (3158222)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple privilege escalation vulnerabilities exist in the Windows kernel-mode driver due to a failure to properly
handle objects in memory. An authenticated, remote attacker can exploit this, via a crafted application, to
execute arbitrary code. (CVE-2016-0171, CVE-2016-0173, CVE-2016-0174, CVE-2016-0196)
- A security feature bypass vulnerability exists in the Windows kernel. An authenticated, remote attacker can
exploit this, via a crafted application, to bypass the Kernel Address Space Layout Randomization (KASLR)
feature and retrieve the memory address of a kernel object. (CVE-2016-0175)
- A privilege escalation vulnerability exists in the DirectX Graphics kernel subsystem due to a failure to properly
handle objects in memory. An authenticated, remote attacker can exploit this, via a crafted application, to
execute arbitrary code. (CVE-2016-0176)
- A privilege escalation vulnerability exists in the DirectX Graphics kernel subsystem due to a failure to correctly
map kernel memory and to handle objects in memory. An authenticated, remote attacker can exploit this, via a
crafted application, to execute arbitrary code. (CVE-2016-0197)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-062
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 89860
BID 90027
BID 90052
BID 90064
BID 90065
BID 90101
BID 90102
CVE CVE-2016-0171
CVE CVE-2016-0173
CVE CVE-2016-0174
CVE CVE-2016-0175
CVE CVE-2016-0176
CVE CVE-2016-0196
CVE CVE-2016-0197
MSKB 3153199
MSKB 3156017
MSKB 3156387
MSKB 3156421
MSKB 3158222
XREF MSFT:MS16-062
Plugin Information
Plugin Output
tcp/445
KB : 3153199
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18302
91596 - MS16-063: Cumulative Security Update for Internet Explorer (3163649)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3163649. It
is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities.
An unauthenticated, remote attacker can exploit these issues by convincing a user to visit a specially crafted
website, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-063
Solution
Microsoft has released a set of patches for Internet Explorer 9, 10, and 11.
Note that the security update in MS16-077 must also be installed in order to fully resolve CVE-2016-3213.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 91101
BID 91102
BID 91103
BID 91108
BID 91109
BID 91110
BID 91111
BID 91112
CVE CVE-2016-0199
CVE CVE-2016-0200
CVE CVE-2016-3202
CVE CVE-2016-3205
CVE CVE-2016-3206
CVE CVE-2016-3207
CVE CVE-2016-3210
CVE CVE-2016-3211
CVE CVE-2016-3212
CVE CVE-2016-3213
MSKB 3160005
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-063
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege
vulnerability due to a lack of Kerberos authentication for certain calls over LDAP when processing group policy
updates. A man-in-the-middle attacker can exploit this vulnerability to create arbitrary group policies and grant a
standard user elevated, administrative privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-072
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
7.1 (CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
BID 91119
CVE CVE-2016-3223
MSKB 3159398
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-072
XREF IAVA:2016-A-0155
Plugin Information
Plugin Output
tcp/445
KB : 3159398
- C:\Windows\system32\gpprefcl.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18339
91601 - MS16-073: Security Update for Windows Kernel-Mode Drivers (3164028)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist in the kernel-mode driver due to improper handling of objects
in memory. An authenticated, remote attacker can exploit these, via a specially crafted application, to run
arbitrary code in kernel mode. (CVE-2016-3218, CVE-2016-3221)
- An information disclosure vulnerability exists in the Windows Virtual PCI (VPCI) virtual service provider (VSP)
due to improper handling of uninitialized memory.
An authenticated, remote attacker can exploit this, via a specially crafted application, to disclose sensitive
memory contents. (CVE-2016-3232)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-073
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 91121
BID 91122
BID 91123
CVE CVE-2016-3218
CVE CVE-2016-3221
CVE CVE-2016-3232
MSKB 3161664
MSKB 3164294
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-073
Plugin Information
Plugin Output
tcp/445
KB : 3164294
- C:\Windows\system32\drivers\vpcivsp.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18340
KB : 3161664
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18340
91602 - MS16-074: Security Update for Microsoft Graphics Component (3164036)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the Windows Graphics Component due to a failure to properly
handle objects in memory. A local attacker can exploit this to disclose memory contents. (CVE-2016-3216)
- An elevation of privilege vulnerability exists due to a failure to properly handle objects in memory. A local
attacker can exploit this vulnerability, via a specially crafted application, to run processes in an elevated context.
(CVE-2016-3219)
- An elevation of privilege vulnerability exists in the Adobe Type Manager Font Driver due to improper handling
of objects in memory. A local attacker can exploit this vulnerability, via a specially crafted application, to execute
arbitrary code in an elevated context.
(CVE-2016-3220)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-074
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 91083
192.168.100.4 380
CVE CVE-2016-3216
CVE CVE-2016-3219
CVE CVE-2016-3220
MSKB 3164033
MSKB 3164035
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-074
XREF IAVA:2016-A-0149
Plugin Information
Plugin Output
tcp/445
KB : 3164033
- C:\Windows\system32\atmfd.dll has not been patched.
Remote version : 5.1.2.238
Should be : 5.1.2.248
192.168.100.4 38
91603 - MS16-075: Security Update for Windows SMB Server (3164038)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege
vulnerability in the Microsoft Server Message Block (SMB) server when handling forwarded credential requests
that are intended for another service running on the same host. An authenticated attacker can exploit this, via a
specially crafted application, to execute arbitrary code with elevated permissions.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-075
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.4 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 91080
CVE CVE-2016-3225
MSKB 3161561
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-075
XREF IAVA:2016-A-0150
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3161561
- C:\Windows\system32\drivers\srvnet.sys has not been patched.
Remote version : 6.3.9600.16401
Should be : 6.3.9600.18340
91604 - MS16-076: Security Update for Netlogon (3167691)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability due to improper handling of objects in memory. A domain-authenticated attacker can exploit this, via
a specially crafted Netlogon request to a domain controller, to execute arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-076
Solution
Microsoft has released a set of patches for Windows 2008, 2008 R2, 2012, and 2012 R2.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91120
CVE CVE-2016-3228
MSKB 3161561
MSKB 3162343
XREF MSFT:MS16-076
XREF IAVA:2016-A-0152
Plugin Information
tcp/445
KB : 3162343
- C:\Windows\system32\wdigest.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18334
91607 - MS16-080: Security Update for Microsoft Windows PDF (3164302)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist due to improper parsing of .pdf files. An unauthenticated,
remote attacker can exploit these vulnerabilities by convincing a user to open a specially crafted .pdf file,
resulting in the disclosure of sensitive information in the context of the current user. (CVE-2016-3201,
CVE-2016-3215)
- A remote code execution vulnerability exists due to improper parsing of .pdf files. An unauthenticated, remote
attacker can exploit this vulnerability by convincing a user to open a specially crafted .pdf file, resulting in the
execution of arbitrary code in the context of the current user. (CVE-2016-3203)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-080
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91086
BID 91087
CVE CVE-2016-3201
CVE CVE-2016-3203
CVE CVE-2016-3215
MSKB 3157569
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-080
XREF IAVB:2016-B-0102
Plugin Information
Plugin Output
tcp/445
KB : 3157569
- C:\Windows\system32\glcndfilter.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18336
92018 - MS16-087: Security Update for Windows Print Spooler (3170005)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the Windows Print Spooler service due to improper validation
of print drivers while installing a printer from network servers. An unauthenticated, remote attacker can exploit
this vulnerability, via a man-in-the-middle attack on a workstation or print server or via a rogue print server, to
execute arbitrary code in the context of the current user. (CVE-2016-3238)
- An elevation of privilege vulnerability exists in the Windows Print Spooler service due to improperly allowing
arbitrary writing to the file system. An attacker can exploit this issue, via a specially crafted script or application,
to execute arbitrary code with elevated system privileges. (CVE-2016-3239)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-087
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91609
BID 91612
CVE CVE-2016-3238
CVE CVE-2016-3239
MSKB 3170455
MSKB 4038777
MSKB 4038779
MSKB 4038781
MSKB 4038782
MSKB 4038783
MSKB 4038786
MSKB 4038792
MSKB 4038793
MSKB 4038799
XREF MSFT:MS16-087
XREF IAVA:2016-A-0181
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist in the kernel-mode driver due to improper handling of
objects in memory. An authenticated, remote attacker can exploit these, via a specially crafted application,
to run arbitrary code in kernel mode. (CVE-2016-3249, CVE-2016-3250, CVE-2016-3252, CVE-2016-3254,
CVE-2016-3286)
- An information disclosure vulnerability exists in the Windows GDI component due improper handling of objects
in memory. An authenticated, remote attacker can exploit this, via a specially crafted application, to disclose
kernel memory addresses. (CVE-2016-3251)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-090
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, 2012 R2, and 10.
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.8 (CVSS2#E:H/RL:OF/RC:C)
References
BID 91597
BID 91600
BID 91613
BID 91614
BID 91615
BID 91616
CVE CVE-2016-3249
192.168.100.4 390
CVE CVE-2016-3250
CVE CVE-2016-3251
CVE CVE-2016-3252
CVE CVE-2016-3254
CVE CVE-2016-3286
MSKB 3163912
MSKB 3168965
MSKB 3172985
XREF MSFT:MS16-090
Plugin Information
Plugin Output
tcp/445
KB : 3168965
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18377
192.168.100.4 39
92025 - MS16-094: Security Update for Secure Boot (3177404)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a security bypass vulnerability
in the Secure Boot component due to improperly applying an affected policy. An attacker who has either
administrative privileges or access to the host can exploit this issue, via installing a crafted policy, to disable
code integrity checks, thus allowing test-signed executables and drivers to be loaded on the target host.
Moreover, the attacker can exploit this issue to bypass the Secure Boot integrity validation for BitLocker and the
device encryption security features.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-094
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10
Risk Factor
High
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91604
CVE CVE-2016-3287
MSKB 3172727
MSKB 3163912
MSKB 3172985
XREF MSFT:MS16-094
XREF IAVB:2016-B-0112
Plugin Information
Plugin Output
tcp/445
C:\Windows\System32\CodeIntegrity\driver.stl
92843 - MS16-097: Security Update for Microsoft Graphics Component (3177393)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities
in the Graphics component due to improper handling of embedded fonts by the Windows font library. An
unauthenticated, remote attacker can exploit these vulnerabilities, by convincing a user to visit a malicious
website or open a specially crafted document file, to execute arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-097
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 92288
BID 92301
BID 92302
CVE CVE-2016-3301
CVE CVE-2016-3303
CVE CVE-2016-3304
MSKB 3174301
MSKB 3178034
MSKB 3176492
MSKB 3176493
MSKB 3176495
MSKB 3115109
MSKB 3115131
MSKB 3115481
MSKB 3115408
MSKB 3115431
MSKB 3174302
MSKB 3174304
MSKB 3174305
XREF MSFT:MS16-097
XREF IAVA:2016-A-0205
Plugin Information
Plugin Output
tcp/445
KB : 3178034
None of the versions of 'GdiPlus.dll' under C:\Windows\WinSxS
have been patched.
Fixed version : 6.3.9600.18405
92821 - MS16-098: Security Update for Windows Kernel-Mode Drivers (3178466)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities in the
Windows kernel-mode driver due to a failure to properly handle objects in memory. An authenticated, remote
attacker can exploit these issues, via a crafted application, to execute arbitrary code in kernel mode.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-098
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.8 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 92295
BID 92297
BID 92298
BID 92299
CVE CVE-2016-3308
CVE CVE-2016-3309
CVE CVE-2016-3310
CVE CVE-2016-3311
MSKB 3177725
MSKB 3176492
MSKB 3176493
MSKB 3176495
XREF MSFT:MS16-098
XREF IAVA:2016-A-0204
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 3177725
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18405
92822 - MS16-100: Security Update for Secure Boot (3179577)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a security bypass vulnerability
in Secure Boot due to improper handling of malicious boot managers. An attacker with administrative privileges
can exploit this vulnerability to bypass code integrity checks and load test-signed executables and drivers.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-100
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10. Alternatively, as a
workaround, configure BitLocker to use Trusted Platform Module (TPM)+PIN protection or disable Secure Boot
integrity protection of BitLocker per the vendor advisory.
Risk Factor
High
7.2 (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 (CVSS:3.0/E:U/RL:O/RC:C)
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 92304
CVE CVE-2016-3320
MSKB 3172729
XREF MSFT:MS16-100
XREF IAVB:2016-B-0122
Plugin Information
Plugin Output
tcp/445
KB : 3172729
- C:\Windows\system32\tpmtasks.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18408
92823 - MS16-101: Security Update for Windows Authentication Methods (3178465)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- A security downgrade vulnerability exists in Kerberos due to improper handling of password change requests.
A man-in-the-middle attacker can exploit this to cause the authentication protocol to fall back to the NT LAN
Manager (NTLM) authentication protocol, resulting in a bypass of Kerberos authentication. (CVE-2016-3237)
- An elevation of privilege vulnerability exists in Windows Netlogon due to a failure to properly establish secure
communications to a domain controller. A local attacker who has access to a domain-joined machine that points
to a domain controller running either Windows Server 2012 or 2012 R2 can exploit this vulnerability to gain
elevated privileges via a specially crafted application. (CVE-2016-3300)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-101
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 92290
BID 92296
CVE CVE-2016-3237
CVE CVE-2016-3300
MSKB 3167679
MSKB 3177108
MSKB 3192391
MSKB 3185330
MSKB 3192392
MSKB 3185331
MSKB 3192393
MSKB 3185332
XREF MSFT:MS16-101
XREF IAVA:2016-A-0207
XREF EDB-ID:40409
Plugin Information
Plugin Output
tcp/445
KB : 3177108
- C:\Windows\system32\netlogon.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18405
92824 - MS16-102: Security Update for Microsoft Windows PDF Library (3182248)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in the Microsoft Windows PDF Library due to improper handling of objects in memory. An
unauthenticated, remote attacker can exploit this vulnerability by convincing a user to open a specially crafted
PDF file or visit a website containing specially crafted PDF content, resulting in the execution of arbitrary code in
the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-102
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 92293
CVE CVE-2016-3319
MSKB 3175887
MSKB 3176492
MSKB 3176493
MSKB 3176495
XREF MSFT:MS16-102
Plugin Information
Plugin Output
tcp/445
KB : 3175887
- C:\Windows\system32\windows.data.pdf.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18403
93466 - MS16-106: Security Update for Microsoft Graphics Component (3185848)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist in Windows kernel-mode drivers due to improper handling of
objects in memory. An authenticated, remote attacker can exploit these, via a specially crafted application, to run
arbitrary code in kernel mode. (CVE-2016-3348, CVE-2016-3349)
- An information disclosure vulnerability exists in the Graphics Device Interface (GDI) due to improper handling
of objects in memory. An authenticated, remote attacker can exploit this, via a specially crafted application,
to circumvent the Address Space Layout Randomization (ASLR) feature and disclose sensitive memory
information. (CVE-2016-3354)
- An elevation of privilege vulnerability exists in the Graphics Device Interface (GDI) due to improper handling of
objects in memory. An authenticated, remote attacker can exploit this to run arbitrary code in kernel mode.
(CVE-2016-3355)
- An unspecified flaw exists in the Graphics Device Interface (GDI) due to improper handling of objects in
memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted
website or open a malicious document, to execute arbitrary code in the context of the current user.
(CVE-2016-3356
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-106
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 92782
BID 92783
BID 92784
BID 92787
BID 92792
CVE CVE-2016-3348
CVE CVE-2016-3349
CVE CVE-2016-3354
CVE CVE-2016-3355
CVE CVE-2016-3356
MSKB 3185911
MSKB 3185611
MSKB 3185614
MSKB 3189866
XREF MSFT:MS16-106
XREF IAVA:2016-A-0240
Plugin Information
Plugin Output
tcp/445
KB : 3185911
- C:\Windows\system32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18439
93469 - MS16-110: Security Update for Microsoft Windows (3178467)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An elevation of privilege vulnerability exists due to a failure to properly enforce permissions when loading
specially crafted DLLs. A local attacker can exploit this vulnerability to execute arbitrary code with administrator
privileges. (CVE-2016-3346)
- An information disclosure vulnerability exists due to a failure to properly validate NT LAN Manager (NTLM)
Single Sign-On (SSO) requests during Microsoft Account (MSA) login sessions. An unauthenticated, remote
attacker can exploit this vulnerability, by convincing a user to load a malicious document that initiates an NTLM
SSO validation request or to visit a malicious website or SMB / UNC path destination, to disclose a user's NTLM
password hash. (CVE-2016-3352)
- A remote code execution vulnerability exists due to improper handling of objects in memory. A remote attacker
with a domain user account can exploit this vulnerability, via a specially crafted request, to execute arbitrary
code with elevated permissions.
(CVE-2016-3368)
- A denial of service vulnerability exists due to improper handling of objects in memory. An unauthenticated,
remote attacker can exploit this to cause the system to stop responding. (CVE-2016-3369)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-110
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 92846
BID 92847
BID 92850
BID 92852
CVE CVE-2016-3346
CVE CVE-2016-3352
CVE CVE-2016-3368
CVE CVE-2016-3369
MSKB 3184471
MSKB 3187754
MSKB 3185611
MSKB 3185614
MSKB 3189866
XREF MSFT:MS16-110
XREF IAVA:2016-A-0250
Plugin Information
Plugin Output
tcp/445
KB : 3184471
- C:\Windows\system32\ntdsai.dll has not been patched.
Remote version : 6.3.9600.16517
Should be : 6.3.9600.18435
93470 - MS16-111: Security Update for Windows Kernel (3186973)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist due to improper handling of session objects. A local attacker
can exploit these, via a specially crafted application, to hijack the session of another user.
(CVE-2016-3305, CVE-2016-3306)
- A flaw exists in the Windows Kernel API due to improper enforcement of permissions. A local attacker can
exploit this, via a specially crafted application, to elevate privileges and thereby disclose potentially sensitive
information. (CVE-2016-3371)
- An elevation of privilege vulnerability exists in the Windows Kernel API due to improper enforcement of
permissions. A local attacker can exploit this, via a specially crafted application, to impersonate processes,
interject cross-process communication, or interrupt system functionality. (CVE-2016-3372)
- A flaw exists in the Windows Kernel API due to improperly allowing access to sensitive registry information. A
local attacker can exploit this, via a specially crafted application, to elevate privileges and thereby gain access to
user account information.
(CVE-2016-3373)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-111
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 92812
BID 92813
BID 92814
BID 92815
BID 92845
CVE CVE-2016-3305
CVE CVE-2016-3306
CVE CVE-2016-3371
CVE CVE-2016-3372
CVE CVE-2016-3373
MSKB 3175024
MSKB 3185611
MSKB 3185614
MSKB 3189866
MSKB 4025342
MSKB 3175024
MSKB 3185611
MSKB 3185614
MSKB 3189866
XREF MSFT:MS16-111
XREF IAVA:2016-A-0242
Exploitable With
CANVAS (true)
Plugin Information
Plugin Output
tcp/445
KB : 3175024
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.18438
192.168.100.4 410
93471 - MS16-112: Security Update for Windows Lock Screen (3178469)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege
vulnerability due to improperly allowing web content to load from the Windows lock screen.
A local attacker can exploit this, by connecting to a maliciously configured WiFi hotspot or by inserting a mobile
broadband adapter, to elevate privileges and execute arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-112
Solution
Microsoft has released a set of patches for Windows 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
High
6.8 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
5.9 (CVSS:3.0/E:U/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 92853
192.168.100.4 41
CVE CVE-2016-3302
MSKB 3178469
MSKB 3185614
MSKB 3185611
MSKB 3189866
XREF MSFT:MS16-112
XREF IAVA:2016-A-0249
Plugin Information
Plugin Output
tcp/445
KB : 3178539
- C:\Windows\system32\pnidui.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18434
93473 - MS16-114: Security Update for Windows SMBv1 Server (3185879)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in the Microsoft Server Message Block 1.0 (SMBv1) Server due to improper handling of certain
requests. An authenticated, remote attacker can exploit this, via specially crafted packets, to cause a denial of
service condition or the execution of arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-114
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 92859
CVE CVE-2016-3345
MSKB 3177186
MSKB 3185611
MSKB 3185614
MSKB 3189866
XREF MSFT:MS16-114
XREF IAVA:2016-A-0248
Plugin Information
Plugin Output
tcp/445
KB : 3177186
- C:\Windows\system32\drivers\srv.sys has not been patched.
Remote version : 6.3.9600.16421
Should be : 6.3.9600.18432
93651 - MS16-116: Security Update in OLE Automation for VBScript Scripting Engine (3188724)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in the Microsoft OLE Automation mechanism and the VBScript Scripting Engine due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website, to execute arbitrary code in context of the current user.
Note that MS16-104 must also be installed in order to fully resolve the vulnerability.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-116
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-104
Solution
Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
BID 92835
CVE CVE-2016-3375
MSKB 3184122
MSKB 3185611
MSKB 3185614
MSKB 3189866
XREF MSFT:MS16-116
XREF IAVA:2016-A-0245
Plugin Information
Plugin Output
tcp/445
KB : 3184122
- C:\Windows\system32\Oleaut32.dll has not been patched.
Remote version : 6.3.9600.16451
Should be : 6.3.9600.18434
94011 - MS16-118: Cumulative Security Update for Internet Explorer (3192887)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote Windows host is missing Cumulative Security Update
3192887. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution
vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit
a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-118
Solution
Microsoft has released a set of patches for Internet Explorer 9, 10, and 11.
Note that security update 3193515 in MS16-126 must also be installed in order to fully resolve CVE-2016-3298
on Windows Vista and Windows Server 2008.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 93376
BID 93379
BID 93381
BID 93382
BID 93383
BID 93386
BID 93387
BID 93392
BID 93393
BID 93396
BID 93397
CVE CVE-2016-3267
CVE CVE-2016-3298
CVE CVE-2016-3331
CVE CVE-2016-3382
CVE CVE-2016-3383
CVE CVE-2016-3384
CVE CVE-2016-3385
CVE CVE-2016-3387
CVE CVE-2016-3388
CVE CVE-2016-3390
CVE CVE-2016-3391
MSKB 3185330
MSKB 3185331
MSKB 3185332
MSKB 3191492
MSKB 3192391
MSKB 3192392
MSKB 3192393
MSKB 3192440
MSKB 3192441
MSKB 3194798
XREF MSFT:MS16-118
XREF IAVB:2016-B-0150
Plugin Information
Plugin Output
tcp/445
The remote host is missing one of the following rollup KBs :
- 3192392
- 3185331
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple information disclosure vulnerabilities exist in the Windows GDI component due to improper handling of
objects in memory. A local attacker can exploit these vulnerabilities, via a specially crafted application, to predict
memory offsets in a call stack and bypass the Address Space Layout Randomization (ASLR) feature, resulting in
the disclosure of memory contents.
(CVE-2016-3209, CVE-2016-3262, CVE-2016-3263)
- An elevation of privilege vulnerability exists in the Windows kernel due to improper handling of objects in
memory. A local attacker can exploit this to elevate privileges and execute code in kernel mode.
(CVE-2016-3270)
- A remote code execution vulnerability exists in the Windows GDI component due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user to
visit a specially crafted website or open a specially crafted file, resulting in the execution of arbitrary code in the
context of the current user. (CVE-2016-3393)
- A remote code execution vulnerability exists in the Windows font library due to improper handling of embedded
fonts. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user to visit a specially
crafted website or open a specially crafted document file, resulting in the execution of arbitrary code in the
context of the current user.
(CVE-2016-3396)
- An elevation of privilege vulnerability exists in the Windows GDI component due to improper handling of objects
in memory. A local attacker can exploit this to elevate privileges and execute code in kernel mode.
(CVE-2016-7182)
See Also
https://technet.microsoft.com/library/security/MS16-120
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10. Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Word Viewer, Skype for
Business 2016, Lync 2010, Lync 2013, Live Meeting 2007 Console, .NET Framework 3.0 SP2, .NET Framework
3.5, .NET Framework 3.5.1, .NET Framework 4.5.2, .NET Framework 4.6, and Silverlight 5.
Risk Factor
High
192.168.100.4 420
CVSS v3.0 Base Score
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 93377
BID 93380
BID 93385
BID 93390
BID 93394
BID 93395
BID 93403
CVE CVE-2016-3209
CVE CVE-2016-3262
CVE CVE-2016-3263
CVE CVE-2016-3270
CVE CVE-2016-3393
CVE CVE-2016-3396
CVE CVE-2016-7182
MSKB 3191203
MSKB 3192391
MSKB 3185330
MSKB 3192392
MSKB 3185331
MSKB 3192393
MSKB 3185332
MSKB 3192440
MSKB 3192441
MSKB 3194798
192.168.100.4 42
MSKB 3188726
MSKB 3189039
MSKB 3189040
MSKB 3188730
MSKB 3188732
MSKB 3188731
MSKB 3188735
MSKB 3189051
MSKB 3189052
MSKB 3188740
MSKB 3188743
MSKB 3188741
MSKB 3118301
MSKB 3118317
MSKB 3118394
MSKB 3118327
MSKB 3118348
MSKB 3188397
MSKB 3188399
MSKB 3188400
MSKB 3189647
MSKB 3193713
XREF MSFT:MS16-120
XREF IAVA:2016-A-0278
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update or security rollup. It is, therefore, affected by the following
vulnerabilities :
- A remote code execution vulnerability exists in the Windows image file handling functionality due to improper
handling of image files. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user
to open a specially crafted image file from a web page or email message, resulting in the execution of arbitrary
code in the context of the current user. (CVE-2016-7212)
- An elevation of privilege vulnerability exists in Windows Input Method Editor (IME) due to improper loading
of DLL files. A local attacker can exploit this, via a specially crafted application, to elevate privileges.
(CVE-2016-7221)
- An elevation of privilege vulnerability exists in Windows Task Scheduler due to improper handling of UNC
paths. An authenticated, remote attacker can exploit this vulnerability by scheduling a new task with a specially
crafted UNC path, resulting in the execution of arbitrary code with elevated system privileges.
(CVE-2016-7222)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-130
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 94021
BID 94023
BID 94027
CVE CVE-2016-7212
CVE CVE-2016-7221
CVE CVE-2016-7222
MSKB 3193418
MSKB 3196718
MSKB 3197867
MSKB 3197868
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-130
XREF IAVA:2016-A-0321
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the Windows Animation Manager due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user to
visit a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
(CVE-2016-7205)
- An information disclosure vulnerability exists in the ATMFD component due to improper handling of Open
Type fonts. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user to visit a
specially crafted website or open a specially crafted file, resulting in the disclosure of sensitive information.
(CVE-2016-7210)
- A remote code execution vulnerability exists in the Windows Media Foundation due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user to visit
a specially crafted website or open a specially crafted document, resulting in the execution of arbitrary code in
the context of the current user.
(CVE-2016-7217)
- A remote code execution vulnerability exists in the Windows font library due to improper handling of embedded
Open Type fonts. An unauthenticated, remote attacker can exploit this vulnerability by convincing a user to visit a
specially crafted website or open a specially crafted document, resulting in the execution of arbitrary code in the
context of the current user.
(CVE-2016-7256)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-132
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 94030
BID 94033
BID 94066
BID 94156
CVE CVE-2016-7205
CVE CVE-2016-7210
CVE CVE-2016-7217
CVE CVE-2016-7256
MSKB 3203859
MSKB 3197867
MSKB 3197868
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-132
XREF IAVA:2016-A-0318
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities in the Windows Common Log File System (CLFS) driver due to improper handling of objects in
memory. A local attacker can exploit this, via a specially crafted application, to gain elevated privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-134
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 93998
BID 94007
BID 94008
BID 94009
BID 94010
BID 94011
BID 94012
BID 94013
BID 94014
BID 94015
CVE CVE-2016-0026
CVE CVE-2016-3332
CVE CVE-2016-3333
CVE CVE-2016-3334
CVE CVE-2016-3335
CVE CVE-2016-3338
CVE CVE-2016-3340
CVE CVE-2016-3342
CVE CVE-2016-3343
CVE CVE-2016-7184
MSKB 3181707
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3197867
MSKB 3197868
MSKB 3198585
MSKB 3200970
MSKB 3198586
XREF MSFT:MS16-134
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the Windows kernel that allows a local attacker, via a specially
crafted application, to bypass the Address Space Layout Randomization (ASLR) feature and retrieve the
memory address of a kernel object. (CVE-2016-7214)
- Multiple elevation of privilege vulnerabilities exist in the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these, via a specially crafted application, to execute arbitrary
code in kernel mode. (CVE-2016-7215, CVE-2016-7246, CVE-2016-7255)
- An information disclosure vulnerability exists in the bowser.sys kernel-mode driver due to improper handling
objects in memory. A local attacker can exploit this, via a specially crafted application, to disclose sensitive
information. (CVE-2016-7218)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-135
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
192.168.100.4 430
STIG Severity
II
References
BID 93991
BID 94000
BID 94004
BID 94063
BID 94064
CVE CVE-2016-7214
CVE CVE-2016-7215
CVE CVE-2016-7218
CVE CVE-2016-7246
CVE CVE-2016-7255
MSKB 3198234
MSKB 3194371
MSKB 3197867
MSKB 3197868
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-135
XREF IAVA:2016-A-0322
Exploitable With
Plugin Information
Plugin Output
tcp/445
192.168.100.4 43
C:\Windows\System32\win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.18524
94638 - MS16-137: Security Update for Windows Authentication Methods (3199173)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in Windows Virtual Secure Mode due to improper handling of
objects in memory. An authenticated, remote attacker can exploit this, via a specially crafted application, to
disclose sensitive information. (CVE-2016-7220)
- A denial of service vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when
handling specially crafted requests. An authenticated, remote attacker can exploit this to cause the host to
become non-responsive. (CVE-2016-7237)
- An elevation of privilege vulnerability exists due to improper handling of NTLM password change requests.
An authenticated, remote attacker can exploit this, via a specially crafted application, to gain administrative
privileges. (CVE-2016-7238)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-137
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
8.1 (CVSS:3.0/E:F/RL:O/RC:C)
9.0 (CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
7.4 (CVSS2#E:F/RL:OF/RC:C)
References
BID 94036
BID 94040
BID 94045
CVE CVE-2016-7220
CVE CVE-2016-7237
CVE CVE-2016-7238
MSKB 3197867
MSKB 3197868
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198510
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-137
Exploitable With
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities in the Windows Virtual Hard Disk Driver due to improper handling of user access to certain files.
A local attacker can exploit these, via a specially crafted application, to manipulate files not intended to be
available to the user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-138
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 94003
BID 94016
BID 94017
BID 94018
CVE CVE-2016-7223
CVE CVE-2016-7224
CVE CVE-2016-7225
CVE CVE-2016-7226
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-138
XREF IAVA:2016-A-0317
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected a security bypass vulnerability
in Windows Secure Boot due to the use of an insecure boot policy in firmware. A local attacker can exploit this
issue to disable code integrity checks, allowing test-signed executables and drivers to be loaded onto a target
device.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-140
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 (CVSS:3.0/E:U/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 94058
CVE CVE-2016-7247
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-140
XREF IAVB:2016-B-0162
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote Windows host is missing Cumulative Security Update
3198467. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution
vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit
a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-142
Solution
Microsoft has released a set of patches for Internet Explorer 9, 10, and 11.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 94051
BID 94052
BID 94053
BID 94055
BID 94057
BID 94059
BID 94065
CVE CVE-2016-7195
CVE CVE-2016-7196
CVE CVE-2016-7198
CVE CVE-2016-7199
CVE CVE-2016-7227
CVE CVE-2016-7239
CVE CVE-2016-7241
MSKB 3197655
MSKB 3197867
MSKB 3197868
MSKB 3197873
MSKB 3197874
MSKB 3197876
MSKB 3197877
MSKB 3198585
MSKB 3198586
MSKB 3200970
XREF MSFT:MS16-142
Plugin Information
Plugin Output
tcp/445
192.168.100.4 440
95764 - MS16-144: Cumulative Security Update for Internet Explorer (3204059)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote Windows host is missing Cumulative Security Update
3204059. It is, therefore, affected by multiple vulnerabilities, the most severe of which are remote code execution
vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit
a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-144
Solution
Microsoft has released a set of patches for Internet Explorer 9, 10, and 11.
Note that security update 3208481 in MS16-144 must also be installed in order to fully resolve CVE-2016-7278
on Windows Vista and Windows Server 2008.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 94042
BID 94716
BID 94719
192.168.100.4 44
BID 94722
BID 94723
BID 94724
BID 94725
BID 94726
CVE CVE-2016-7202
CVE CVE-2016-7278
CVE CVE-2016-7279
CVE CVE-2016-7281
CVE CVE-2016-7282
CVE CVE-2016-7283
CVE CVE-2016-7284
CVE CVE-2016-7287
MSKB 3203621
MSKB 3208481
MSKB 3205408
MSKB 3205409
MSKB 3205394
MSKB 3207752
MSKB 3205400
MSKB 3205401
MSKB 3205383
MSKB 3205386
MSKB 3206632
XREF MSFT:MS16-144
XREF EDB-ID:40793
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the Windows GDI component due to improper handling of
objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially
crafted website or open a specially crafted document file, to disclose the contents of memory.
(CVE-2016-7257)
- Multiple remote code execution vulnerabilities exist in the Windows Graphics Component due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit
a specially crafted website or open a specially crafted document file, to execute arbitrary code in the context of
the current user. (CVE-2016-7272, CVE-2016-7273)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-146
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 94739
BID 94752
BID 94755
CVE CVE-2016-7257
CVE CVE-2016-7272
CVE CVE-2016-7273
MSKB 3204724
MSKB 3205638
MSKB 3205394
MSKB 3207752
MSKB 3205400
MSKB 3205401
MSKB 3205408
MSKB 3205409
MSKB 3205383
MSKB 3205386
MSKB 3206632
XREF MSFT:MS16-146
XREF IAVA:2016-A-0346
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in Windows Uniscribe due to improper handling of objects in memory. An unauthenticated, remote
attacker can exploit this vulnerability by convincing a user to visit a specially crafted website or open a specially
crafted document, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-147
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 94758
CVE CVE-2016-7274
MSKB 3196348
MSKB 3205394
MSKB 3207752
MSKB 3205400
MSKB 3205401
MSKB 3205408
MSKB 3205409
MSKB 3205383
MSKB 3205386
MSKB 3206632
XREF MSFT:MS16-147
XREF IAVA:2016-A-0352
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in a Windows Crypto driver running in kernel mode due to
improper handling of objects in memory. A local attacker can exploit this, via a specially crafted application, to
disclose sensitive information. (CVE-2016-7219)
- An elevation of privilege vulnerability exists in the Windows installer due to improper sanitization of input,
leading to insecure library loading behavior. A local attacker can exploit this to run arbitrary code with elevated
system privileges. (CVE-2016-7292)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-149
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 (CVSS:3.0/E:U/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 94764
BID 94768
CVE CVE-2016-7219
CVE CVE-2016-7292
MSKB 3204808
MSKB 3196726
MSKB 3205394
MSKB 3207752
MSKB 3205408
MSKB 3205409
MSKB 3205400
MSKB 3205401
MSKB 3205383
MSKB 3205386
MSKB 3206632
XREF MSFT:MS16-149
XREF IAVA:2016-A-0350
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities :
- An elevation of privilege vulnerability exists in the Windows Graphics Component due to improper handling of
objects in memory. A local attacker can exploit this vulnerability, via a specially crafted application, to execute
arbitrary code in an elevated context.
(CVE-2016-7259)
- An elevation of privilege vulnerability exists in the Windows kernel-mode driver due to improper handling of
objects in memory. A local attacker can exploit this vulnerability, via a specially crafted application, to execute
arbitrary code in kernel mode.
(CVE-2016-7260)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-151
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:F/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
II
References
BID 94771
BID 94785
CVE CVE-2016-7259
CVE CVE-2016-7260
MSKB 3204723
MSKB 3205394
MSKB 3207752
MSKB 3205400
MSKB 3205401
MSKB 3205408
MSKB 3205409
MSKB 3205383
MSKB 3205386
MSKB 3206632
XREF MSFT:MS16-151
XREF IAVA:2016-A-0347
Exploitable With
Plugin Information
Plugin Output
tcp/445
192.168.100.4 450
97729 - MS17-006: Cumulative Security Update for Internet Explorer (4013073)
Synopsis
The remote host has a web browser installed that is affected by multiple vulnerabilities.
Description
The version of Internet Explorer installed on the remote Windows host is missing Cumulative Security Update
4013073. It is, therefore, affected by multiple vulnerabilities, the most severe of which are remote code execution
vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit
a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-006
Solution
Microsoft has released a set of patches for Internet Explorer 9, 10, and 11.
Note that security update 3218362 in MS17-006 must also be installed in order to fully resolve CVE-2017-0008
on Windows Vista and Windows Server 2008.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
BID 96073
BID 96077
BID 96085
192.168.100.4 45
BID 96086
BID 96087
BID 96088
BID 96094
BID 96095
BID 96645
BID 96647
BID 96724
BID 96766
CVE CVE-2017-0008
CVE CVE-2017-0009
CVE CVE-2017-0012
CVE CVE-2017-0018
CVE CVE-2017-0033
CVE CVE-2017-0037
CVE CVE-2017-0040
CVE CVE-2017-0049
CVE CVE-2017-0059
CVE CVE-2017-0130
CVE CVE-2017-0149
CVE CVE-2017-0154
MSKB 3218362
MSKB 4012204
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-006
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a remote code execution
vulnerability in the Windows PDF Library due to improper handling of objects in memory. An unauthenticated,
remote attacker can exploit this vulnerability, by convincing a user to open a specially crafted PDF file or visit a
website containing specially crafted PDF content, to execute arbitrary code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-009
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 96075
CVE CVE-2017-0023
MSKB 4012213
MSKB 4012214
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-009
XREF IAVA:2017-A-0064
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple remote code execution vulnerabilities exist in Windows Uniscribe due to improper handling of objects
in memory. An unauthenticated, remote attacker can exploit these to execute arbitrary code by convincing a user
to view a specially crafted website or open a specially crafted document file.
(CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088,
CVE-2017-0089, CVE-2017-0090)
- Multiple information disclosure vulnerabilities exist in Windows Uniscribe that allow an unauthenticated, remote
attacker to gain access to sensitive information by convincing a user to view a specially crafted website or
open a specially crafted document file. (CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111,
CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117,
CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123,
CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, CVE-2017-0128)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-011
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
STIG Severity
II
References
BID 96599
BID 96603
BID 96604
BID 96605
BID 96606
BID 96607
BID 96608
BID 96610
BID 96652
BID 96657
BID 96658
BID 96659
BID 96660
BID 96661
BID 96663
BID 96665
BID 96666
BID 96667
BID 96668
BID 96669
BID 96670
BID 96672
BID 96673
BID 96674
BID 96675
BID 96676
BID 96678
BID 96679
BID 96680
CVE CVE-2017-0072
CVE CVE-2017-0083
CVE CVE-2017-0084
CVE CVE-2017-0085
CVE CVE-2017-0086
CVE CVE-2017-0087
CVE CVE-2017-0088
CVE CVE-2017-0089
CVE CVE-2017-0090
CVE CVE-2017-0091
CVE CVE-2017-0092
CVE CVE-2017-0111
CVE CVE-2017-0112
CVE CVE-2017-0113
CVE CVE-2017-0114
CVE CVE-2017-0115
CVE CVE-2017-0116
CVE CVE-2017-0117
CVE CVE-2017-0118
CVE CVE-2017-0119
CVE CVE-2017-0120
CVE CVE-2017-0121
CVE CVE-2017-0122
CVE CVE-2017-0123
CVE CVE-2017-0124
CVE CVE-2017-0125
CVE CVE-2017-0126
CVE CVE-2017-0127
CVE CVE-2017-0128
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012583
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-011
XREF IAVA:2017-A-0066
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- Multiple elevation of privilege vulnerabilities exist in the Windows Graphics Device Interface (GDI) component
due to improper handling of objects in memory. A local attacker can exploit these vulnerabilities, via a
specially crafted application, to execute arbitrary code in kernel mode. (CVE-2017-0001, CVE-2017-0005,
CVE-2017-0025, CVE-2017-0047)
- Multiple remote code execution vulnerabilities exist in the Windows Graphics component due to improper
handling of objects in memory. An unauthenticated, remote attacker can exploit these vulnerabilities, by
convincing a user to visit a specially crafted web page or open a specially crafted document, to execute arbitrary
code. (CVE-2017-0014, CVE-2017-0108)
- An information disclosure vulnerability exists in the Windows Graphics Device Interface (GDI) component due
to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing
a user to visit a specially crafted web page or open a specially crafted document, to disclose the contents of
memory. (CVE-2017-0038)
- Multiple information disclosure vulnerabilities exist in the Windows Graphics Device Interface (GDI) component
due to improper handling of memory addresses. A local attacker can exploit these vulnerabilities, via a specially
crafted application, to disclose sensitive information. (CVE-2017-0060, CVE-2017-0062, CVE-2017-0073)
- Multiple information disclosure vulnerabilities exist in the Color Management Module (ICM32.dll) due to
improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a
user to visit a specially crafted web page, to disclose sensitive information and bypass usermode Address Space
Layout Randomization (ASLR). (CVE-2017-0061, CVE-2017-0063)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-013
Solution
Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012
R2, 10, and 2016.
Additionally, Microsoft has released a set of patches for Office 2007, Office 2010, Word Viewer, Skype for
Business 2016, Lync 2010, Lync 2010 Attendee, Lync 2013, Lync Basic 2013, Live Meeting 2007 Console, and
Silverlight 5.
Risk Factor
High
192.168.100.4 460
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 96013
BID 96023
BID 96033
BID 96034
BID 96057
BID 96626
BID 96637
BID 96638
BID 96643
BID 96713
BID 96715
BID 96722
CVE CVE-2017-0001
CVE CVE-2017-0005
CVE CVE-2017-0014
CVE CVE-2017-0025
CVE CVE-2017-0038
CVE CVE-2017-0047
CVE CVE-2017-0060
CVE CVE-2017-0061
CVE CVE-2017-0062
CVE CVE-2017-0063
CVE CVE-2017-0073
CVE CVE-2017-0108
MSKB 3127945
MSKB 3127958
192.168.100.4 46
MSKB 3141535
MSKB 3172539
MSKB 3178653
MSKB 3178656
MSKB 3178688
MSKB 3178693
MSKB 4010096
MSKB 4010299
MSKB 4010300
MSKB 4010301
MSKB 4010303
MSKB 4010304
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012497
MSKB 4012583
MSKB 4017018
MSKB 4012584
MSKB 4012606
MSKB 4013198
MSKB 4013429
MSKB 4013867
XREF MSFT:MS17-013
XREF IAVA:2017-A-0063
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities :
- An elevation of privilege vulnerability exists in the Windows Kernel API due to improper enforcement of
permissions. A local attacker can exploit this, via a specially crafted application, to run processes in an elevated
context. (CVE-2017-0050)
- An elevation of privilege vulnerability exists in the Windows Transaction Manager due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to run processes in an
elevated context. (CVE-2017-0101)
- An elevation of privilege vulnerability exists due to a failure to check the length of a buffer prior to copying
memory. A local attacker can exploit this, by copying a file to a shared folder or drive, to gain elevated privileges.
(CVE-2017-0102)
- An elevation of privilege vulnerability exists in the Windows Kernel API due to improper handling of objects
in memory. A local attacker can exploit this, via a specially crafted application, to gain elevated privileges.
(CVE-2017-0103)
See Also
https://technet.microsoft.com/library/security/ms17-017
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 96025
BID 96623
BID 96625
BID 96627
CVE CVE-2017-0050
CVE CVE-2017-0101
CVE CVE-2017-0102
CVE CVE-2017-0103
MSKB 4011981
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-017
XREF IAVA:2017-A-0068
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple elevation of privilege
vulnerabilities in the Windows kernel-mode driver due to improper handling of objects in memory. A local
attacker can exploit this, via a specially crafted application, to run arbitrary code in kernel mode.
See Also
https://technet.microsoft.com/library/security/ms17-018
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
High
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
6.3 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 96029
BID 96032
BID 96630
BID 96631
BID 96632
BID 96633
BID 96634
BID 96635
CVE CVE-2017-0024
CVE CVE-2017-0026
CVE CVE-2017-0056
CVE CVE-2017-0078
CVE CVE-2017-0079
CVE CVE-2017-0080
CVE CVE-2017-0081
CVE CVE-2017-0082
MSKB 4012497
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-018
XREF IAVA:2017-A-0069
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
Using the supplied credentials, Nessus was able to determine that the 'Guest' user belongs to groups other than
'Guests' (RID 546) or 'Domain Guests' (RID 514). Guest users should not have any additional privileges.
Solution
Edit the local or domain policy to restrict group membership for the guest account.
Risk Factor
High
7.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Plugin Information
Plugin Output
tcp/0
Domain groups :
Synopsis
Description
- A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1)
server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to
execute code on the target server.
(CVE-2017-11780)
- A denial of service vulnerability exists in the Microsoft Server Block Message (SMB) when an attacker sends
specially crafted requests to the server. An attacker who exploited this vulnerability could cause the affected
system to crash. To attempt to exploit this issue, an attacker would need to send specially crafted SMB requests
to the target system. Note that the denial of service vulnerability would not allow an attacker to execute code
or to elevate their user rights, but it could cause the affected system to stop accepting requests. The security
update addresses the vulnerability by correcting the manner in which SMB handles specially crafted client
requests.
(CVE-2017-11781)
Note that Microsoft uses AC:H for these two vulnerabilities. This could mean that an exploitable target is
configured in a certain way that may include that a publicly accessible file share is available and share
enumeration is allowed for anonymous users.
See Also
http://www.nessus.org/u?72a4ce73
http://www.nessus.org/u?42adf289
Solution
Microsoft has released a set of patches for Windows 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and
2016.
Risk Factor
High
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:U/RL:OF/RC:C)
References
BID 101110
BID 101140
CVE CVE-2017-11780
CVE CVE-2017-11781
MSKB 4041676
MSKB 4041678
MSKB 4041679
MSKB 4041681
MSKB 4041687
MSKB 4041689
MSKB 4041690
MSKB 4041691
MSKB 4041693
MSKB 4041995
MSKB 4042895
XREF MSFT:MS17-4041676
XREF MSFT:MS17-4041678
XREF MSFT:MS17-4041679
XREF MSFT:MS17-4041681
XREF MSFT:MS17-4041687
XREF MSFT:MS17-4041689
XREF MSFT:MS17-4041690
XREF MSFT:MS17-4041691
XREF MSFT:MS17-4041693
XREF MSFT:MS17-4041995
XREF MSFT:MS17-4042895
Plugin Information
Plugin Output
tcp/445
192.168.100.4 470
90625 - Oracle Java SE Multiple Vulnerabilities (April 2016 CPU)
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 91, 7 Update 101, or 6 Update 115. It is, therefore, affected by security vulnerabilities in the following
subcomponents :
- 2D
- Deployment
- Hotspot
- JAXP
- JCE
- JMX
- Security
- Serialization
See Also
http://www.nessus.org/u?ffb7b96f
http://www.nessus.org/u?ab3dbcc8
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?c856cce4
Solution
Upgrade to Oracle JDK / JRE 8 Update 91, 7 Update 101, or 6 Update 115 or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 115 or later.
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:U/RL:O/RC:C)
192.168.100.4 47
CVSS Base Score
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2016-0686
CVE CVE-2016-0687
CVE CVE-2016-0695
CVE CVE-2016-3422
CVE CVE-2016-3425
CVE CVE-2016-3426
CVE CVE-2016-3427
CVE CVE-2016-3443
CVE CVE-2016-3449
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 6
Update 151, 7 Update 141, or 8 Update 131. It is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the Networking subcomponent that allows an unauthenticated, remote attacker to
impact confidentiality and integrity.
(CVE-2017-3509)
- An unspecified flaw exists in the JCE subcomponent that allows a local attacker to gain elevated privileges.
This vulnerability does not affect Java SE version 6.
(CVE-2017-3511)
- An unspecified flaw exists in the AWT subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. This vulnerability does not affect Java SE version 6. (CVE-2017-3512)
- An unspecified flaw exists in the AWT subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3514)
- An unspecified flaw exists in the JAXP subcomponent that allows an unauthenticated, remote attacker to cause
a denial of service condition. (CVE-2017-3526)
- Multiple unspecified flaws exist in the Networking subcomponent that allow an unauthenticated, remote
attacker to gain update, insert, or delete access to unauthorized data. (CVE-2017-3533, CVE-2017-3544)
- An unspecified flaw exists in the Security subcomponent that allows an unauthenticated, remote attacker to
gain update, insert, or delete access to unauthorized data.
(CVE-2017-3539)
See Also
http://www.nessus.org/u?02dc6498
http://www.nessus.org/u?ce35fa3a
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
http://www.nessus.org/u?eb4db3c7
Solution
Upgrade to Oracle JDK / JRE 6 Update 151 / 7 Update 141 / 8 Update 131 or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
8.3 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 97727
BID 97729
BID 97731
BID 97733
BID 97737
BID 97740
BID 97745
BID 97752
CVE CVE-2017-3509
CVE CVE-2017-3511
CVE CVE-2017-3512
CVE CVE-2017-3514
CVE CVE-2017-3526
CVE CVE-2017-3533
CVE CVE-2017-3539
CVE CVE-2017-3544
Plugin Information
Plugin Output
tcp/445
The following vulnerable instance of Java is installed on the remote host :
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 10
Update 1, 8 Update 171, 7 Update 181, or 6 Update 191. It is, therefore, affected by multiple vulnerabilities
related to the following components :
- AWT
- Concurrency
- Hotspot
- Install
- JAXP
- JMX
- Libraries
- RMI
- Security
- Serialization
See Also
http://www.nessus.org/u?76507bf8
http://www.nessus.org/u?6f630e2b
http://www.nessus.org/u?9bf6e180
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 10 Update 1, 8 Update 171 / 7 Update 181 / 6 Update 191 or later. If necessary,
remove any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
8.3 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
CVSS Base Score
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
References
BID 103796
BID 103810
BID 103817
BID 103832
BID 103848
BID 103849
BID 103872
CVE CVE-2018-2783
CVE CVE-2018-2790
CVE CVE-2018-2794
CVE CVE-2018-2795
CVE CVE-2018-2796
CVE CVE-2018-2797
CVE CVE-2018-2798
CVE CVE-2018-2799
CVE CVE-2018-2800
CVE CVE-2018-2811
CVE CVE-2018-2814
CVE CVE-2018-2815
CVE CVE-2018-2825
CVE CVE-2018-2826
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 121, 7 Update 131, or 6 Update 141. It is, therefore, affected by multiple vulnerabilities :
- A vulnerability exists in the Libraries subcomponent, known as SWEET32, in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient resources can exploit this vulnerability, via a 'birthday' attack,
to detect a collision that leaks the XOR between the fixed secret and a known plaintext, allowing the disclosure
of the secret text, such as secure HTTPS cookies, and possibly resulting in the hijacking of an authenticated
session. (CVE-2016-2183)
- An unspecified flaw exists in the Libraries subcomponent that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-5546)
- An unspecified flaw exists in the Libraries subcomponent that allows an unauthenticated, remote attacker to
cause a denial of service condition. (CVE-2016-5547)
- Multiple unspecified flaws exist in the Libraries subcomponent that allow an unauthenticated, remote attacker to
disclose sensitive information.
(CVE-2016-5548, CVE-2016-5549)
- An unspecified flaw exists in the Networking subcomponent that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-5552)
- An unspecified flaw exists in the Mission Control subcomponent that allows an unauthenticated, remote
attacker to impact integrity. (CVE-2016-8328)
- Multiple unspecified flaws exist in the Networking subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3231, CVE-2017-3261)
- An unspecified flaw exists in the RMI subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3241)
- An unspecified flaw exists in the JAAS subcomponent that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2017-3252)
- An unspecified flaw exists in the 2D subcomponent that allows an unauthenticated, remote attacker to cause a
denial of service condition. (CVE-2017-3253)
- An unspecified flaw exists in the Deployment subcomponent that allows an unauthenticated, remote attacker to
disclose sensitive information.
(CVE-2017-3259)
- An unspecified flaw exists in the AWT subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3260)
- An unspecified flaw exists in the Java Mission Control subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3262)
- An unspecified flaw exists in the Libraries subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3272)
- An unspecified flaw exists in the Hotspot subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3289)
Note that CVE-2017-3241 can only be exploited by supplying data to APIs in the specified component without
using untrusted Java Web Start applications or untrusted Java applets, such as through a web service.
Note that CVE-2016-2183, CVE-2016-5546, CVE-2016-5547, CVE-2016-5552, CVE-2017-3252, and
CVE-2017-3253 can be exploited through sandboxed Java Web Start applications and sandboxed Java applets.
They can also be exploited by supplying data to APIs in the specified component without using sandboxed Java
Web Start applications or sandboxed Java applets, such as through a web service.
See Also
http://www.nessus.org/u?951bfdb7
http://www.nessus.org/u?c3776cd3
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
Solution
Upgrade to Oracle JDK / JRE 8 Update 121 / 7 Update 131 / 6 Update 141 or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
9.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)
8.6 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 92630
BID 95488
BID 95498
BID 95506
BID 95509
BID 95512
BID 95521
BID 95525
BID 95530
BID 95533
BID 95559
BID 95563
BID 95566
BID 95570
BID 95576
BID 95578
BID 95581
CVE CVE-2016-2183
CVE CVE-2016-5546
CVE CVE-2016-5547
CVE CVE-2016-5548
CVE CVE-2016-5549
CVE CVE-2016-5552
CVE CVE-2016-8328
CVE CVE-2017-3231
CVE CVE-2017-3241
CVE CVE-2017-3252
CVE CVE-2017-3253
CVE CVE-2017-3259
CVE CVE-2017-3260
CVE CVE-2017-3261
CVE CVE-2017-3262
CVE CVE-2017-3272
CVE CVE-2017-3289
Plugin Information
192.168.100.4 480
Plugin Output
tcp/445
192.168.100.4 48
106190 - Oracle Java SE Multiple Vulnerabilities (January 2018 CPU)
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 9
Update 4, 8 Update 161, 7 Update 171, or 6 Update 181. It is, therefore, affected by multiple vulnerabilities
related to the following components :
- AWT
- Deployment
- Hotspot
- I18n
- Installer
- JCE
- JGSS
- JMX
- JNDI
- JavaFX
- LDAP
- Libraries
- Serialization
See Also
http://www.nessus.org/u?29ce2b01
http://www.nessus.org/u?793c3773
http://www.nessus.org/u?cc061f9a
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 9 Update 4, 8 Update 161 / 7 Update 171 / 6 Update 181 or later. If necessary,
remove any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
CVSS v3.0 Base Score
8.3 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 102546
BID 102556
BID 102557
BID 102576
BID 102584
BID 102592
BID 102597
BID 102605
BID 102612
BID 102615
BID 102625
BID 102629
BID 102633
BID 102636
BID 102642
BID 102656
BID 102659
BID 102661
BID 102662
BID 102663
CVE CVE-2018-2579
CVE CVE-2018-2581
CVE CVE-2018-2582
CVE CVE-2018-2588
CVE CVE-2018-2599
CVE CVE-2018-2602
CVE CVE-2018-2603
CVE CVE-2018-2618
CVE CVE-2018-2627
CVE CVE-2018-2629
CVE CVE-2018-2633
CVE CVE-2018-2634
CVE CVE-2018-2637
CVE CVE-2018-2638
CVE CVE-2018-2639
CVE CVE-2018-2641
CVE CVE-2018-2657
CVE CVE-2018-2663
CVE CVE-2018-2677
CVE CVE-2018-2678
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 141, 7 Update 151, or 6 Update 161. It is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the 2D component that allows an unauthenticated, remote attacker to cause a
denial of service condition. (CVE-2017-10053)
- Multiple unspecified flaws exist in the Security component that allow an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10067, CVE-2017-10116)
- An unspecified flaw exists in the Hotspot component that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10074)
- An unspecified flaw exists in the Scripting component that allows an authenticated, remote attacker to impact
confidentiality and integrity. (CVE-2017-10078)
- An unspecified flaw exists in the Hotspot component that allows an unauthenticated, remote attacker to impact
integrity. (CVE-2017-10081)
- Multiple unspecified flaws exist in the JavaFX component that allow an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10086, CVE-2017-10114)
- Multiple unspecified flaws exist in the Libraries component that allow an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10087, CVE-2017-10090, CVE-2017-10111)
- An unspecified flaw exists in the ImageIO component that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10089)
- Multiple unspecified flaws exist in the JAXP component that allow an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10096, CVE-2017-10101)
- Multiple unspecified flaws exist in the RMI component that allow an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-10102, CVE-2017-10107)
- Multiple unspecified flaws exist in the Server component of the Java Advanced Management Console that
allow an authenticated, remote attacker to impact confidentiality, integrity, and availability.
(CVE-2017-10104, CVE-2017-10145)
- An unspecified flaw exists in the Deployment component that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2017-10105)
- Multiple unspecified flaws exist in the Serialization component that allow an unauthenticated, remote attacker to
exhaust available memory, resulting in a denial of service condition. (CVE-2017-10108, CVE-2017-10109)
- An unspecified flaw exists in the AWT component that allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-10110)
- Multiple unspecified flaws exist in the JCE component that allow an unauthenticated, remote attacker to
disclose sensitive information. (CVE-2017-10115, CVE-2017-10118, CVE-2017-10135)
- An unspecified flaw exists in the Server component of the Java Advanced Management Console that allows an
unauthenticated, remote attacker to disclose sensitive information. (CVE-2017-10117)
- An unspecified flaw exists in the Server component of the Java Advanced Management Console that allows an
unauthenticated, remote attacker to impact confidentiality and integrity. (CVE-2017-10121)
- An unspecified flaw exists in the Deployment component that allows a local attacker to impact confidentiality,
integrity, and availability. (CVE-2017-10125)
- Multiple unspecified flaws exist in the Security component that allow an unauthenticated, remote attacker to
disclose sensitive information. (CVE-2017-10176, CVE-2017-10193, CVE-2017-10198)
- An unspecified flaw exists in the JAX-WS component that allows an unauthenticated, remote attacker to impact
confidentiality and availability. (CVE-2017-10243)
See Also
http://www.nessus.org/u?76f5def7
http://www.nessus.org/u?755142b1
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 8 Update 141 / 7 Update 151 / 6 Update 161 or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
9.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)
8.3 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 99643
BID 99659
BID 99662
BID 99670
BID 99674
BID 99703
BID 99706
BID 99707
BID 99712
BID 99719
BID 99726
BID 99731
BID 99734
BID 99752
BID 99756
BID 99774
BID 99782
BID 99788
BID 99797
BID 99804
BID 99809
BID 99818
BID 99827
BID 99832
BID 99835
BID 99839
BID 99842
BID 99846
BID 99847
BID 99851
BID 99853
BID 99854
CVE CVE-2017-10053
CVE CVE-2017-10067
CVE CVE-2017-10074
CVE CVE-2017-10078
CVE CVE-2017-10081
CVE CVE-2017-10086
CVE CVE-2017-10087
CVE CVE-2017-10089
CVE CVE-2017-10090
CVE CVE-2017-10096
CVE CVE-2017-10101
CVE CVE-2017-10102
CVE CVE-2017-10104
CVE CVE-2017-10105
CVE CVE-2017-10107
CVE CVE-2017-10108
CVE CVE-2017-10109
CVE CVE-2017-10110
CVE CVE-2017-10111
CVE CVE-2017-10114
CVE CVE-2017-10115
CVE CVE-2017-10116
CVE CVE-2017-10117
CVE CVE-2017-10118
CVE CVE-2017-10121
CVE CVE-2017-10125
CVE CVE-2017-10135
CVE CVE-2017-10145
CVE CVE-2017-10176
CVE CVE-2017-10193
CVE CVE-2017-10198
CVE CVE-2017-10243
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 8
Update 111, 7 Update 121, or 6 Update 131. It is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the Libraries subcomponent that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-5542)
- An unspecified flaw exists in the JMX subcomponent that allows an unauthenticated, remote attacker to impact
integrity. (CVE-2016-5554)
- An unspecified flaw exists in the 2D subcomponent that allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2016-5556)
- An unspecified flaw exists in the AWT subcomponent that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2016-5568)
- Multiple unspecified flaws exist in the Hotspot subcomponent that allow an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2016-5573, CVE-2016-5582)
- An unspecified flaw exists in the Networking subcomponent that allows an unauthenticated, remote attacker to
disclose sensitive information.
(CVE-2016-5597)
See Also
http://www.nessus.org/u?bac902d5
http://www.nessus.org/u?10d5f7a6
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 8 Update 111 / 7 Update 121 / 6 Update 131 or later. If necessary, remove any
affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
9.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.3 (CVSS:3.0/E:U/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 93618
BID 93621
BID 93623
BID 93628
BID 93636
BID 93637
BID 93643
CVE CVE-2016-5542
CVE CVE-2016-5554
CVE CVE-2016-5556
CVE CVE-2016-5568
CVE CVE-2016-5573
CVE CVE-2016-5582
CVE CVE-2016-5597
XREF EDB-ID:118073
Plugin Information
Plugin Output
tcp/445
192.168.100.4 490
103963 - Oracle Java SE Multiple Vulnerabilities (October 2017 CPU)
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 9
Update 1, 8 Update 151, 7 Update 161, or 6 Update 171. It is, therefore, affected by multiple vulnerabilities
related to the following components :
- 2D (Little CMS 2)
- Deployment
- Hotspot
- JAX-WS
- JAXP
- Javadoc
- Libraries
- Networking
- RMI
- Security
- Serialization
- Smart Card IO
- Util (zlib)
See Also
http://www.nessus.org/u?ffb85cfa
http://www.nessus.org/u?dfeae1af
http://www.nessus.org/u?bbe7f5cf
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 9 Update 1, 8 Update 151 / 7 Update 161 / 6 Update 171 or later. If necessary,
remove any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
High
192.168.100.4 49
CVSS v3.0 Base Score
9.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)
8.6 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 101315
BID 101319
BID 101321
BID 101328
BID 101333
BID 101338
BID 101341
BID 101348
BID 101354
BID 101355
BID 101369
BID 101378
BID 101382
BID 101384
BID 101396
BID 101413
CVE CVE-2016-9841
CVE CVE-2016-10165
CVE CVE-2017-10274
CVE CVE-2017-10281
CVE CVE-2017-10285
CVE CVE-2017-10293
CVE CVE-2017-10295
CVE CVE-2017-10309
CVE CVE-2017-10345
CVE CVE-2017-10346
CVE CVE-2017-10347
CVE CVE-2017-10348
CVE CVE-2017-10349
CVE CVE-2017-10350
CVE CVE-2017-10355
CVE CVE-2017-10356
CVE CVE-2017-10357
CVE CVE-2017-10388
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of the Oracle VM VirtualBox application installed on the remote host is 5.0.x prior to 5.0.28 or 5.1.x
prior to 5.1.8. It is, therefore, affected by multiple vulnerabilities :
- Multiple unspecified flaws exist in the Core subcomponent that allow a local attacker to gain elevated
privileges. (CVE-2016-5501, CVE-2016-5538)
- An unspecified flaw exists in the VirtualBox Remote Desktop Extension (VRDE) subcomponent that allows an
unauthenticated, remote attacker to impact confidentiality and integrity. (CVE-2016-5605)
- Multiple unspecified flaws exist in the Core subcomponent that allow a local attacker to cause a denial of
service condition. (CVE-2016-5608, CVE-2016-5613)
- An unspecified flaw exists in the Core subcomponent that allows a local attacker to impact on integrity and
availability. (CVE-2016-5610)
- An unspecified flaw exists in the Core subcomponent that allows a local attacker to disclose sensitive
information. (CVE-2016-5611)
- A flaw exists in the OpenSSL subcomponent, specifically within the ssl_parse_clienthello_tlsext() function
in t1_lib.c due, to improper handling of overly large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via large OCSP Status Request extensions, to exhaust
memory resources, resulting in a denial of service condition.
(CVE-2016-6304)
See Also
http://www.nessus.org/u?bac902d5
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 5.0.28 / 5.1.8 or later as referenced in the October 2016 Oracle Critical
Patch Update advisory.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS v3.0 Temporal Score
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
9.4 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N)
7.0 (CVSS2#E:U/RL:OF/RC:C)
References
BID 93150
BID 93685
BID 93687
BID 93697
BID 93711
BID 93718
BID 93728
BID 93744
CVE CVE-2016-5501
CVE CVE-2016-5538
CVE CVE-2016-5605
CVE CVE-2016-5608
CVE CVE-2016-5610
CVE CVE-2016-5611
CVE CVE-2016-5613
CVE CVE-2016-6304
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Oracle VM VirtualBox installed on the remote host is 5.0.x prior to 5.0.32 or 5.1.x prior to 5.1.14. It
is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the GUI subcomponent that allows an unauthenticated, remote attacker to impact
confidentiality, integrity, and availability.
(CVE-2016-5545)
- An unspecified flaw exists in the Shared Folder subcomponent that allows a local attacker to impact integrity
and availability. (CVE-2017-3290)
- An unspecified flaw exists in the GUI subcomponent that allows an authenticated, remote attacker to execute
arbitrary code. (CVE-2017-3316)
- An unspecified flaw exists in the VirtualBox SVGA Emulation subcomponent that allows a local attacker to
impact integrity and availability. (CVE-2017-3332)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
http://www.nessus.org/u?89a8e429
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 5.0.32 / 5.1.14 or later as referenced in the January 2017 Oracle
Critical Patch Update advisory.
Risk Factor
High
6.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
5.7 (CVSS:3.0/E:P/RL:O/RC:C)
CVSS Base Score
8.5 (CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)
6.7 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 95579
BID 95590
BID 95599
BID 95601
CVE CVE-2016-5545
CVE CVE-2017-3290
CVE CVE-2017-3316
CVE CVE-2017-3332
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Oracle VM VirtualBox installed on the remote host is 5.0.x prior to 5.0.38 or 5.1.x prior to 5.1.20. It
is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the Core component that allows a local attacker to disclose potentially sensitive
information. (CVE-2017-3513)
- A flaw exists in the Shared Folder component, specifically when cooperating guests access files within a
shared folder while moving it. A local attacker within a guest can exploit this to read arbitrary files on the host.
(CVE-2017-3538)
- Multiple unspecified flaws exist in the Core component that allow a local attacker to impact confidentiality,
integrity, and availability. (CVE-2017-3558, CVE-2017-3559, CVE-2017-3561, CVE-2017-3563,
CVE-2017-3576)
- An unspecified flaw exists in the Core component that allows a local attacker to impact integrity and availability.
(CVE-2017-3575)
- An unspecified flaw exists in the Shared Folder component that allows a local attacker to impact integrity and
availability. (CVE-2017-3587)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
http://www.nessus.org/u?623d2c22
https://www.virtualbox.org/wiki/Changelog
http://www.nessus.org/u?eb4db3c7
Solution
Upgrade to Oracle VM VirtualBox version 5.0.38 / 5.1.20 or later as referenced in the April 2017 Oracle Critical
Patch Update advisory.
Note that vulnerability CVE-2017-3538 was fixed in versions 5.0.34 and 5.1.16.
Risk Factor
High
8.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H)
CVSS v3.0 Temporal Score
7.6 (CVSS:3.0/E:P/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 97698
BID 97730
BID 97732
BID 97736
BID 97739
BID 97744
BID 97750
BID 97755
BID 97759
CVE CVE-2017-3513
CVE CVE-2017-3558
CVE CVE-2017-3559
CVE CVE-2017-3561
CVE CVE-2017-3563
CVE CVE-2017-3575
CVE CVE-2017-3576
CVE CVE-2017-3587
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The Oracle VM VirtualBox application installed on the remote host is a version prior to 4.0.36, 4.1.44, 4.2.36,
4.3.34, or 5.0.10. It is, therefore, affected by the following vulnerabilities :
- A denial of service vulnerability exists due to an infinite loop condition in the KVM subsystem of the Linux
kernel. A local attacker can exploit this, by triggering many Alignment Check (#AC) exceptions, to cause an OS
panic or hang. (CVE-2015-5307)
- A denial of service vulnerability exists due to an infinite loop condition in the KVM subsystem of the Linux
kernel. A local attacker can exploit this, by triggering many Debug (#DB) exceptions, to cause an OS panic or
hang.
(CVE-2015-8104)
See Also
http://www.nessus.org/u?ab4ebec1
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 4.0.36 / 4.1.44 / 4.2.36 / 4.3.34 / 5.0.10 or later as referenced in the
January 2016 Oracle Critical Patch Update advisory.
Risk Factor
High
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 (CVSS2#E:U/RL:OF/RC:C)
References
BID 77415
BID 77524
BID 77528
CVE CVE-2015-5307
CVE CVE-2015-7183
CVE CVE-2015-8104
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The Oracle VM VirtualBox application installed on the remote host is a version prior to 5.0.22. It is, therefore,
affected by multiple vulnerabilities in the bundled OpenSSL component :
- A heap buffer overflow condition exists in the EVP_EncodeUpdate() function within file crypto/evp/encode.c
that is triggered when handling a large amount of input data. An unauthenticated, remote attacker can exploit
this to cause a denial of service condition. (CVE-2016-2105)
- A heap buffer overflow condition exists in the EVP_EncryptUpdate() function within file crypto/evp/evp_enc.c
that is triggered when handling a large amount of input data after a previous call occurs to the same function
with a partial block. An unauthenticated, remote attacker can exploit this to cause a denial of service condition.
(CVE-2016-2106)
- Multiple unspecified flaws exist in the d2i BIO functions when reading ASN.1 data from a BIO due to invalid
encoding causing a large allocation of memory.
An unauthenticated, remote attacker can exploit these to cause a denial of service condition through resource
exhaustion. (CVE-2016-2109)
- An out-of-bounds read error exists in the X509_NAME_oneline() function within file crypto/x509/x509_obj.c
when handling very long ASN1 strings. An unauthenticated, remote attacker can exploit this to disclose the
contents of stack memory.
(CVE-2016-2176)
See Also
http://www.nessus.org/u?453b5f8c
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 5.0.22 or later as referenced in the July 2016 Oracle Critical Patch
Update advisory.
Risk Factor
High
CVSS Base Score
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
6.1 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 87940
BID 89744
BID 89746
BID 89757
BID 89760
CVE CVE-2016-2105
CVE CVE-2016-2106
CVE CVE-2016-2107
CVE CVE-2016-2109
CVE CVE-2016-2176
CVE CVE-2016-3612
XREF EDB-ID:39768
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host has an SSH client that is affected by multiple vulnerabilities.
Description
The remote host has a version of PuTTY installed that is prior to 0.71. It is, therefore, affected by multiple
vulnerabilities including:
- A remotely triggerable memory overwrite in RSA key exchange can occur before host key verification.
(CVE-2019-9894)
See Also
http://www.nessus.org/u?fc188a9c http://www.nessus.org/u?
cd82820f http://www.nessus.org/u?e116cf63
http://www.nessus.org/u?39988fba http://www.nessus.org/u?
50d03d73 http://www.nessus.org/u?dc4b5e69
http://www.nessus.org/u?d52aebfd http://www.nessus.org/u?
819250a8
http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
Solution
Risk Factor
High
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
BID 107484
BID 107523
CVE CVE-2019-9894
CVE CVE-2019-9895
CVE CVE-2019-9896
CVE CVE-2019-9897
CVE CVE-2019-9898
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between
the affected service and clients.
Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that
these versions will be used only if the client or server support nothing better), many web browsers implement
this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is
recommended that these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
See Also
https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568
Solution
Risk Factor
High
7.1 (CVSS2#AV:N/AC:M/Au:N/C:C/I:N/A:N)
Plugin Information
Plugin Output
tcp/636
and the server supports at least one cipher. Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between
the affected service and clients.
Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that
these versions will be used only if the client or server support nothing better), many web browsers implement
this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is
recommended that these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
See Also
https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568
Solution
Risk Factor
High
7.1 (CVSS2#AV:N/AC:M/Au:N/C:C/I:N/A:N)
Plugin Information
Plugin Output
tcp/3269
and the server supports at least one cipher. Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-0202)
- An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce cross-domain
policies, which could allow an attacker to access information from one domain and inject it into another domain.
(CVE-2017-0210)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2017-0201)
See Also
http://www.nessus.org/u?e9bccd2b
http://www.nessus.org/u?782139c0
http://www.nessus.org/u?d871fd1d
http://www.nessus.org/u?2731a8f6
Solution
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
192.168.100.4 510
CVSS Base Score
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 97441
BID 97454
BID 97512
CVE CVE-2017-0201
CVE CVE-2017-0202
CVE CVE-2017-0210
MSKB 4015549
MSKB 4015551
MSKB 4015550
MSKB 4014661
XREF MSFT:MS17-4015549
XREF MSFT:MS17-4015551
XREF MSFT:MS17-4015550
XREF MSFT:MS17-4014661
Plugin Information
Plugin Output
tcp/445
KB : 4014661
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18639
Note: The fix for this issue is available in either of the following updates:
- KB4014661 : Cumulative Security Update for Internet Explorer
- KB4015550 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 51
108971 - Security Updates for Internet Explorer (April 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-1004)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-0870, CVE-2018-0991, CVE-2018-0997, CVE-2018-1018, CVE-2018-1020)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0988, CVE-2018-0996, CVE-2018-1001)
- An information disclosure vulnerability exists in the way that the scripting engine handles objects in memory
in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could provide an
attacker with information to further compromise the user's computer or data. (CVE-2018-0981, CVE-2018-0989,
CVE-2018-1000)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Internet Explorer. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system.
(CVE-2018-0987)
See Also
http://www.nessus.org/u?b665658e
http://www.nessus.org/u?e474951c
http://www.nessus.org/u?2d3b2bb1
http://www.nessus.org/u?cf0e57cc
Solution
Microsoft has released the following security updates to address this issue:
-KB4093114
-KB4093123
-KB4093118
-KB4092946
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-0870
CVE CVE-2018-0981
CVE CVE-2018-0987
CVE CVE-2018-0988
CVE CVE-2018-0989
CVE CVE-2018-0991
CVE CVE-2018-0996
CVE CVE-2018-0997
CVE CVE-2018-1000
CVE CVE-2018-1001
CVE CVE-2018-1004
CVE CVE-2018-1018
CVE CVE-2018-1020
MSKB 4093114
MSKB 4093123
MSKB 4093118
MSKB 4092946
XREF MSFT:MS18-4093114
XREF MSFT:MS18-4093123
XREF MSFT:MS18-4093118
XREF MSFT:MS18-4092946
Plugin Information
Plugin Output
tcp/445
KB : 4092946
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18978
Note: The fix for this issue is available in either of the following updates:
- KB4092946 : Cumulative Security Update for Internet Explorer
- KB4093114 : Windows 8.1 / Server 2012 R2 Monthly Rollup
123951 - Security Updates for Internet Explorer (April 2019)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-0752, CVE-2019-0753, CVE-2019-0862)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise
the users system. (CVE-2019-0835)
- A tampering vulnerability exists when Microsoft browsers do not properly validate input under specific
conditions. An attacker who exploited the vulnerability could pass custom command line parameters.
(CVE-2019-0764)
See Also
http://www.nessus.org/u?60dedb61
http://www.nessus.org/u?78333a24
http://www.nessus.org/u?6116930e
http://www.nessus.org/u?3b9c0466
http://www.nessus.org/u?c8128373
Solution
Microsoft has released the following security updates to address this issue:
-KB4493446
-KB4493471
-KB4493472
-KB4493451
-KB4493435
Risk Factor
High
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2019-0752
CVE CVE-2019-0753
CVE CVE-2019-0764
CVE CVE-2019-0835
CVE CVE-2019-0862
MSKB 4493446
MSKB 4493471
MSKB 4493472
MSKB 4493451
MSKB 4493435
XREF MSFT:MS19-4493446
XREF MSFT:MS19-4493471
XREF MSFT:MS19-4493472
XREF MSFT:MS19-4493451
XREF MSFT:MS19-4493435
Plugin Information
Plugin Output
tcp/445
KB : 4493435
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19326
Note: The fix for this issue is available in either of the following updates:
- KB4493435 : Cumulative Security Update for Internet Explorer
- KB4493446 : Windows 8.1 / Server 2012 R2 Monthly Rollup
104890 - Security Updates for Internet Explorer (August 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in
memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could
execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability
could gain the same user rights as the current user. (CVE-2017-0228)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-8651)
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in
memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could
execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability
could gain the same user rights as the current user. (CVE-2017-8635, CVE-2017-8641)
- A remote code execution vulnerability exists in the way Microsoft browsers handle objects in memory while
rendering content. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2017-8669)
- A remote code execution vulnerability exists when Microsoft browsers improperly access objects in memory.
The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. An attacker who successfully exploited the vulnerability could gain the same user
rights as the current user. (CVE-2017-8653)
- A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render
content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker
could execute arbitrary code in the context of the current user. In a web-based attack scenario, an attacker could
host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers and then
convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for
initialization" in an application or Microsoft Office document that hosts the related rendering engine.
The attacker could also take advantage of compromised websites, and websites that accept or host user-
provided content or advertisements. These websites could contain specially crafted content that could exploit
the vulnerability. An attacker who successfully exploited the vulnerability could gain the same user rights as the
current user. (CVE-2017-8636)
See Also
http://www.nessus.org/u?8d0edc6a
http://www.nessus.org/u?1d4d1833
http://www.nessus.org/u?bf044da8
http://www.nessus.org/u?5a9af664
Solution
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 98164
BID 100055
BID 100056
BID 100057
BID 100058
BID 100059
BID 100068
CVE CVE-2017-0228
CVE CVE-2017-8635
CVE CVE-2017-8636
CVE CVE-2017-8641
CVE CVE-2017-8651
CVE CVE-2017-8653
CVE CVE-2017-8669
MSKB 4034733
MSKB 4034681
MSKB 4034664
MSKB 4034665
XREF MSFT:MS17-4034733
XREF MSFT:MS17-4034681
XREF MSFT:MS17-4034664
XREF MSFT:MS17-4034665
Plugin Information
Plugin Output
tcp/445
KB : 4034733
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18763
Note: The fix for this issue is available in either of the following updates:
- KB4034733 : Cumulative Security Update for Internet Explorer
- KB4034681 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 520
111695 - Security Updates for Internet Explorer (August 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8353, CVE-2018-8371, CVE-2018-8373, CVE-2018-8389)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8403)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-8355, CVE-2018-8372, CVE-2018-8385)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly allow cross-frame
interaction. An attacker who successfully exploited this vulnerability could allow an attacker to obtain browser
frame or window state from a different domain. For an attack to be successful, an attacker must persuade a user
to open a malicious website from a secure website.
This update addresses the vulnerability by denying permission to read the state of the object model, to which
frames or windows on different domains should not have access. (CVE-2018-8351)
- A remote code execution vulnerability exists when Internet Explorer improperly validates hyperlinks before
loading executable libraries. An attacker who successfully exploited this vulnerability could take control of an
affected system. An attacker could then install programs; view, change, or delete data; or create new accounts
with full user rights.
(CVE-2018-8316)
See Also
http://www.nessus.org/u?f5f0e9e7
http://www.nessus.org/u?82e63681
http://www.nessus.org/u?c7990c33
http://www.nessus.org/u?f8d177a9
http://www.nessus.org/u?3a469b20
192.168.100.4 52
Solution
Microsoft has released the following security updates to address this issue:
-KB4343205
-KB4343898
-KB4343900
-KB4343901
Note that CVE-2018-8316 notes that users can install the Security-Only patch to cover this vulnerability
(KB4343899).
Refer to the link for KB4343899 for more information.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-8316
CVE CVE-2018-8351
CVE CVE-2018-8353
CVE CVE-2018-8355
CVE CVE-2018-8371
CVE CVE-2018-8372
CVE CVE-2018-8373
CVE CVE-2018-8385
CVE CVE-2018-8389
CVE CVE-2018-8403
MSKB 4343205
MSKB 4343898
MSKB 4343900
MSKB 4343901
XREF MSFT:MS18-4343205
XREF MSFT:MS18-4343898
XREF MSFT:MS18-4343900
XREF MSFT:MS18-4343901
Exploitable With
Plugin Information
Plugin Output
tcp/445
KB : 4343205
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19101
Note: The fix for this issue is available in either of the following updates:
- KB4343205 : Cumulative Security Update for Internet Explorer
- KB4343898 : Windows 8.1 / Server 2012 R2 Monthly Rollup
105188 - Security Updates for Internet Explorer (December 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2017-11894, CVE-2017-11895, CVE-2017-11912, CVE-2017-11930)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2017-11887, CVE-2017-11906)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2017-11919)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11886, CVE-2017-11890, CVE-2017-11901, CVE-2017-11903, CVE-2017-11907,
CVE-2017-11913)
See Also
http://www.nessus.org/u?47a822ee
http://www.nessus.org/u?b8a7a2b3
http://www.nessus.org/u?18bd5547
http://www.nessus.org/u?db8ca30f
Solution
Microsoft has released the following security updates to address this issue:
-KB4054520
-KB4052978
-KB4054519
-KB4054518
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 102045
BID 102046
BID 102047
BID 102053
BID 102054
BID 102058
BID 102062
BID 102063
BID 102078
BID 102082
BID 102091
BID 102092
BID 102093
CVE CVE-2017-11886
CVE CVE-2017-11887
CVE CVE-2017-11890
CVE CVE-2017-11894
CVE CVE-2017-11895
CVE CVE-2017-11901
CVE CVE-2017-11903
CVE CVE-2017-11906
CVE CVE-2017-11907
CVE CVE-2017-11912
CVE CVE-2017-11913
CVE CVE-2017-11919
CVE CVE-2017-11930
MSKB 4054520
MSKB 4052978
MSKB 4054519
MSKB 4054518
XREF MSFT:MS17-4054520
XREF MSFT:MS17-4052978
XREF MSFT:MS17-4054519
XREF MSFT:MS17-4054518
Plugin Information
Plugin Output
tcp/445
KB : 4052978
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18860
Note: The fix for this issue is available in either of the following updates:
- KB4052978 : Cumulative Security Update for Internet Explorer
- KB4054519 : Windows 8.1 / Server 2012 R2 Monthly Rollup
119774 - Security Updates for Internet Explorer (December 2018 OOB)
Synopsis
The Internet Explorer installation on the remote host is affected by a remote code execution vulnerability.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by a
remote code execution vulnerability:
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. If the current user is logged on with administrative user rights, an attacker who successfully
exploited the vulnerability could take control of an affected system. An attacker could then install programs; view,
change, or delete data; or create new accounts with full user rights. (CVE-2018-8653)
See Also
http://www.nessus.org/u?7cb04547
Solution
Microsoft has released the following security updates to address this issue:
-KB4483187
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-8653
MSKB 4483187
XREF MSFT:MS18-4483187
Plugin Information
Plugin Output
tcp/445
KB : 4483187
- C:\Windows\system32\jscript.dll has not been patched.
Remote version : 5.8.9600.16384
Should be : 5.8.9600.19230
119594 - Security Updates for Internet Explorer (December 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8631)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8643)
- A remote code execution vulnerability exists when the Internet Explorer VBScript execution policy does not
properly restrict VBScript under specific conditions. An attacker who exploited the vulnerability could run arbitrary
code with medium-integrity level privileges (the permissions of the current user). (CVE-2018-8619)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8625)
See Also
http://www.nessus.org/u?2da08abc
http://www.nessus.org/u?56bb4eaa
http://www.nessus.org/u?4b518909
http://www.nessus.org/u?720406bc
http://www.nessus.org/u?801bfd5d
Solution
Microsoft has released the following security updates to address this issue:
-KB4471325
-KB4471320
-KB4471318
-KB4471330
-KB4470199
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 106117
BID 106118
BID 106119
BID 106122
CVE CVE-2018-8619
CVE CVE-2018-8625
CVE CVE-2018-8631
CVE CVE-2018-8643
MSKB 4471325
MSKB 4471320
MSKB 4471318
MSKB 4471330
MSKB 4470199
XREF MSFT:MS18-4471325
XREF MSFT:MS18-4471320
XREF MSFT:MS18-4471318
XREF MSFT:MS18-4471330
XREF MSFT:MS18-4470199
Plugin Information
Plugin Output
192.168.100.4 530
tcp/445
KB : 4470199
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19204
Note: The fix for this issue is available in either of the following updates:
- KB4470199 : Cumulative Security Update for Internet Explorer
- KB4471320 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 53
106804 - Security Updates for Internet Explorer (February 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0866)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-0840)
See Also
http://www.nessus.org/u?ef621048
http://www.nessus.org/u?a005ee97
http://www.nessus.org/u?c58b06f4
http://www.nessus.org/u?81ed62f4
Solution
Microsoft has released the following security updates to address this issue:
-KB4074598
-KB4074736
-KB4074593
-KB4074594
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2018-0840
CVE CVE-2018-0866
MSKB 4074598
MSKB 4074736
MSKB 4074593
MSKB 4074594
XREF MSFT:MS18-4074598
XREF MSFT:MS18-4074736
XREF MSFT:MS18-4074593
XREF MSFT:MS18-4074594
Plugin Information
Plugin Output
tcp/445
KB : 4074736
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18921
Note: The fix for this issue is available in either of the following updates:
- KB4074736 : Cumulative Security Update for Internet Explorer
- KB4074593 : Windows 8.1 / Server 2012 R2 Monthly Rollup
122131 - Security Updates for Internet Explorer (February 2019)
Synopsis
The Internet Explorer installation on the remote host is missing a security update.
Description
The Internet Explorer installation on the remote host is missing a security update. It is, therefore, affected by the
following vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer accesses objects in memory. The
vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of
the current user. (CVE-2019-0606)
- A spoofing vulnerability exists when Microsoft browsers improperly handles specific redirects. An attacker who
successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate website.
(CVE-2019-0654)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack
to be successful, an attacker must persuade a user to open a malicious website. (CVE-2019-0676)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker
who successfully exploited this vulnerability could obtain information to further compromise the user's system.
(CVE-2019-0663)
Solution
Microsoft has released the following security updates to address this issue:
-KB4487000
-KB4487023
-KB4486563
-KB4486474
-KB4487025
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
CVE CVE-2019-0606
CVE CVE-2019-0654
CVE CVE-2019-0663
CVE CVE-2019-0676
MSKB 4487000
MSKB 4487023
MSKB 4486563
MSKB 4486474
MSKB 4487025
XREF MSFT:MS19-4487000
XREF MSFT:MS19-4487023
XREF MSFT:MS19-4486563
XREF MSFT:MS19-4486474
XREF MSFT:MS19-4487025
Plugin Information
Plugin Output
tcp/445
KB : 4486474
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19262
Note: The fix for this issue is available in either of the following updates:
- KB4486474 : Cumulative Security Update for Internet Explorer
- KB4487000 : Windows 8.1 / Server 2012 R2 Monthly Rollup
105546 - Security Updates for Internet Explorer (January 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-0762, CVE-2018-0772)
See Also
http://www.nessus.org/u?c95c02b2
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
BID 102365
CVE CVE-2018-0762
CVE CVE-2018-0772
MSKB 4056568
MSKB 4056895
MSKB 4056894
MSKB 4056896
XREF MSFT:MS18-4056568
XREF MSFT:MS18-4056895
XREF MSFT:MS18-4056894
XREF MSFT:MS18-4056896
Plugin Information
Plugin Output
tcp/445
KB : 4056568
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18894
Note: The fix for this issue is available in either of the following updates:
- KB4056568 : Cumulative Security Update for Internet Explorer
- KB4056895 : Windows 8.1 / Server 2012 R2 Monthly Rollup
121023 - Security Updates for Internet Explorer (January 2019)
Synopsis
The Internet Explorer installation on the remote host is missing a security update.
Description
The Internet Explorer installation on the remote host is missing a security update. It is, therefore, affected by the
following vulnerability :
- A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input. An
attacker could execute arbitrary code in the context of the current user. (CVE-2019-0541)
See Also
http://www.nessus.org/u?5fa9f1a3
http://www.nessus.org/u?be3b897d
http://www.nessus.org/u?df36ff32
http://www.nessus.org/u?9c55a9f6
http://www.nessus.org/u?14883957
Solution
Microsoft has released the following security updates to address this issue:
-KB4480963
-KB4480968
-KB4480970
-KB4480965
-KB4480975
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
8.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
8.1 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2019-0541
MSKB 4480963
MSKB 4480968
MSKB 4480970
MSKB 4480965
MSKB 4480975
XREF MSFT:MS19-4480963
XREF MSFT:MS19-4480968
XREF MSFT:MS19-4480970
XREF MSFT:MS19-4480965
XREF MSFT:MS19-4480975
Plugin Information
Plugin Output
tcp/445
KB : 4480965
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19236
Note: The fix for this issue is available in either of the following updates:
- KB4480965 : Cumulative Security Update for Internet Explorer
- KB4480963 : Windows 8.1 / Server 2012 R2 Monthly Rollup
104891 - Security Updates for Internet Explorer (July 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A security feature bypass vulnerability exists when Microsoft browsers improperly handle redirect requests.
The vulnerability allows Microsoft browsers to bypass CORS redirect restrictions, and to follow redirect requests
that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the
browser to send data that would otherwise be restricted to a destination website of the attacker's choice.
(CVE-2017-8592)
- A spoofing vulnerability exists when an affected Microsoft browser does not properly parse HTTP content.
An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially
crafted website. The specially crafted website could either spoof content or serve as a pivot to chain an attack
with other vulnerabilities in web services. (CVE-2017-8602)
- A remote code execution vulnerability exists in the way that the VBScript engine, when rendered in Internet
Explorer, handles objects in memory. In a web-based attack scenario, an attacker could host a specially crafted
website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view
the website. An attacker could also embed an ActiveX control marked "safe for initialization" in
an application or Microsoft Office document that hosts the Internet Explorer rendering engine. The attacker
could also take advantage of compromised websites and websites that accept or host user-provided content
or advertisements. These websites could contain specially crafted content that could exploit this vulnerability.
An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.
(CVE-2017-8618)
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in
memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could
execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability
could gain the same user rights as the current user. (CVE-2017-8606, CVE-2017-8607, CVE-2017-8608)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory via
the Microsoft Windows Text Services Framework. The vulnerability could corrupt memory in such a way that an
attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited
the vulnerability could gain the same user rights as the current user. (CVE-2017-8594)
See Also
http://www.nessus.org/u?60b27ab9
http://www.nessus.org/u?23066c63
http://www.nessus.org/u?38156f30
http://www.nessus.org/u?e9951911
Solution
192.168.100.4 540
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 99390
BID 99396
BID 99399
BID 99401
BID 99408
BID 99410
BID 99412
CVE CVE-2017-8592
CVE CVE-2017-8594
CVE CVE-2017-8602
CVE CVE-2017-8606
CVE CVE-2017-8607
CVE CVE-2017-8608
CVE CVE-2017-8618
MSKB 4025336
MSKB 4025331
MSKB 4025341
MSKB 4025252
XREF MSFT:MS17-4025336
XREF MSFT:MS17-4025331
XREF MSFT:MS17-4025341
XREF MSFT:MS17-4025252
192.168.100.4 54
Plugin Information
Plugin Output
tcp/445
KB : 4025252
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18739
Note: The fix for this issue is available in either of the following updates:
- KB4025252 : Cumulative Security Update for Internet Explorer
- KB4025336 : Windows 8.1 / Server 2012 R2 Monthly Rollup
110991 - Security Updates for Internet Explorer (July 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-8287, CVE-2018-8288, CVE-2018-8291)
- A security feature bypass vulnerability exists when Microsoft Internet Explorer improperly handles requests
involving UNC resources. An attacker who successfully exploited the vulnerability could force the browser to load
data that would otherwise be restricted.
(CVE-2018-0949)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8242, CVE-2018-8296)
See Also
http://www.nessus.org/u?156c87ff
http://www.nessus.org/u?e0106ae8
http://www.nessus.org/u?0c32edc0
http://www.nessus.org/u?d021f588
Solution
Microsoft has released the following security updates to address this issue:
-KB4339093
-KB4338815
-KB4338830
-KB4338818
Risk Factor
High
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 104620
BID 104622
BID 104634
BID 104636
BID 104637
BID 104638
CVE CVE-2018-0949
CVE CVE-2018-8242
CVE CVE-2018-8287
CVE CVE-2018-8288
CVE CVE-2018-8291
CVE CVE-2018-8296
MSKB 4339093
MSKB 4338815
MSKB 4338830
MSKB 4338818
XREF MSFT:MS18-4339093
XREF MSFT:MS18-4338815
XREF MSFT:MS18-4338830
XREF MSFT:MS18-4338818
Plugin Information
Plugin Output
tcp/445
KB : 4339093
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19061
Note: The fix for this issue is available in either of the following updates:
- KB4339093 : Cumulative Security Update for Internet Explorer
- KB4338815 : Windows 8.1 / Server 2012 R2 Monthly Rollup
126582 - Security Updates for Internet Explorer (July 2019)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1063)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-1004, CVE-2019-1056, CVE-2019-1059)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1104)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-1001)
See Also
http://www.nessus.org/u?fedd67fe
http://www.nessus.org/u?94506c02
http://www.nessus.org/u?cbe675e9
http://www.nessus.org/u?d231fad3
http://www.nessus.org/u?01b80f6a
Solution
Microsoft has released the following security updates to address this issue:
-KB4507434
-KB4507448
-KB4507449
-KB4507452
-KB4507462
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
BID 108979
BID 108982
BID 109006
BID 109007
BID 109008
BID 109009
CVE CVE-2019-1001
CVE CVE-2019-1004
CVE CVE-2019-1056
CVE CVE-2019-1059
CVE CVE-2019-1063
CVE CVE-2019-1104
MSKB 4507434
MSKB 4507462
MSKB 4507449
MSKB 4507448
MSKB 4507452
XREF MSFT:MS19-4507434
XREF MSFT:MS19-4507462
XREF MSFT:MS19-4507449
XREF MSFT:MS19-4507448
XREF MSFT:MS19-4507452
Plugin Information
Plugin Output
tcp/445
KB : 4507434
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19400
Note: The fix for this issue is available in either of the following updates:
- KB4507434 : Cumulative Security Update for Internet Explorer
- KB4507448 : Windows 8.1 / Server 2012 R2 Monthly Rollup
104892 - Security Updates for Internet Explorer (June 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
This vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the
context of the current user. (CVE-2017-8519, CVE-2017-8547)
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in
memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could
execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability
could gain the same user rights as the current user. (CVE-2017-8517, CVE-2017-8522, CVE-2017-8524)
See Also
http://www.nessus.org/u?5f83ad76
http://www.nessus.org/u?4a3cabfc
http://www.nessus.org/u?f2d033c7
http://www.nessus.org/u?43db6287
http://www.nessus.org/u?1f6a3c24
Solution
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
5.6 (CVSS2#E:U/RL:OF/RC:C)
References
BID 98895
BID 98899
BID 98926
BID 98930
BID 98932
CVE CVE-2017-8517
CVE CVE-2017-8519
CVE CVE-2017-8522
CVE CVE-2017-8524
CVE CVE-2017-8547
CVE CVE-2017-8529
MSKB 4022726
MSKB 4022724
MSKB 4021558
MSKB 4022719
XREF MSFT:MS17-4022726
XREF MSFT:MS17-4022724
XREF MSFT:MS17-4021558
XREF MSFT:MS17-4022719
Plugin Information
Plugin Output
tcp/445
KB : 4021558
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18698
Note: The fix for this issue is available in either of the following updates:
- KB4021558 : Cumulative Security Update for Internet Explorer
- KB4022726 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 550
110494 - Security Updates for Internet Explorer (June 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-0978, CVE-2018-8249)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8267)
See Also
http://www.nessus.org/u?e3fa839d
http://www.nessus.org/u?1742ea55
http://www.nessus.org/u?43458adc
http://www.nessus.org/u?a2bb9819
Solution
Microsoft has released the following security updates to address this issue:
-KB4230450
-KB4284826
-KB4284815
-KB4284855
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
192.168.100.4 55
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
CVE CVE-2018-0978
CVE CVE-2018-8249
CVE CVE-2018-8267
MSKB 4230450
MSKB 4284826
MSKB 4284815
MSKB 4284855
XREF MSFT:MS18-4230450
XREF MSFT:MS18-4284826
XREF MSFT:MS18-4284815
XREF MSFT:MS18-4284855
Plugin Information
Plugin Output
tcp/445
KB : 4230450
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19036
Note: The fix for this issue is available in either of the following updates:
- KB4230450 : Cumulative Security Update for Internet Explorer
- KB4284815 : Windows 8.1 / Server 2012 R2 Monthly Rollup
125828 - Security Updates for Internet Explorer (June 2019)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1038)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-0920, CVE-2019-1005, CVE-2019-1055, CVE-2019-1080)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in
memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2019-1081)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-0988)
See Also
http://www.nessus.org/u?953a7c84
http://www.nessus.org/u?fd8cfdad
http://www.nessus.org/u?2c09dd7d
http://www.nessus.org/u?b6f9d59c
http://www.nessus.org/u?3ebae0e7
Solution
Microsoft has released the following security updates to address this issue:
-KB4503259
-KB4503273
-KB4503276
-KB4503285
-KB4503292
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
CVE CVE-2019-0920
CVE CVE-2019-0988
CVE CVE-2019-1005
CVE CVE-2019-1038
CVE CVE-2019-1055
CVE CVE-2019-1080
CVE CVE-2019-1081
MSKB 4503259
MSKB 4503273
MSKB 4503276
MSKB 4503285
MSKB 4503292
XREF MSFT:MS19-4503259
XREF MSFT:MS19-4503273
XREF MSFT:MS19-4503276
XREF MSFT:MS19-4503285
XREF MSFT:MS19-4503292
Plugin Information
Plugin Output
tcp/445
KB : 4503259
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19377
Note: The fix for this issue is available in either of the following updates:
- KB4503259 : Cumulative Security Update for Internet Explorer
- KB4503276 : Windows 8.1 / Server 2012 R2 Monthly Rollup
108295 - Security Updates for Internet Explorer (March 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0889, CVE-2018-0935)
- An elevation of privilege vulnerability exists when Internet Explorer fails a check, allowing sandbox escape.
An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on
an affected system. This vulnerability by itself does not allow arbitrary code execution; however, it could allow
arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code
execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated
privileges when code execution is attempted. The update addresses the vulnerability by correcting how Internet
Explorer handles zone and integrity settings. (CVE-2018-0942)
- An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in
memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2018-0927, CVE-2018-0932)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2018-0929)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2018-0891)
See Also
http://www.nessus.org/u?2ace7125
http://www.nessus.org/u?ae0443e3
http://www.nessus.org/u?92fb739c
http://www.nessus.org/u?2174c09b
Solution
Microsoft has released the following security updates to address this issue:
-KB4088876
-KB4088877
-KB4088875
-KB4089187
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 103295
BID 103298
BID 103299
BID 103307
BID 103309
BID 103310
BID 103312
CVE CVE-2018-0889
CVE CVE-2018-0891
CVE CVE-2018-0927
CVE CVE-2018-0929
CVE CVE-2018-0932
CVE CVE-2018-0935
CVE CVE-2018-0942
CVE CVE-2018-8118
MSKB 4088876
MSKB 4088877
MSKB 4088875
MSKB 4089187
XREF MSFT:MS18-4088876
XREF MSFT:MS18-4088877
XREF MSFT:MS18-4088875
XREF MSFT:MS18-4089187
Plugin Information
Plugin Output
tcp/445
KB : 4089187
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18953
Note: The fix for this issue is available in the following update(s):
- KB4089187 : Cumulative Security Update for Internet Explorer
- KB4088877 : Windows 8.1 / Server 2012 R2 Monthly Rollup
122789 - Security Updates for Internet Explorer (March 2019)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in
memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user. (CVE-2019-0746)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0763)
- A security feature bypass vulnerability exists when Internet Explorer fails to validate the correct Security Zone
of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted
Internet Security Zone than intended.
(CVE-2019-0761)
- A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different
origins. The vulnerability allows Microsoft browsers to bypass Same-Site cookie restrictions, and to allow
requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force
the browser to send data that would otherwise be restricted. (CVE-2019-0762)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-0680, CVE-2019-0783)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0780)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-0609)
- A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0665, CVE-2019-0666, CVE-2019-0667)
See Also
http://www.nessus.org/u?b8fed4ae
http://www.nessus.org/u?062263fd
http://www.nessus.org/u?20334951
http://www.nessus.org/u?670e41a6
http://www.nessus.org/u?41a4ff06
Solution
Microsoft has released the following security updates to address this issue:
-KB4489881
-KB4489880
-KB4489873
-KB4489891
-KB4489878
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
CVE CVE-2019-0609
CVE CVE-2019-0665
CVE CVE-2019-0666
CVE CVE-2019-0667
CVE CVE-2019-0680
CVE CVE-2019-0746
CVE CVE-2019-0761
192.168.100.4 560
CVE CVE-2019-0762
CVE CVE-2019-0763
CVE CVE-2019-0780
CVE CVE-2019-0783
MSKB 4489881
MSKB 4489880
MSKB 4489873
MSKB 4489891
MSKB 4489878
XREF MSFT:MS19-4489881
XREF MSFT:MS19-4489880
XREF MSFT:MS19-4489873
XREF MSFT:MS19-4489891
XREF MSFT:MS19-4489878
Plugin Information
Plugin Output
tcp/445
KB : 4489873
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19301
Note: The fix for this issue is available in either of the following updates:
- KB4489873 : Cumulative Security Update for Internet Explorer
- KB4489881 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 56
104893 - Security Updates for Internet Explorer (May 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way Microsoft Edge handles objects in memory. The
vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of
the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the
current user. (CVE-2017-0238)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
This vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the
context of the current user. (CVE-2017-0226)
- A spoofing vulnerability exists when Microsoft browsers render SmartScreen Filter. An attacker who
successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website.
The specially crafted website could then either spoof content or serve as a pivot to chain an attack with other
vulnerabilities in web services. (CVE-2017-0231)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-0222)
- A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content
warnings. This could allow for the loading of unsecure content (HTTP) from secure locations (HTTPS).
(CVE-2017-0064)
See Also
http://www.nessus.org/u?09cc032f
http://www.nessus.org/u?d3c95ae3
http://www.nessus.org/u?89dd1a9e
http://www.nessus.org/u?5470f743
Solution
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:U/RL:OF/RC:C)
References
BID 98121
BID 98127
BID 98139
BID 98173
BID 98237
CVE CVE-2017-0064
CVE CVE-2017-0222
CVE CVE-2017-0226
CVE CVE-2017-0231
CVE CVE-2017-0238
MSKB 4019215
MSKB 4019216
MSKB 4019264
MSKB 4018271
XREF MSFT:MS17-4019215
XREF MSFT:MS17-4019216
XREF MSFT:MS17-4019264
XREF MSFT:MS17-4018271
Plugin Information
Plugin Output
tcp/445
KB : 4018271
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18666
Note: The fix for this issue is available in either of the following updates:
- KB4018271 : Cumulative Security Update for Internet Explorer
- KB4019215 : Windows 8.1 / Server 2012 R2 Monthly Rollup
109613 - Security Updates for Internet Explorer (May 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in
memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2018-1025)
- An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory,
which could provide an attacker with information to further compromise the users computer or data.
(CVE-2018-8145)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-0955, CVE-2018-8114, CVE-2018-8122)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-0954, CVE-2018-1022)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8178)
See Also
http://www.nessus.org/u?a47bd1fd
http://www.nessus.org/u?e92a132a
http://www.nessus.org/u?9cd8d3d4
http://www.nessus.org/u?dba0079e
Solution
Microsoft has released the following security updates to address this issue:
-KB4103730
-KB4103768
-KB4103718
-KB4103725
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
CVE CVE-2018-0954
CVE CVE-2018-0955
CVE CVE-2018-1022
CVE CVE-2018-1025
CVE CVE-2018-8114
CVE CVE-2018-8122
CVE CVE-2018-8145
CVE CVE-2018-8178
MSKB 4103730
MSKB 4103768
MSKB 4103718
MSKB 4103725
XREF MSFT:MS18-4103730
XREF MSFT:MS18-4103768
XREF MSFT:MS18-4103718
XREF MSFT:MS18-4103725
Plugin Information
Plugin Output
tcp/445
KB : 4103768
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19002
Note: The fix for this issue is available in either of the following updates:
- KB4103768 : Cumulative Security Update for Internet Explorer
- KB4103725 : Windows 8.1 / Server 2012 R2 Monthly Rollup
125069 - Security Updates for Internet Explorer (May 2019)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- An spoofing vulnerability exists when Internet Explorer improperly handles URLs. An attacker who successfully
exploited this vulnerability could trick a user by redirecting the user to a specially crafted website. The specially
crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web
services. (CVE-2019-0921)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-0940)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2019-0884, CVE-2019-0911, CVE-2019-0918)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2019-0930)
See Also
http://www.nessus.org/u?e0fcb7d5
http://www.nessus.org/u?44345f6d
http://www.nessus.org/u?283578f0
http://www.nessus.org/u?f1eae74c
http://www.nessus.org/u?15faa0a8
Solution
Microsoft has released the following security updates to address this issue:
-KB4498206
-KB4499149
-KB4499151
-KB4499164
-KB4499171
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
References
CVE CVE-2019-0884
CVE CVE-2019-0911
CVE CVE-2019-0918
CVE CVE-2019-0921
CVE CVE-2019-0930
CVE CVE-2019-0940
MSKB 4498206
MSKB 4499149
MSKB 4499151
MSKB 4499164
MSKB 4499171
XREF MSFT:MS19-4498206
XREF MSFT:MS19-4499149
XREF MSFT:MS19-4499151
XREF MSFT:MS19-4499164
XREF MSFT:MS19-4499171
Plugin Information
Plugin Output
tcp/445
KB : 4498206
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19354
Note: The fix for this issue is available in either of the following updates:
- KB4498206 : Cumulative Security Update for Internet Explorer
- KB4499151 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 570
104894 - Security Updates for Internet Explorer (November 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11827, CVE-2017-11858)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2017-11837, CVE-2017-11838, CVE-2017-11843, CVE-2017-11846)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11855, CVE-2017-11856, CVE-2017-11869)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Internet Explorer. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system.
(CVE-2017-11834)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2017-11791)
- An information disclosure vulnerability exists when Internet Explorer improperly handles page content, which
could allow an attacker to detect the navigation of the user leaving a maliciously crafted page.
(CVE-2017-11848)
See Also
http://www.nessus.org/u?0ad6eb38
http://www.nessus.org/u?c6afa4db
http://www.nessus.org/u?6b7fa1d0
http://www.nessus.org/u?da0fd90f
Solution
192.168.100.4 57
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 101703
BID 101709
BID 101715
BID 101716
BID 101722
BID 101725
BID 101737
BID 101740
BID 101741
BID 101742
BID 101751
BID 101753
CVE CVE-2017-11791
CVE CVE-2017-11827
CVE CVE-2017-11834
CVE CVE-2017-11837
CVE CVE-2017-11838
CVE CVE-2017-11843
CVE CVE-2017-11846
CVE CVE-2017-11848
CVE CVE-2017-11855
CVE CVE-2017-11856
CVE CVE-2017-11858
CVE CVE-2017-11869
MSKB 4048957
MSKB 4048959
MSKB 4048958
MSKB 4047206
XREF MSFT:MS17-4048957
XREF MSFT:MS17-4048959
XREF MSFT:MS17-4048958
XREF MSFT:MS17-4047206
Plugin Information
Plugin Output
tcp/445
KB : 4047206
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18838
Note: The fix for this issue is available in either of the following updates:
- KB4047206 : Cumulative Security Update for Internet Explorer
- KB4048958 : Windows 8.1 / Server 2012 R2 Monthly Rollup
118922 - Security Updates for Internet Explorer (November 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2018-8552)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8570)
See Also
http://www.nessus.org/u?0bfd8ab2
http://www.nessus.org/u?98f43c31
http://www.nessus.org/u?523c5e08
http://www.nessus.org/u?5f4e6fef
http://www.nessus.org/u?2fed546f
Solution
Microsoft has released the following security updates to address this issue:
-KB4466536
-KB4467697
-KB4467107
-KB4467701
-KB4467706
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 105783
BID 105786
CVE CVE-2018-8552
CVE CVE-2018-8570
MSKB 4466536
MSKB 4467697
MSKB 4467107
MSKB 4467701
MSKB 4467706
XREF MSFT:MS18-4466536
XREF MSFT:MS18-4467697
XREF MSFT:MS18-4467107
XREF MSFT:MS18-4467701
XREF MSFT:MS18-4467706
Plugin Information
Plugin Output
tcp/445
KB : 4466536
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19180
Note: The fix for this issue is available in either of the following updates:
- 4466536 : Cumulative Security Update for Internet Explorer
- KB4467697 : Windows 8.1 / Server 2012 R2 Monthly Rollup
104895 - Security Updates for Internet Explorer (October 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11813, CVE-2017-11822)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2017-11790)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2017-11793, CVE-2017-11810)
See Also
http://www.nessus.org/u?1d1a2595
http://www.nessus.org/u?e258896f
http://www.nessus.org/u?1c3325f2
http://www.nessus.org/u?86f61c93
Solution
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
CVSS Base Score
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 101077
BID 101081
BID 101083
BID 101122
BID 101141
CVE CVE-2017-11790
CVE CVE-2017-11793
CVE CVE-2017-11810
CVE CVE-2017-11813
CVE CVE-2017-11822
MSKB 4041681
MSKB 4041690
MSKB 4041693
MSKB 4040685
XREF MSFT:MS17-4041681
XREF MSFT:MS17-4041690
XREF MSFT:MS17-4041693
XREF MSFT:MS17-4040685
Plugin Information
Plugin Output
tcp/445
KB : 4040685
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18817
Note: The fix for this issue is available in either of the following updates:
- KB4040685 : Cumulative Security Update for Internet Explorer
- KB4041693 : Windows 8.1 / Server 2012 R2 Monthly Rollup
118009 - Security Updates for Internet Explorer (October 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8460, CVE-2018-8491)
See Also
http://www.nessus.org/u?554e569a
http://www.nessus.org/u?bb999f1f
http://www.nessus.org/u?07e1318e
Solution
Microsoft has released the following security updates to address this issue:
-KB4462926
-KB4462949
-KB4462923
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
CVE CVE-2018-8460
CVE CVE-2018-8491
MSKB 4462926
MSKB 4462949
MSKB 4462923
XREF MSFT:MS18-4462926
XREF MSFT:MS18-4462949
XREF MSFT:MS18-4462923
Plugin Information
Plugin Output
tcp/445
KB : 4462949
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19155
Note: The fix for this issue is available in either of the following updates:
- KB4462949 : Cumulative Security Update for Internet Explorer
- KB4462926 : Windows 8.1 / Server 2012 R2 Monthly Rollup
104896 - Security Updates for Internet Explorer (September 2017)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- An information disclosure vulnerability exists when affected Microsoft scripting engines do not properly handle
objects in memory. The vulnerability could allow an attacker to detect specific files on the user's computer.
(CVE-2017-8529)
- A remote code execution vulnerability exists when Microsoft browsers improperly access objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. (CVE-2017-8750)
- A spoofing vulnerability exists when Internet Explorer improperly handles specific HTML content. An attacker
who successfully exploited this vulnerability could trick a user into believing that the user was visiting a legitimate
website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other
vulnerabilities in web services.
(CVE-2017-8733)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. (CVE-2017-8747, CVE-2017-8749)
- A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render
content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker
could execute arbitrary code in the context of the current user. In a web-based attack scenario, an attacker could
host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers and then
convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for
initialization" in an application or Microsoft Office document that hosts the related rendering engine.
The attacker could also take advantage of compromised websites, and websites that accept or host user-
provided content or advertisements. These websites could contain specially crafted content that could exploit
the vulnerability. An attacker who successfully exploited the vulnerability could gain the same user rights as the
current user. (CVE-2017-8741, CVE-2017-8748)
- An information disclosure vulnerability exists in Microsoft browsers due to improper parent domain verification
in certain functionality. An attacker who successfully exploited the vulnerability could obtain specific information
that is used in the parent domain.
(CVE-2017-8736)
See Also
http://www.nessus.org/u?26b484bb
http://www.nessus.org/u?085e4d22
http://www.nessus.org/u?35364720
http://www.nessus.org/u?1dbb18cc
192.168.100.4 580
Solution
Microsoft has released security updates for the affected versions of Internet Explorer.
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 98953
BID 100737
BID 100743
BID 100764
BID 100765
BID 100766
BID 100770
BID 100771
CVE CVE-2017-8529
CVE CVE-2017-8733
CVE CVE-2017-8736
CVE CVE-2017-8741
CVE CVE-2017-8747
CVE CVE-2017-8748
CVE CVE-2017-8749
CVE CVE-2017-8750
MSKB 4036586
MSKB 4038792
MSKB 4038799
MSKB 4038777
192.168.100.4 58
XREF MSFT:MS17-4036586
XREF MSFT:MS17-4038792
XREF MSFT:MS17-4038799
XREF MSFT:MS17-4038777
Plugin Information
Plugin Output
tcp/445
KB : 4036586
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.18792
Note: The fix for this issue is available in either of the following updates:
- KB4036586 : Cumulative Security Update for Internet Explorer
- KB4038792 : Windows 8.1 / Server 2012 R2 Monthly Rollup
117423 - Security Updates for Internet Explorer (September 2018)
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2018-8457)
- An information disclosure vulnerability exists when the browser scripting engine improperly handle object types.
An attacker who has successfully exploited this vulnerability might be able to read privileged data across trust
boundaries. In browsing scenarios, an attacker could convince a user to visit a malicious site and leverage
the vulnerability to obtain privileged information from the browser process, such as sensitive data from other
opened tabs. An attacker could also inject malicious code into advertising networks used by trusted sites or
embed malicious code on a compromised, but trusted, site. The security update addresses the vulnerability by
correcting how the browser scripting engine handles object types. (CVE-2018-8315)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2018-8447)
- A security feature bypass vulnerability exists in Internet Explorer due to how scripts are handled that allows
a universal cross-site scripting (UXSS) condition. An attacker could use the UXSS vulnerability to access any
session belonging to web pages currently opened (or cached) by the browser at the time the attack is triggered.
(CVE-2018-8470)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2018-8452)
See Also
http://www.nessus.org/u?02ec6b51
http://www.nessus.org/u?38b6caf5
http://www.nessus.org/u?7080d669
http://www.nessus.org/u?955c2a0f
http://www.nessus.org/u?3a9824bb
Solution
Microsoft has released the following security updates to address this issue:
-KB4457135
-KB4457426
-KB4457129
-KB4457144
-KB4458010
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
References
BID 105207
BID 105251
BID 105252
BID 105257
BID 105267
CVE CVE-2018-8315
CVE CVE-2018-8447
CVE CVE-2018-8452
CVE CVE-2018-8457
CVE CVE-2018-8470
MSKB 4457135
MSKB 4457426
MSKB 4457129
MSKB 4457144
MSKB 4458010
XREF MSFT:MS18-4457135
XREF MSFT:MS18-4457426
XREF MSFT:MS18-4457129
XREF MSFT:MS18-4457144
XREF MSFT:MS18-4458010
Plugin Information
tcp/445
KB : 4457426
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19130
Note: The fix for this issue is available in either of the following updates:
- KB4457426 : Cumulative Security Update for Internet Explorer
- KB4457129 : Windows 8.1 / Server 2012 R2 Monthly Rollup
99312 - Windows 8.1 and Windows Server 2012 R2 April 2017 Security Updates
Synopsis
Description
The remote Windows host is missing security update 4015547 or cumulative update 4015550. It is, therefore,
affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the open-source libjpeg image processing library due to
improper handling of objects in memory. An unauthenticated, remote attacker can exploit this to disclose
sensitive information that can be utilized to bypass ASLR security protections. (CVE-2013-6629)
- Multiple information disclosure vulnerabilities exist in the win32k component due to improper handling of kernel
information. A local attacker can exploit these vulnerabilities, via a specially crafted application, to disclose
sensitive information. (CVE-2017-0058, CVE-2017-0188)
- A privilege escalation vulnerability exists in the Microsoft Graphics Component due to improper handling of
objects in memory. A local attacker can exploit this, via a specially crafted application, to execute arbitrary code
with elevated privileges. (CVE-2017-0156)
- A flaw exists in the VBScript engine due to improper handling of objects in memory. An unauthenticated,
remote attacker can exploit this, by convincing a user to visit a malicious website or open a specially crafted
document file, to execute arbitrary code.
(CVE-2017-0158)
- A security feature bypass vulnerability exists in ADFS due to incorrectly treating requests from Extranet clients
as Intranet requests. An unauthenticated, remote attacker can exploit this to bypass account lockout protection
mechanisms and more easily gain access to a user's account via a brute-force attack. (CVE-2017-0159)
- Multiple flaws exist in Windows Hyper-V Network Switch due to improper validation of input from the guest
operating system. A local attacker can exploit these, via a specially crafted application on the guest, to execute
arbitrary code on the host system.
(CVE-2017-0162, CVE-2017-0163, CVE-2017-0180)
- A privilege escalation vulnerability exists due to improper sanitization of handles stored in memory. A local
attacker can exploit this to gain elevated privileges. (CVE-2017-0165)
- A flaw exists in LDAP due to buffer request lengths not being properly calculated. An unauthenticated, remote
attacker can exploit this, via specially crafted traffic sent to a Domain Controller, to run processes with elevated
privileges. (CVE-2017-0166)
- A flaw exists in the Windows kernel due to improper handling of objects in memory. A local attacker can exploit
this, via a specially crafted application, to disclose sensitive information. (CVE-2017-0167)
- Multiple information disclosure vulnerabilities exist in Windows Hyper-V Network Switch due to improper
validation of user-supplied input. A guest attacker can exploit these to disclose sensitive information on the host
server. (CVE-2017-0168, CVE-2017-0169)
- Multiple denial of service vulnerabilities exist in Hyper-V due to improper validation of input from a privileged
user on a guest operating system. A local attacker on the guest can exploit these, via a specially crafted
application, to cause the host system to crash.
(CVE-2017-0178, CVE-2017-0179, CVE-2017-0184)
- Multiple denial of service vulnerabilities exist in Windows Hyper-V Network Switch due to improper validation
of input from the guest operating system. A local attacker on the guest can exploit these vulnerabilities, via a
specially crafted application, to crash the host system. (CVE-2017-0182, CVE-2017-0183, CVE-2017-0185,
CVE-2017-0186)
- A flaw exists in Windows due to improper handling of objects in memory that allows an attacker to cause a
denial of service condition. (CVE-2017-0191)
- An information disclosure vulnerability exists in the Adobe Type Manager Font Driver (ATMFD.dll) due to
improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing
a user to open a specially crafted document or visit a malicious web page, to disclose sensitive information.
(CVE-2017-0192)
- A memory corruption issue exists in Internet Explorer due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this, by convincing a user to visit a malicious website, to execute
arbitrary code. (CVE-2017-0202)
- A privilege escalation vulnerability exists in Internet Explorer due to a failure to properly enforce cross-domain
policies. An unauthenticated, remote attacker can exploit this to inject arbitrary content and gain elevated
privileges. (CVE-2017-0210)
- A privilege escalation vulnerability exists in Microsoft Windows OLE due to an unspecified failure in integrity-
level checks. An authenticated, remote attacker can exploit this to run an application with limited privileges at
a medium integrity level. Note that this vulnerability by itself does not allow arbitrary code execution but can be
used in conjunction other vulnerabilities. (CVE-2017-0211)
See Also
http://www.nessus.org/u?d871fd1d
Solution
Risk Factor
High
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
STIG Severity
References
BID 63676
BID 97416
BID 97418
BID 97426
BID 97427
BID 97428
BID 97435
BID 97437
BID 97438
BID 97441
BID 97444
BID 97446
BID 97449
BID 97452
BID 97455
BID 97459
BID 97461
BID 97462
BID 97465
BID 97466
BID 97467
BID 97473
BID 97475
BID 97507
BID 97512
BID 97514
CVE CVE-2013-6629
CVE CVE-2017-0058
CVE CVE-2017-0156
CVE CVE-2017-0158
CVE CVE-2017-0159
CVE CVE-2017-0162
CVE CVE-2017-0163
CVE CVE-2017-0165
CVE CVE-2017-0166
CVE CVE-2017-0167
CVE CVE-2017-0168
CVE CVE-2017-0169
CVE CVE-2017-0178
CVE CVE-2017-0179
CVE CVE-2017-0180
CVE CVE-2017-0182
CVE CVE-2017-0183
CVE CVE-2017-0184
CVE CVE-2017-0185
CVE CVE-2017-0186
CVE CVE-2017-0188
CVE CVE-2017-0191
CVE CVE-2017-0192
CVE CVE-2017-0202
CVE CVE-2017-0210
CVE CVE-2017-0211
MSKB 4015547
MSKB 4015550
XREF MSFT:MS17-4015547
XREF IAVA:2017-A-0110
XREF IAVA:2017-A-0111
XREF MSFT:MS17-4015550
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4034672 or cumulative update 4034681. It is, therefore,
affected by multiple vulnerabilities :
- A denial of service vulnerability exists when Microsoft Windows improperly handles NetBIOS packets. An
attacker who successfully exploited this vulnerability could cause a target computer to become completely
unresponsive. A remote unauthenticated attacker could exploit this vulnerability by sending a series of TCP
packets to a target system, resulting in a permanent denial of service condition. The update addresses the
vulnerability by correcting how the Windows network stack handles NetBIOS traffic. (CVE-2017-0174)
- A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code
execution on an affected system. An attacker who successfully exploited this vulnerability could take complete
control of an affected system. An attacker could then install programs; view, change, or delete data; or create
new accounts with full user rights.
(CVE-2017-0250)
- A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects
in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in
the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user
rights as the current user. (CVE-2017-0293)
- A remote code execution vulnerability exists in Windows Input Method Editor (IME) when IME improperly
handles parameters in a method of a DCOM class. The DCOM server is a Windows component installed
regardless of which languages/IMEs are enabled. An attacker can instantiate the DCOM class and exploit the
system even if IME is not enabled. (CVE-2017-8591)
- An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2017-8593)
- A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker
who successfully exploited this vulnerability could take control of the affected system. An attacker could then
install programs; view, change, or delete data; or create new accounts with full user rights.To exploit the
vulnerability, the attacker could send specially crafted messages to the Windows Search service. An attacker
with access to a target computer could exploit this vulnerability to elevate privileges and take control of the
computer. Additionally, in an enterprise scenario, a remote unauthenticated attacker could remotely trigger
the vulnerability through an SMB connection and then take control of a target computer.The security update
addresses the vulnerability by correcting how Windows Search handles objects in memory. (CVE-2017-8620)
- An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver
improperly handles objects in memory. (CLFS) is a high-performance, general-purpose log file subsystem that
dedicated client applications can use and multiple clients can share to optimize log access. (CVE-2017-8624)
- This security update resolves a vulnerability in Windows Error Reporting (WER). The vulnerability could
allow elevation of privilege if successfully exploited by an attacker. An attacker who successfully exploited this
vulnerability could gain greater access to sensitive information and system functionality. This update corrects the
way the WER handles and executes files.
192.168.100.4 590
(CVE-2017-8633)
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in
memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could
execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability
could gain the same user rights as the current user. (CVE-2017-8635)
- A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render
content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker
could execute arbitrary code in the context of the current user. (CVE-2017-8636)
- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in
memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could
execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability
could gain the same user rights as the current user. (CVE-2017-8641)
- A remote code execution vulnerability exists when Microsoft browsers improperly access objects in memory.
The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. An attacker who successfully exploited the vulnerability could gain the same user
rights as the current user. (CVE-2017-8653)
- A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate
input from an authenticated user on a guest operating system. (CVE-2017-8664)
- An information disclosure vulnerability exists when the win32k component improperly provides kernel
information.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2017-8666)
- An information disclosure vulnerability exists when the Volume Manager Extension Driver component
improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain
information to further compromise the users system.To exploit this vulnerability, an attacker would have to log on
to an affected system and run a specially crafted application.The security update addresses the vulnerability by
correcting how Volume Manager Extension Driver handles objects in memory. (CVE-2017-8668)
- A remote code execution vulnerability exists in the way Microsoft browsers handle objects in memory while
rendering content. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user. If the current user is logged on with administrative user rights, an attacker
who successfully exploited the vulnerability could take control of an affected system.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2017-8669)
See Also
http://www.nessus.org/u?1d4d1833
http://www.nessus.org/u?dcc3ea6d
Solution
Risk Factor
192.168.100.4 59
High
8.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
7.9 (CVSS:3.0/E:P/RL:O/RC:C)
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.6 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 98100
BID 99430
BID 100032
BID 100034
BID 100038
BID 100039
BID 100055
BID 100056
BID 100057
BID 100059
BID 100061
BID 100068
BID 100069
BID 100085
BID 100089
BID 100092
CVE CVE-2017-0174
CVE CVE-2017-0250
CVE CVE-2017-0293
CVE CVE-2017-8591
CVE CVE-2017-8593
CVE CVE-2017-8620
CVE CVE-2017-8624
CVE CVE-2017-8633
CVE CVE-2017-8635
CVE CVE-2017-8636
CVE CVE-2017-8641
CVE CVE-2017-8653
CVE CVE-2017-8664
CVE CVE-2017-8666
CVE CVE-2017-8668
CVE CVE-2017-8669
MSKB 4034681
MSKB 4034672
XREF MSFT:MS17-4034681
XREF MSFT:MS17-4034672
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4054522 or cumulative update 4054519. It is, therefore,
affected by multiple vulnerabilities :
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2017-11919)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11886, CVE-2017-11890, CVE-2017-11901, CVE-2017-11903, CVE-2017-11907,
CVE-2017-11913)
- A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An
attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could
then install programs; view, change, or delete data; or create new accounts with full user rights.
(CVE-2017-11885)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2017-11894, CVE-2017-11895, CVE-2017-11912, CVE-2017-11930)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2017-11887, CVE-2017-11906)
- An information disclosure vulnerability exists when the Windows its:// protocol handler unnecessarily sends
traffic to a remote site in order to determine the zone of a provided URL. This could potentially result in the
disclosure of sensitive information to a malicious site.
(CVE-2017-11927)
See Also
http://www.nessus.org/u?1020239a
http://www.nessus.org/u?18bd5547
Solution
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 102045
BID 102046
BID 102047
BID 102053
BID 102054
BID 102055
BID 102058
BID 102062
BID 102063
BID 102078
BID 102082
BID 102091
BID 102092
BID 102093
BID 102095
CVE CVE-2017-11885
CVE CVE-2017-11886
CVE CVE-2017-11887
CVE CVE-2017-11890
CVE CVE-2017-11894
CVE CVE-2017-11895
CVE CVE-2017-11901
CVE CVE-2017-11903
CVE CVE-2017-11906
CVE CVE-2017-11907
CVE CVE-2017-11912
CVE CVE-2017-11913
CVE CVE-2017-11919
CVE CVE-2017-11927
CVE CVE-2017-11930
MSKB 4054522
MSKB 4054519
XREF MSFT:MS17-4054522
XREF MSFT:MS17-4054519
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4048961 or cumulative update 4048958. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11827, CVE-2017-11858)
- A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in
Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute
arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could
gain the same user rights as the current user.
(CVE-2017-11837, CVE-2017-11838, CVE-2017-11843, CVE-2017-11846)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11855, CVE-2017-11856, CVE-2017-11869)
- An information vulnerability exists when Windows Media Player improperly discloses file information.
Successful exploitation of the vulnerability could allow the attacker to test for the presence of files on disk.
(CVE-2017-11768)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Internet Explorer. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system.
(CVE-2017-11834)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
(CVE-2017-11880)
- A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses
kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. (CVE-2017-11851)
- An information disclosure vulnerability exists when the scripting engine does not properly handle objects in
memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information
to further compromise the users system.
(CVE-2017-11791)
- An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in
memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user
rights. (CVE-2017-11847)
- An information disclosure vulnerability exists when Internet Explorer improperly handles page content, which
could allow an attacker to detect the navigation of the user leaving a maliciously crafted page.
(CVE-2017-11848)
- An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory
address. An attacker who successfully exploited this vulnerability could obtain information to further compromise
the users system. (CVE-2017-11831, CVE-2017-11842, CVE-2017-11849, CVE-2017-11853)
- A denial of service vulnerability exists when Windows Search improperly handles objects in memory. An
attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.
(CVE-2017-11788)
- An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly
handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to
further compromise the users system. (CVE-2017-11850)
See Also
http://www.nessus.org/u?dd6d4c6a
http://www.nessus.org/u?6b7fa1d0
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.2 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
References
BID 101703
BID 101705
BID 101709
BID 101711
BID 101715
BID 101716
BID 101719
BID 101721
BID 101722
BID 101725
BID 101729
BID 101737
BID 101738
BID 101740
BID 101741
BID 101742
BID 101751
BID 101753
BID 101755
BID 101762
BID 101763
BID 101764
CVE CVE-2017-11768
CVE CVE-2017-11788
CVE CVE-2017-11791
CVE CVE-2017-11827
CVE CVE-2017-11831
CVE CVE-2017-11834
CVE CVE-2017-11837
CVE CVE-2017-11838
CVE CVE-2017-11842
CVE CVE-2017-11843
CVE CVE-2017-11846
CVE CVE-2017-11847
CVE CVE-2017-11848
CVE CVE-2017-11849
CVE CVE-2017-11850
CVE CVE-2017-11851
CVE CVE-2017-11853
CVE CVE-2017-11855
CVE CVE-2017-11856
CVE CVE-2017-11858
CVE CVE-2017-11869
CVE CVE-2017-11880
MSKB 4048961
MSKB 4048958
XREF MSFT:MS17-4048958
XREF MSFT:MS17-4048961
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing security update 4041687 or cumulative update 4041693. It is, therefore,
affected by multiple vulnerabilities :
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory via
the Microsoft Windows Text Services Framework. The vulnerability could corrupt memory in such a way that an
attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited
the vulnerability could gain the same user rights as the current user. (CVE-2017-8727)
- A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker
who successfully exploited this vulnerability could take control of the affected system. An attacker could then
install programs; view, change, or delete data; or create new accounts with full user rights.
(CVE-2017-11771)
- An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles
objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated
context. (CVE-2017-11824)
- An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle
objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel
mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user rights. (CVE-2017-8689, CVE-2017-8694)
- A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code
execution on an affected system. An attacker who successfully exploited this vulnerability could take control
of an affected system. An attacker could then install programs; view, change, or delete data; or create
new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the
system could be less impacted than users who operate with administrative user rights. (CVE-2017-8717,
CVE-2017-8718)
- An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI)
handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the
information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if
the attacker uses it in combination with another vulnerability. (CVE-2017-11816)
- An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain
requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet,
which could lead to information disclosure from the server. (CVE-2017-11815)
- An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the users
system. (CVE-2017-11765, CVE-2017-11814)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2017-11793, CVE-2017-11810)
- A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted
embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected
system. An attacker could then install programs; view, change, or delete data; or create new accounts with full
user rights. (CVE-2017-11762, CVE-2017-11763)
- An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.
An attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2017-11790)
- An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.
(CVE-2017-11817)
- A denial of service vulnerability exists in the Microsoft Server Block Message (SMB) when an attacker sends
specially crafted requests to the server. An attacker who exploited this vulnerability could cause the affected
system to crash. To attempt to exploit this issue, an attacker would need to send specially crafted SMB requests
to the target system. Note that the denial of service vulnerability would not allow an attacker to execute code
or to elevate their user rights, but it could cause the affected system to stop accepting requests. The security
update addresses the vulnerability by correcting the manner in which SMB handles specially crafted client
requests.
(CVE-2017-11781)
- An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local
Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the
security context of the local system. An attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights.
(CVE-2017-11783)
- An Information disclosure vulnerability exists when Windows Search improperly handles objects in memory. An
attacker who successfully exploited the vulnerability could obtain information to further compromise the users
system. (CVE-2017-11772)
- An Security Feature bypass vulnerability exists in Microsoft Windows storage when it fails to validate an
integrity-level check. An attacker who successfully exploited the vulnerability could allow an application with a
certain integrity level to execute code at a different integrity level. The update addresses the vulnerability by
correcting how Microsoft storage validates an integrity-level check. (CVE-2017-11818)
- A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1)
server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to
execute code on the target server.
(CVE-2017-11780)
- A remote code execution vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails
to properly handle DNS responses. An attacker who successfully exploited the vulnerability could run arbitrary
code in the context of the Local System Account. (CVE-2017-11779)
- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2017-11813, CVE-2017-11822)
- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who
successfully exploited the vulnerability could retrieve the memory address of a kernel object. (CVE-2017-11784,
CVE-2017-11785)
- A spoofing vulnerability exists in the Windows implementation of wireless networking. An attacker who
successfully exploited this vulnerability could potentially replay broadcast and/or multicast traffic to hosts on a
WPA or WPA 2-protected wireless network.
(CVE-2017-13080)
See Also
http://www.nessus.org/u?c1c67d5c
http://www.nessus.org/u?1c3325f2
Solution
Risk Factor
High
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 (CVSS:3.0/E:H/RL:O/RC:C)
7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.6 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 101077
BID 101081
BID 101083
BID 101093
BID 101094
BID 101095
BID 101099
BID 101100
BID 101101
BID 101108
BID 101109
BID 101110
BID 101111
BID 101114
BID 101116
BID 101122
BID 101128
BID 101136
BID 101140
BID 101141
BID 101142
BID 101144
BID 101147
BID 101149
BID 101161
BID 101162
BID 101166
BID 101274
CVE CVE-2017-11762
CVE CVE-2017-11763
CVE CVE-2017-11765
CVE CVE-2017-11771
CVE CVE-2017-11772
CVE CVE-2017-11779
CVE CVE-2017-11780
CVE CVE-2017-11781
CVE CVE-2017-11783
CVE CVE-2017-11784
CVE CVE-2017-11785
CVE CVE-2017-11790
CVE CVE-2017-11793
CVE CVE-2017-11810
CVE CVE-2017-11813
CVE CVE-2017-11814
CVE CVE-2017-11815
CVE CVE-2017-11816
CVE CVE-2017-11817
CVE CVE-2017-11818
CVE CVE-2017-11822
CVE CVE-2017-11824
CVE CVE-2017-13080
CVE CVE-2017-8689
CVE CVE-2017-8694
CVE CVE-2017-8717
CVE CVE-2017-8718
CVE CVE-2017-8727
MSKB 4041687
MSKB 4041693
XREF IAVA:2017-A-0310
XREF MSFT:MS17-4041687
XREF MSFT:MS17-4041693
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.12 or 2.2.x prior to 2.2.6. It is,
therefore, affected by multiple denial of service vulnerabilities :
- An infinite loop condition condition exists in the NetScaler file parser within file wiretap/netscaler.c when
handling specially crafted capture files. An unauthenticated, remote attacker can exploit this to cause excessive
consumption of CPU resources, resulting in a denial of service condition. (CVE-2017-7700)
- An infinite loop condition condition exists in the BGP dissector within file epan/dissectors/packet-bgp.c when
handling specially crafted packets or trace files. An unauthenticated, remote attacker can exploit this to cause
excessive consumption of CPU resources, resulting in a denial of service condition. (CVE-2017-7701)
- An infinite loop condition condition exists in the WBXML dissector within file epan/dissectors/packet-wbxml.c
when handling specially crafted packets or trace files.
An unauthenticated, remote attacker can exploit this to cause excessive consumption of CPU resources,
resulting in a denial of service condition. (CVE-2017-7702)
- A denial of service vulnerability exists in the IMAP dissector within file epan/dissectors/packet-imap.c when
handling specially crafted packets or trace files. An unauthenticated, remote attacker can exploit this to crash the
program. (CVE-2017-7703)
- An infinite loop condition condition exists in the DOF dissector within file epan/dissectors/packet-dof.c when
handling specially crafted packets or trace files. An unauthenticated, remote attacker can exploit this to cause
excessive consumption of CPU resources, resulting in a denial of service condition. Note that this issue only
applies to the 2.2.x version. (CVE-2017-7704)
- An infinite loop condition condition exists in the RPC over RDMA dissector within file epan/dissectors/packet-
rpcrdma.c when handling specially crafted packets or trace files. An unauthenticated, remote attacker can
exploit this to cause excessive consumption of CPU resources, resulting in a denial of service condition.
(CVE-2017-7705)
- An infinite loop condition condition exists in the SIGCOMP dissector within file epan/dissectors/packet-
sigcomp.c when handling specially crafted packets or trace files. An unauthenticated, remote attacker can
exploit this to cause excessive consumption of CPU resources, resulting in a denial of service condition.
(CVE-2017-7745)
- An infinite loop condition condition exists in the SLSK dissector in the dissect_slsk_pdu() function within file
epan/dissectors/packet-slsk.c, when handling specially crafted packets or trace files. An unauthenticated, remote
attacker can exploit this to cause excessive consumption of CPU resources, resulting in a denial of service
condition. (CVE-2017-7746)
- An out-of-bounds read error exists in the PacketBB dissector in the dissect_pbb_addressblock() function
within file epan/dissectors/packet-packetbb.c when handling specially crafted packets or trace files. An
unauthenticated, remote attacker can exploit this to crash the program. (CVE-2017-7747)
- An infinite loop condition condition exists in the WSP dissector within file epan/dissectors/packet-wsp.c when
handling specially crafted packets or trace files. An unauthenticated, remote attacker can exploit this to cause
excessive consumption of CPU resources, resulting in a denial of service condition. (CVE-2017-7748)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
https://www.wireshark.org/docs/relnotes/wireshark-2.0.12.html
https://www.wireshark.org/docs/relnotes/wireshark-2.2.6.html
https://www.wireshark.org/security/wnpa-sec-2017-12.html
https://www.wireshark.org/security/wnpa-sec-2017-13.html
https://www.wireshark.org/security/wnpa-sec-2017-14.html
https://www.wireshark.org/security/wnpa-sec-2017-15.html
https://www.wireshark.org/security/wnpa-sec-2017-16.html
https://www.wireshark.org/security/wnpa-sec-2017-17.html
https://www.wireshark.org/security/wnpa-sec-2017-18.html
https://www.wireshark.org/security/wnpa-sec-2017-19.html
https://www.wireshark.org/security/wnpa-sec-2017-20.html
https://www.wireshark.org/security/wnpa-sec-2017-21.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 (CVSS2#E:U/RL:OF/RC:C)
References
BID 97627
BID 97628
BID 97630
BID 97631
BID 97632
BID 97633
BID 97634
BID 97635
BID 97636
BID 97638
CVE CVE-2017-7700
CVE CVE-2017-7701
CVE CVE-2017-7702
CVE CVE-2017-7703
CVE CVE-2017-7704
CVE CVE-2017-7705
CVE CVE-2017-7745
CVE CVE-2017-7746
CVE CVE-2017-7747
CVE CVE-2017-7748
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.13 or 2.2.x prior to 2.2.7. It is,
therefore, affected by multiple denial of service vulnerabilities :
- A NULL pointer dereference flaw exists in the dissect_msnip() function within file epan/dissectors/packet-
msnip.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this,
via a specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9343)
- An infinite loop condition exists in the expand_dns_name() function within file epan/dissectors/packet-dns.c
when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially
crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service
condition.
(CVE-2017-9345)
- An infinite loop condition exists in the dissect_slsk_pdu() function within file epan/dissectors/packet-slsk.c
when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially
crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service
condition.
(CVE-2017-9346)
- A NULL pointer dereference flaw exists in the ros_try_string() function within file epan/dissectors/asn1/
ros/packet-ros-template.c due to improper validation of user-supplied input passed as an OID string. An
unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause a
denial of service condition. This issue only affects version 2.2.x. (CVE-2017-9347)
- An out-of-bounds read error exists in the OALMarshal_UncompressValue() function within file epan/dissectors/
packet-dof.c when handling Distributed Object Framework (DOF) packets. An unauthenticated, remote attacker
can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition. This
issue only affects version 2.2.x. (CVE-2017-9348)
- An infinite loop condition exists in the dissect_dcm_pdu_data() function within file epan/dissectors/packet-
dcm.c when handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via
a specially crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of
service condition.
(CVE-2017-9349)
- A memory allocation issue exists in the dissect_opensafety_ssdo_message() function within file epan/
dissectors/packet-opensafety.c due to improper validation of user-supplied input. An unauthenticated, remote
attacker can exploit this, via a specially crafted packet or packet trace file, to cause a denial of service condition.
(CVE-2017-9350)
- An out-of-bounds read error exists in the bootp_option() function within file epan/dissectors/packet-bootp.c
when handling vendor class identifier strings in bootp packets due to improper validation of user-supplied input.
An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace file, to cause
a denial of service condition.
(CVE-2017-9351)
- An infinite loop condition exists in the get_bzr_pdu_len() function within file epan/dissectors/packet-bzr.c when
handling packets or packet trace files. An unauthenticated, remote attacker can exploit this, via a specially
crafted packet or packet trace file, to consume excessive CPU resources, resulting in a denial of service
condition.
(CVE-2017-9352)
- A NULL pointer dereference flaw exists in the dissect_routing6_rpl() function within file epan/dissectors/packet-
ipv6.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this,
via a specially crafted packet or packet trace file, to cause a denial of service condition. This issue only affects
version 2.2.x. (CVE-2017-9353)
- A NULL pointer dereference flaw exists in the dissect_rgmp() function within file epan/dissectors/packet-rgmp.c
due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a
specially crafted packet or packet trace file, to cause a denial of service condition. (CVE-2017-9354)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
https://www.wireshark.org/docs/relnotes/wireshark-2.0.13.html
https://www.wireshark.org/docs/relnotes/wireshark-2.2.7.html
https://www.wireshark.org/security/wnpa-sec-2017-33.html
https://www.wireshark.org/security/wnpa-sec-2017-32.html
https://www.wireshark.org/security/wnpa-sec-2017-31.html
https://www.wireshark.org/security/wnpa-sec-2017-30.html
https://www.wireshark.org/security/wnpa-sec-2017-29.html
https://www.wireshark.org/security/wnpa-sec-2017-28.html
https://www.wireshark.org/security/wnpa-sec-2017-27.html
https://www.wireshark.org/security/wnpa-sec-2017-26.html
https://www.wireshark.org/security/wnpa-sec-2017-25.html
https://www.wireshark.org/security/wnpa-sec-2017-24.html
https://www.wireshark.org/security/wnpa-sec-2017-23.html
https://www.wireshark.org/security/wnpa-sec-2017-22.html
Solution
Risk Factor
High
192.168.100.4 610
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
6.1 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 98796
BID 98797
BID 98798
BID 98799
BID 98800
BID 98801
BID 98802
BID 98803
BID 98804
BID 98805
BID 98806
BID 98808
CVE CVE-2017-9343
CVE CVE-2017-9344
CVE CVE-2017-9345
CVE CVE-2017-9346
CVE CVE-2017-9347
CVE CVE-2017-9348
CVE CVE-2017-9349
CVE CVE-2017-9350
CVE CVE-2017-9351
CVE CVE-2017-9352
CVE CVE-2017-9353
CVE CVE-2017-9354
Plugin Information
192.168.100.4 61
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.0.x prior to 2.0.14 or 2.2.x prior to 2.2.8. It is,
therefore, affected by multiple denial of service vulnerabilities :
- A denial of service vulnerability exists in the DAAP dissector, specifically in the dissect_daap_one_tag()
function within file epan/dissectors/packet-daap.c. An unauthenticated, remote attacker can exploit this to
exhaust stack resources through uncontrolled recursion.
(CVE-2017-9617)
- An infinite loop condition exists in the DOCSIS dissector, specifically in the dissect_docsis() function within
file plugins/docsis/packet-docsis.c. An unauthenticated, remote attacker can exploit this, via a specially
crafted packet or packet trace, to consume available CPU resources, resulting in a denial of service condition.
(CVE-2017-11406)
- A memory allocation issue exists in the MQ dissector, specifically in the reassemble_mq() function within file
epan/dissectors/packet-mq.c, due to improper validation of fragment lengths before attempting reassembly. An
unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace, to cause a denial
of service condition. (CVE-2017-11407)
- A flaw exists in the AMQP dissector, specifically in the get_amqp_1_0_value_formatter() function within file
epan/dissectors/packet-amqp.c, when decoding lists.
An unauthenticated, remote attacker can exploit this, via a specially crafted packet or packet trace, to cause a
stack overflow, resulting in a denial of service condition. (CVE-2017-11408)
- A large loop condition exists in the GPRS LLC dissector, specifically in the llc_gprs_dissect_xid() function
within file epan/dissectors/packet-gprs-llc.c, when handling specially crafted packet or trace files. An
unauthenticated, remote attacker can exploit this to cause a denial of service condition. Note that this issue only
applies to version 2.0.x. (CVE-2017-11409)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
https://www.wireshark.org/docs/relnotes/wireshark-2.0.14.html
https://www.wireshark.org/docs/relnotes/wireshark-2.2.8.html
https://www.wireshark.org/security/wnpa-sec-2017-34.html
https://www.wireshark.org/security/wnpa-sec-2017-35.html
https://www.wireshark.org/security/wnpa-sec-2017-36.html
https://www.wireshark.org/security/wnpa-sec-2017-37.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13799
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 (CVSS2#E:U/RL:OF/RC:C)
References
BID 99087
CVE CVE-2017-9617
CVE CVE-2017-11406
CVE CVE-2017-11407
CVE CVE-2017-11408
CVE CVE-2017-11409
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.10. It is, therefore, affected
by multiple denial of service vulnerabilities in the DMP, BT ATT and MBIM dissectors. An unauthenticated,
remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read
a malformed packet trace file.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
https://www.wireshark.org/security/wnpa-sec-2017-42.html
https://www.wireshark.org/security/wnpa-sec-2017-43.html
https://www.wireshark.org/security/wnpa-sec-2017-44.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 (CVSS2#E:U/RL:OF/RC:C)
References
BID 101227
BID 101235
BID 101240
CVE CVE-2017-15191
CVE CVE-2017-15192
CVE CVE-2017-15193
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.11 or 2.4.x prior to 2.4.3.
It is, therefore, affected by denial of service vulnerabilities in the IWARP_MPA, NetBIOS, and CIP Safety
dissectors. An unauthenticated, remote attacker can exploit this by injecting a malformed packet onto the wire or
by convincing someone to read a malformed packet trace file.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
https://www.wireshark.org/security/wnpa-sec-2017-47.html
https://www.wireshark.org/security/wnpa-sec-2017-48.html
https://www.wireshark.org/security/wnpa-sec-2017-49.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
6.1 (CVSS2#E:POC/RL:OF/RC:C)
References
CVE CVE-2017-17083
CVE CVE-2017-17084
CVE CVE-2017-17085
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.12 or 2.4.x prior to 2.4.4. It is,
therefore, affected by a denial of service vulnerability.
See Also
https://www.wireshark.org/security/wnpa-sec-2018-01.html
https://www.wireshark.org/security/wnpa-sec-2018-03.html
https://www.wireshark.org/security/wnpa-sec-2018-04.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 (CVSS2#E:U/RL:OF/RC:C)
References
BID 102499
BID 102500
BID 102504
CVE CVE-2017-17997
CVE CVE-2018-5334
CVE CVE-2018-5335
CVE CVE-2018-5336
Plugin Information
Plugin Output
tcp/445
192.168.100.4 620
107093 - Wireshark 2.2.x < 2.2.13 / 2.4.x < 2.4.5 Multiple DoS Vulnerabilities
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.13 or 2.4.x prior to 2.4.5. It is,
therefore, affected by multiple denial of service vulnerabilities.
See Also
https://www.wireshark.org/security/wnpa-sec-2018-05.html
https://www.wireshark.org/security/wnpa-sec-2018-06.html
https://www.wireshark.org/security/wnpa-sec-2018-07.html
https://www.wireshark.org/security/wnpa-sec-2018-08.html
https://www.wireshark.org/security/wnpa-sec-2018-09.html
https://www.wireshark.org/security/wnpa-sec-2018-10.html
https://www.wireshark.org/security/wnpa-sec-2018-11.html
https://www.wireshark.org/security/wnpa-sec-2018-12.html
https://www.wireshark.org/security/wnpa-sec-2018-13.html
https://www.wireshark.org/security/wnpa-sec-2018-14.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
References
BID 103158
BID 103160
BID 103162
192.168.100.4 62
BID 103164
BID 103165
BID 103166
CVE CVE-2018-7320
CVE CVE-2018-7321
CVE CVE-2018-7322
CVE CVE-2018-7323
CVE CVE-2018-7324
CVE CVE-2018-7325
CVE CVE-2018-7326
CVE CVE-2018-7327
CVE CVE-2018-7328
CVE CVE-2018-7329
CVE CVE-2018-7330
CVE CVE-2018-7331
CVE CVE-2018-7332
CVE CVE-2018-7333
CVE CVE-2018-7334
CVE CVE-2018-7335
CVE CVE-2018-7336
CVE CVE-2018-7337
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.14 or 2.4.x prior to 2.4.6. It is,
therefore, affected by multiple vulnerabilities.
See Also
https://www.wireshark.org/security/wnpa-sec-2018-15.html
https://www.wireshark.org/security/wnpa-sec-2018-16.html
https://www.wireshark.org/security/wnpa-sec-2018-17.html
https://www.wireshark.org/security/wnpa-sec-2018-18.html
https://www.wireshark.org/security/wnpa-sec-2018-19.html
https://www.wireshark.org/security/wnpa-sec-2018-20.html
https://www.wireshark.org/security/wnpa-sec-2018-21.html
https://www.wireshark.org/security/wnpa-sec-2018-22.html
https://www.wireshark.org/security/wnpa-sec-2018-23.html
https://www.wireshark.org/security/wnpa-sec-2018-24.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
References
BID 99085
CVE CVE-2017-9616
CVE CVE-2018-9256
CVE CVE-2018-9257
CVE CVE-2018-9258
CVE CVE-2018-9259
CVE CVE-2018-9260
CVE CVE-2018-9261
CVE CVE-2018-9262
CVE CVE-2018-9263
CVE CVE-2018-9264
CVE CVE-2018-9265
CVE CVE-2018-9266
CVE CVE-2018-9267
CVE CVE-2018-9268
CVE CVE-2018-9269
CVE CVE-2018-9270
CVE CVE-2018-9271
CVE CVE-2018-9272
CVE CVE-2018-9273
CVE CVE-2018-9274
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.15, 2.4.x prior to 2.4.6, or
2.6.x prior to 2.6.1.
It is, therefore, affected by multiple vulnerabilities.
See Also
https://www.wireshark.org/security/wnpa-sec-2018-25.html
https://www.wireshark.org/security/wnpa-sec-2018-26.html
https://www.wireshark.org/security/wnpa-sec-2018-27.html
https://www.wireshark.org/security/wnpa-sec-2018-28.html
https://www.wireshark.org/security/wnpa-sec-2018-29.html
https://www.wireshark.org/security/wnpa-sec-2018-30.html
https://www.wireshark.org/security/wnpa-sec-2018-31.html
https://www.wireshark.org/security/wnpa-sec-2018-32.html
https://www.wireshark.org/security/wnpa-sec-2018-33.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
References
BID 104308
CVE CVE-2018-11354
CVE CVE-2018-11355
CVE CVE-2018-11356
CVE CVE-2018-11357
CVE CVE-2018-11358
CVE CVE-2018-11359
CVE CVE-2018-11360
CVE CVE-2018-11361
CVE CVE-2018-11362
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.16, 2.4.x prior to 2.4.8, or
2.6.x prior to 2.6.2.
It is, therefore, affected by multiple vulnerabilities.
See Also
https://www.wireshark.org/security/wnpa-sec-2018-34.html
https://www.wireshark.org/security/wnpa-sec-2018-35.html
https://www.wireshark.org/security/wnpa-sec-2018-36.html
https://www.wireshark.org/security/wnpa-sec-2018-37.html
https://www.wireshark.org/security/wnpa-sec-2018-38.html
https://www.wireshark.org/security/wnpa-sec-2018-39.html
https://www.wireshark.org/security/wnpa-sec-2018-40.html
https://www.wireshark.org/security/wnpa-sec-2018-41.html
https://www.wireshark.org/security/wnpa-sec-2018-42.html
https://www.wireshark.org/security/wnpa-sec-2018-43.html
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
References
BID 104847
CVE CVE-2018-14339
CVE CVE-2018-14340
CVE CVE-2018-14341
CVE CVE-2018-14342
CVE CVE-2018-14343
CVE CVE-2018-14344
CVE CVE-2018-14367
CVE CVE-2018-14368
CVE CVE-2018-14369
CVE CVE-2018-14370
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote Windows host is affected by multiple denial of service vulnerabilities.
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.9. It is, therefore, affected by
multiple denial of service vulnerabilities in the IrCOMM, Profinet I/O, and MSDP dissectors. An unauthenticated,
remote attacker can exploit this by injecting a malformed packet onto the wire or by convincing someone to read
a malformed packet trace file.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
https://www.wireshark.org/docs/relnotes/wireshark-2.2.9.html
https://www.wireshark.org/security/wnpa-sec-2017-38.html
https://www.wireshark.org/security/wnpa-sec-2017-39.html
https://www.wireshark.org/security/wnpa-sec-2017-41.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
Solution
Risk Factor
High
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
References
CVE CVE-2017-13765
CVE CVE-2017-13766
CVE CVE-2017-13767
Plugin Information
Plugin Output
tcp/445
192.168.100.4 630
12217 - DNS Server Cache Snooping Remote Information Disclosure
Synopsis
Description
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.
This may allow a remote attacker to determine which domains have recently been resolved via this name server,
and therefore which hosts have been recently visited.
For instance, if an attacker was interested in whether your company utilizes the online services of a particular
financial institution, they would be able to use this attack to build a statistical model regarding company usage
of that financial institution. Of course, the attack can also be used to find B2B partners, web-surfing patterns,
external mail servers, and more.
Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the internal
network. This may include employees, consultants and potentially users on a guest network or WiFi connection if
supported.
See Also
http://cs.unc.edu/~fabian/course_papers/cache_snooping.pdf
Solution
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Plugin Output
udp/53
192.168.100.4 63
93.184.216.34
73992 - MS KB2960358: Update for Disabling RC4 in .NET TLS
Synopsis
Description
The remote host is missing an update for disabling the weak RC4 cipher suite in .NET TLS.
Note that even though .NET Framework 4.6 itself is not affected, any Framework 4.5, 4.5.1, or 4.5.2 application
that runs on a system that has 4.6 installed is affected.
See Also
http://www.nessus.org/u?bd8cd59b
Solution
Microsoft has released a set of security updates for the .NET Framework on Windows 7, 2008 R2, 8, 2012, 8.1,
2012 R2, and 10.
Risk Factor
Medium
4.2 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
References
MSKB 2960358
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote host is missing an update that allows TLS versions 1.1 and 1.2 to be used with EAP.
Description
The remote host is missing Microsoft KB2977292. This update allows the latest Transport Layer Security
(TLS) versions (1.1 and 1.2) to be used with the Extensible Authentication Protocol (EAP) for more secure
authentication. Enabling this functionality requires a registry edit.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2014/2977292
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
References
MSKB 2977292
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote host is missing one of the workarounds referenced in the Microsoft Security Advisory 3009008.
If the client registry key workaround has not been applied, any client software installed on the remote host
(including IE) is affected by an information disclosure vulnerability when using SSL 3.0.
If the server registry key workaround has not been applied, any server software installed on the remote host
(including IIS) is affected by an information disclosure vulnerability when using SSL 3.0.
SSL 3.0 uses nondeterministic CBC padding, which allows a man-in-the-middle attacker to decrypt portions of
encrypted traffic using a 'padding oracle' attack. This is also known as the 'POODLE'
issue.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2015/3009008
https://support.microsoft.com/en-us/help/245030/how-to-restrict-the-use-of-certain-cryptographic-algorithms-and-
protoc
http://www.nessus.org/u?f3bc3182
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
Apply the client registry key workaround and the server registry key workaround suggested by Microsoft in the
advisory.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.3 (CVSS2#E:U/RL:TF/RC:C)
References
BID 70574
CVE CVE-2014-3566
MSKB 3009008
XREF CERT:577193
Plugin Information
Plugin Output
tcp/445
The workaround to disable SSL 3.0 for all server software installed on
the remote host has not been applied.
The workaround to disable SSL 3.0 for all client software installed on
the remote host has not been applied.
Synopsis
Description
The remote host is missing KB3097966, KB2677070 (automatic updater), or the latest disallowed certificate
update using KB2813430 (manual updater). If KB2677070 has been installed, it has not yet obtained the latest
auto-updates.
Note that this plugin checks that the updaters have actually updated the disallowed CTL list, not that the KBs
listed are installed. This approach was taken since the KB2677070 automatic updater isn't triggered unless
software that relies on SSL in the Microsoft Cryptography API is being actively used on the remote host.
See Also
http://www.nessus.org/u?ef1a29d9
http://www.nessus.org/u?8ae31477
http://www.nessus.org/u?ae2600e6
http://www.nessus.org/u?a2f231b2
Solution
Ensure that the KB3097966 security update has been installed and that the Microsoft automatic updater for
revoked certificates is installed and running.
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
References
MSKB 3097966
Plugin Information
tcp/445
Synopsis
The remote Windows host is missing an update that improves cryptography and digital certificate handling.
Description
The remote Windows host is missing Microsoft KB3123479, an update that restricts the use of certificates with
SHA1 hashes, this restriction being limited to certificates issued under roots in the Microsoft root certificate
program. This update increases the difficulty of carrying out some spoofing, phishing, and man-in-the-middle
attacks.
See Also
http://www.nessus.org/u?475a7f5b
http://www.nessus.org/u?22c2e18d
http://www.nessus.org/u?d9a90a63
http://www.nessus.org/u?b7a673f6
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, 2012 R2, and 10.
Risk Factor
Medium
4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
STIG Severity
References
MSKB 3123479
XREF IAVB:2016-B-0018
Plugin Information
192.168.100.4 640
Published: 2016/01/12, Modified: 2019/01/10
Plugin Output
tcp/445
HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\OID\EncodingType
0\CertDllCreateCertificateChainEngine\Config\default
WeakSha1ThirdPartyFlags
WeakSha1ThirdPartyAfterTime
192.168.100.4 64
91045 - MS KB3155527: Update to Cipher Suites for FalseStart
Synopsis
Description
The remote Windows host is affected by a cipher downgrade vulnerability in FalseStart due to allowing TLS
clients to send application data before receiving and verifying the server 'Finished'
message. A man-in-the-middle attacker can exploit this to force a TLS client to encrypt the first flight of
application_data records using an attacker's chosen cipher suite from the client's list.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3155527
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, 2012 R2, and 10.
Risk Factor
Medium
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
References
MSKB 3155527
Plugin Information
Plugin Output
tcp/445
KB : 3151058
- C:\Windows\system32\schannel.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18298
74422 - MS14-030: Vulnerability in Remote Desktop Could Allow Tampering (2969259)
Synopsis
Description
The remote Windows host is affected by a tampering vulnerability due to an encryption weakness in the Remote
Desktop Protocol (RDP). An attacker could exploit this vulnerability to modify the traffic content of an active RDP
session.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-030
Solution
Microsoft has released a set of patches for Windows 7, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.8 (CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P)
4.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 67865
CVE CVE-2014-0296
MSKB 2966034
MSKB 2965788
XREF MSFT:MS14-030
Plugin Information
Plugin Output
tcp/445
KB : 2966034
- C:\Windows\system32\rdpcorets.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.16663
74423 - MS14-031: Vulnerability in TCP Protocol Could Allow Denial of Service (2962478)
Synopsis
Description
The remote Windows host is affected by a denial of service vulnerability due to the Windows TCP/IP stack
improperly handling certain traffic. An attacker could exploit this vulnerability by sending a sequence of specially
crafted TCP packets to cause a target system to stop responding until it is restarted.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-031
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.1 (CVSS2#E:F/RL:OF/RC:C)
STIG Severity
References
BID 67888
CVE CVE-2014-1811
MSKB 2957189
MSKB 2961858
XREF MSFT:MS14-031
XREF IAVA:2014-A-0081
Exploitable With
Plugin Output
tcp/445
KB : 2961858
- C:\Windows\system32\drivers\tcpip.sys has not been patched.
Remote version : 6.3.9600.16521
Should be : 6.3.9600.16660
74425 - MS14-033: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure
(2966061)
Synopsis
Description
The remote host contains a version of Microsoft XML Core Services that is affected by an information disclosure
vulnerability. An attacker could exploit this issue by convincing a user to visit a specially crafted website, allowing
the attacker to read files on the local user's file system or the content of web domains where the user is currently
authenticated.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-033
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1 and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 67895
CVE CVE-2014-1816
MSKB 2939576
MSKB 2957482
MSKB 2966631
XREF MSFT:MS14-033
Plugin Information
tcp/445
KB : 2966631
- C:\Windows\system32\Msxml3.dll has not been patched.
Remote version : 8.110.9600.16483
Should be : 8.110.9600.16663
77165 - MS14-047: Vulnerability in LRPC Could Allow Security Feature Bypass (2978668)
Synopsis
Description
The remote Windows host is affected by a security feature bypass vulnerability in Microsoft Remote Procedure
Call (LRPC). The vulnerability is due to RPC improperly freeing malformed messages, allowing an attacker to fill
up the address space of a process.
Successful exploitation of the issue allows an attacker to bypass the Address Space Layout Randomization
(ASLR) security feature.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-047
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 69097
CVE CVE-2014-0316
MSKB 2978668
XREF MSFT:MS14-047
XREF IAVA:2014-A-0129
Plugin Information
Published: 2014/08/12, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 2978668
- C:\Windows\system32\Rpcrt4.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17216
192.168.100.4 650
77573 - MS14-053: Vulnerability in .NET Framework Could Allow Denial of Service (2990931)
Synopsis
The version of the .NET Framework installed on the remote host is affected by a denial of service vulnerability.
Description
The remote Windows host has a version of the Microsoft .NET Framework that is affected by a vulnerability that
allows a remote attacker to cause a denial of service by sending specially crafted requests to an ASP.NET web
application running on the affected system.
Note that ASP.NET is not installed by default and ASP.NET must be registered and enabled for the host to be
affected.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-053
Solution
Microsoft has released a set of patches for .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.0, 4.5,
4.5.1, and 4.5.2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 69603
CVE CVE-2014-4072
MSKB 2972207
MSKB 2972211
MSKB 2972212
MSKB 2972213
MSKB 2972214
MSKB 2972215
MSKB 2972216
MSKB 2973112
192.168.100.4 65
MSKB 2973113
MSKB 2973114
MSKB 2973115
MSKB 2974268
MSKB 2974269
MSKB 2977765
MSKB 2977766
XREF MSFT:MS14-053
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a vulnerability in the Windows Audio service component that allows
privilege escalation. A remote attacker could exploit this vulnerability to elevate privileges but not execute code.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-071
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 70978
CVE CVE-2014-6322
MSKB 3005607
XREF MSFT:MS14-071
XREF IAVA:2014-A-0169
Plugin Information
tcp/445
KB : 3005607
- C:\Windows\system32\audiokse.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17393
79134 - MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass
(3003743)
Synopsis
Description
The remote Windows host is running Remote Desktop Protocol, which does not properly log failed logon
attempts, thus allowing attackers to bypass the audit logon security feature.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-074
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 70981
CVE CVE-2014-6318
MSKB 3003743
XREF MSFT:MS14-074
XREF IAVB:2014-B-0148
Plugin Information
tcp/445
KB : 3003743
- C:\Windows\system32\Adtschema.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17396
79834 - MS14-085: Vulnerability in Microsoft Graphics Component Could Allow Information
Disclosure (3013126)
Synopsis
Description
The version of the Microsoft Graphics Component installed on the remote host is affected by an information
disclosure vulnerability due to the way JPEG content is decoded. A remote attacker can exploit this vulnerability
by convincing a user to browse to a website containing specially crafted JPEG content, resulting in the
disclosure of information that can aid in further attacks.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-085
Solution
Microsoft has released a set of patches for Windows Server 2003, Vista, Server 2008, 7, Server 2008 R2, 8, 8.1,
Server 2012, and Server 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:H/RL:OF/RC:C)
References
BID 71502
CVE CVE-2014-6355
MSKB 3013126
XREF MSFT:MS14-085
Plugin Information
Plugin Output
tcp/445
KB : 3013126
- C:\Windows\system32\WindowsCodecs.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17483
80493 - MS15-004: Vulnerability in Windows Components Could Allow Elevation of Privilege
(3025421)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the TS WebProxy Windows
component due to a failure to properly sanitize file paths. An attacker can exploit this to gain the same rights as
the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-004
Solution
Microsoft has released a set of patches for Windows Vista, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
5.0 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 71965
CVE CVE-2015-0016
MSKB 3023299
MSKB 3019978
MSKB 3020387
MSKB 3020388
XREF EDB-ID:35983
XREF MSFT:MS15-004
XREF IAVA:2015-A-0010
Exploitable With
Metasploit (true)
Plugin Information
Plugin Output
tcp/445
KB : 3019978
- C:\Windows\system32\TSWbPrxy.exe has not been patched.
Remote version : 6.3.9600.16421
Should be : 6.3.9600.17555
192.168.100.4 660
80494 - MS15-005: Vulnerability in Network Location Awareness Service Could Allow Security
Feature Bypass (3022777)
Synopsis
Description
The Network Location Awareness (NLA) service on the remote host is affected by a security bypass vulnerability
due to a failure to validate whether it is connected to a trusted domain or an untrusted network. This could cause
the system to unintentionally configure applications insecurely (e.g. the firewall policy) when connecting to an
untrusted network. An attacker on the same network can exploit this by spoofing responses to DNS or LDAP
requests made by the targeted system.
Note that Microsoft has no plans to release an update for Windows 2003 even though it is affected by this
vulnerability.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-005
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.8 (CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P)
4.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 71930
CVE CVE-2015-0006
MSKB 3022777
XREF MSFT:MS15-005
XREF IAVB:2015-B-0004
192.168.100.4 66
Plugin Information
Plugin Output
tcp/445
KB : 3022777
- C:\Windows\system32\Nlasvc.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17550
80496 - MS15-007: Vulnerability in Network Policy Server RADIUS Implementation Could Cause
Denial of Service (3014029)
Synopsis
Description
The remote Windows host is affected by a denial of service vulnerability due to a failure to properly parse
username queries on an Internet Authentication Service (IAS) or a Network Policy Server (NPS). A remote,
unauthenticated attacker, using specially crafted username strings, can exploit this to prevent RADIUS
authentication on the IAS or NPS server.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-007
Solution
Microsoft has released a set of patches for Windows 2003, 2008, 2008 R2, 2012, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 71933
CVE CVE-2015-0015
MSKB 3014029
XREF MSFT:MS15-007
Plugin Information
Plugin Output
tcp/445
KB : 3014029
- C:\Windows\system32\iassam.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17549
81269 - MS15-016: Vulnerability in Microsoft Graphics Component Could Allow Information
Disclosure (3029944)
Synopsis
Description
The version of Microsoft's Graphics Component installed on the remote host is affected by an information
disclosure vulnerability due to improperly handled uninitialized memory when parsing specially crafted TIFF
image format files. A remote attacker can exploit this vulnerability by convincing a user to browse to a website
containing specially crafted TIFF image content, resulting in the disclosure of information.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-016
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 72456
CVE CVE-2015-0061
MSKB 3029944
XREF MSFT:MS15-016
Plugin Information
Plugin Output
tcp/445
KB : 3029944
- C:\Windows\system32\WindowsCodecs.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17631
81737 - MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege (3034344)
Synopsis
Description
The version of Windows running on the remote host is affected by the following vulnerabilities :
- Information disclosure vulnerabilities exist in the kernel-mode driver that can reveal portions of kernel memory.
An attacker can exploit these and gain information about the system, which can then be used to launch further
attacks. (CVE-2015-0077, CVE-2015-0094, CVE-2015-0095)
- A privilege escalation vulnerability exists in the kernel-mode driver due to improper validation of thread tokens.
An authenticated attacker, using a specially crafted application, can exploit this issue to gain administrative
credentials in order to elevate privileges. (CVE-2015-0078)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-023
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
6.0 (CVSS2#E:H/RL:OF/RC:C)
References
BID 72897
BID 72902
BID 72935
BID 72936
CVE CVE-2015-0077
CVE CVE-2015-0078
CVE CVE-2015-0094
CVE CVE-2015-0095
MSKB 3034344
XREF MSFT:MS15-023
Plugin Information
Plugin Output
tcp/445
KB : 3034344
- C:\Windows\system32\Win32k.sys has not been patched.
Remote version : 6.3.9600.16650
Should be : 6.3.9600.17694
81738 - MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure (3035132)
Synopsis
Description
The remote Windows host is affected by an information disclosure vulnerability due to improperly handled
uninitialized memory when parsing specially crafted PNG image format files. A remote attacker can exploit this
vulnerability by convincing a user to visit a website containing specially crafted PNG image content, resulting in
the disclosure of information.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-024
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 72909
CVE CVE-2015-0080
MSKB 3035132
XREF MSFT:MS15-024
XREF IAVB:2015-B-0036
Plugin Information
tcp/445
KB : 3035132
- C:\Windows\system32\WindowsCodecs.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17669
192.168.100.4 670
81743 - MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information
Disclosure (3035126)
Synopsis
Description
The version of Microsoft's Photo Decoder Component installed on the remote Windows host is affected by an
information disclosure vulnerability due to improperly handled uninitialized memory when parsing specially
crafted JPEG XR (.JXR) image format files. A remote attacker can exploit this vulnerability by convincing a user
to visit a website containing specially crafted JPEG image content, resulting in the disclosure of information.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-029
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 72918
CVE CVE-2015-0076
MSKB 3035126
XREF MSFT:MS15-029
XREF IAVB:2015-B-0034
Plugin Information
192.168.100.4 67
Published: 2015/03/10, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3035126
- C:\Windows\system32\wmphoto.dll has not been patched.
Remote version : 6.3.9600.16388
Should be : 6.3.9600.17668
81744 - MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (3039976)
Synopsis
Description
The remote Windows host is affected by a vulnerability due to a failure by the Remote Desktop Protocol (RDP)
to properly free objects in memory. A remote, unauthenticated attacker, by creating multiple RDP sessions, can
exploit this to exhaust the system memory and cause a denial of service.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-030
Solution
Microsoft has released a set of patches for Windows 7, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 72921
CVE CVE-2015-0079
MSKB 3035017
MSKB 3036493
XREF MSFT:MS15-030
Plugin Information
Plugin Output
tcp/445
KB : 3035017
- C:\Windows\system32\rdpudd.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17667
81745 - MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass (3046049)
(FREAK)
Synopsis
Description
The remote Windows host is affected by a security feature bypass vulnerability, known as FREAK (Factoring
attack on RSA-EXPORT Keys), due to the support of weak EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use
EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept
and decrypt the traffic.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-031
https://www.smacktls.com/#freak
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 72965
CVE CVE-2015-1637
MSKB 3046049
XREF CERT:243585
XREF MSFT:MS15-031
Plugin Information
tcp/445
KB : 3046049
- C:\Windows\system32\schannel.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17702
82777 - MS15-041: Vulnerability in .NET Framework Could Allow Information Disclosure (3048010)
Synopsis
The version of the Microsoft .NET Framework installed on the remote host is affected by an information disclose
vulnerability.
Description
The remote Windows host has a version of the Microsoft .NET Framework installed that is affected by an
information disclosure vulnerability due to improper handling of requests on web servers that have custom
error messages disabled. A remote, unauthenticated attacker can exploit this issue, via a specially crafted web
request, to elicit an error message containing information that was not intended to be accessible.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-041
Solution
Microsoft has released a set of patches for .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, 4.5.1, and
4.5.2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 74010
CVE CVE-2015-1648
MSKB 3037572
MSKB 3037573
MSKB 3037574
MSKB 3037575
MSKB 3037576
MSKB 3037577
MSKB 3037578
MSKB 3037579
MSKB 3037580
MSKB 3037581
XREF MSFT:MS15-041
XREF IAVA:2015-A-0089
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a security feature bypass vulnerability due to a failure to properly
validate memory addresses by the Windows kernel. A remote attacker can exploit this flaw, via a specially
crafted application, to bypass the Kernel Address Space Layout Randomization (KASLR), resulting in the
disclosure of the base address of the Cryptography Next Generation (CNG) kernel-mode driver (cng.sys).
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-052
Solution
Microsoft has released a set of patches for Windows 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 74488
CVE CVE-2015-1674
MSKB 3050514
XREF MSFT:MS15-052
Plugin Information
Plugin Output
tcp/445
KB : 3050514
- C:\Windows\system32\drivers\cng.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17785
192.168.100.4 680
83363 - MS15-054: Vulnerability in Microsoft Management Console File Format Could Allow Denial of
Service (3051768)
Synopsis
Description
The remote Windows host is affected by a flaw due to a failure to properly validate a destination buffer
when retrieving icon information from a specially crafted Microsoft Management Console (.msc) file. An
unauthenticated, remote attacker, by tricking a victim into opening a malicious .msc file, can exploit this flaw to
cause a denial of service.
See Also
https://www.zerodayinitiative.com/advisories/ZDI-15-191/
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-054
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 74486
CVE CVE-2015-1681
MSKB 3051768
XREF MSFT:MS15-054
Plugin Information
Plugin Output
192.168.100.4 68
tcp/445
KB : 3051768
None of the versions of 'comctl32.dll' under C:\Windows\WinSxS
have been patched.
Fixed version : 6.10.9600.17784
83360 - MS15-055: Vulnerability in Schannel Could Allow Information Disclosure (3061518)
Synopsis
Description
The remote Windows host is affected by an information disclosure vulnerability due to Secure Channel
(Schannel) allowing the use of a weak Diffie-Hellman ephemeral (DFE) key length of 512 bits in an encrypted
TLS session. Usage of weak keys can result in vulnerable key exchanges that are susceptible to various attacks.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-055
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 74489
CVE CVE-2015-1716
MSKB 3061518
XREF MSFT:MS15-055
Plugin Information
Plugin Output
tcp/445
KB : 3061518
- C:\Windows\system32\schannel.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17810
84745 - MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege
(3072630)
Synopsis
Description
The version of Windows Installer Service installed on the remote Windows host is missing Cumulative Security
Update 3072630. It is, therefore, affected by an elevation of privilege vulnerability in the Windows Installer
service due to improperly running customized action scripts. A local attacker, using specially crafted code that
gets executed by a vulnerable .msi package, can exploit this vulnerability to gain elevated privileges.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-074
Solution
Microsoft has released a set of patches for 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, 2012 R2, and 10.
Risk Factor
Medium
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.1 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2015-2371
MSKB 3072630
XREF MSFT:MS15-074
Plugin Information
Plugin Output
tcp/445
KB : 3072630
- C:\Windows\system32\msi.dll has not been patched.
Remote version : 5.0.9600.16384
Should be : 5.0.9600.17905
84741 - MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633)
Synopsis
Description
Multiple elevation of privilege vulnerabilities exist in Microsoft Windows OLE due to a failure to properly validate
user input. An attacker can exploit these, in conjunction with other vulnerabilities, to execute arbitrary code on an
affected system with the permissions of the current user.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-075
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
CVE CVE-2015-2416
CVE CVE-2015-2417
MSKB 3072633
XREF MSFT:MS15-075
XREF IAVA:2015-A-0169
Plugin Information
tcp/445
KB : 3072633
- C:\Windows\system32\ole32.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.17905
85332 - MS15-082: Vulnerability in RDP Could Allow Remote Code Execution (3080348)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore affected by the following vulnerabilities :
- A spoofing vulnerability exists due to the Remote Desktop Session Host (RDSH) not properly validating
certificates during authentication. An man-in-the-middle attacker can exploit this to impersonate a client session
by spoofing a TLS/SSL server via a certificate that appears valid. (CVE-2015-2472)
- A code execution vulnerability exists due to the Remote Desktop Protocol client not properly handling the
loading of certain specially crafted DLL files. An attacker, by placing a malicious DLL in the user's current
working directory and convincing the user to open a crafted RDP file, can exploit this issue to execute arbitrary
code in the context of the user.
(CVE-2015-2473)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-082
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 8.1, 2012, 2012 R2, RT, and RT
8.1.
Risk Factor
Medium
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.1 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 76224
BID 76228
CVE CVE-2015-2472
CVE CVE-2015-2473
MSKB 3075220
MSKB 3075221
MSKB 3075222
MSKB 3075226
XREF MSFT:MS15-082
XREF IAVA:2015-A-0190
Plugin Information
Plugin Output
tcp/445
KB : 3075220
- C:\Windows\system32\mstscax.dll has not been patched.
Remote version : 6.3.9600.16520
Should be : 6.3.9600.17931
192.168.100.4 690
85335 - MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure
(3080129)
Synopsis
Description
The remote Windows host contains a version of Microsoft XML Core Services (MSXML) that is affected by
multiple information disclosure vulnerabilities :
- An information disclosure vulnerability exists in XML Core Services (MSXML) due to the use of Secure Sockets
Layer (SSL) 2.0. A man-in-the-middle attacker can exploit this vulnerability by forcing an encrypted SSL 2.0
session and then decrypting the resulting network traffic. (CVE-2015-2434, CVE-2015-2471)
- An information disclosure vulnerability exists in XML Core Services (MSXML) due to exposing sensitive
memory addresses. A remote attacker, using a specially crafted website, can exploit this to bypass ASLR and
gain access to private data. (CVE-2015-2440)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-084
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, 2012 R2, RT, RT 8.1,
Office 2007 SP3, and InfoPath 2007 SP3.
Risk Factor
Medium
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
4.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 76229
BID 76232
192.168.100.4 69
BID 76257
CVE CVE-2015-2434
CVE CVE-2015-2440
CVE CVE-2015-2471
MSKB 2825645
MSKB 3076895
XREF MSFT:MS15-084
XREF IAVB:2015-B-0098
Plugin Information
Plugin Output
tcp/445
KB : 3076895
- C:\Windows\system32\msxml6.dll has not been patched.
Remote version : 6.30.9600.16384
Should be : 6.30.9600.17931
85334 - MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure
(3082458)
Synopsis
Description
The remote Windows host is affected by an information disclosure vulnerability when files at a medium integrity
level become accessible to Internet Explorer running in Enhanced Protection Mode (EPM). An attacker can
exploit this vulnerability by leveraging another vulnerability to execute code in IE with EPM, and then executing
Excel, Notepad, PowerPoint, Visio, or Word using an unsafe command line parameter.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-088
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2,
and 10.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 76202
CVE CVE-2015-2423
MSKB 3046017
MSKB 3079757
MSKB 3081436
XREF MSFT:MS15-088
XREF IAVA:2015-A-0197
Plugin Information
Plugin Output
tcp/445
KB : 3046017
- C:\Windows\system32\notepad.exe has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17930
85322 - MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege (3060716)
Synopsis
Description
The remote Windows host is affected by multiple elevation of privilege vulnerabilities in Windows Object
Manager :
- A flaw exists in Windows Object Manager due to a failure to properly validate and enforce impersonation levels.
A remote, authenticated attacker can exploit this vulnerability, via a specially crafted application, to bypass
impersonation-level security, resulting in a privilege escalation. (CVE-2015-2428)
- A flaw exists in Windows Object Manager due to a failure to properly restrict certain registry interactions from
within vulnerable sandboxed applications. A remote attacker can exploit this vulnerability by convincing a user
to open specially crafted file that invokes a vulnerable sandboxed application, to interact with the registry and
escape the application sandbox, resulting in a privilege escalation. (CVE-2015-2429)
- A flaw exists in Windows Object Manager due to a failure to properly restrict certain filesystem interactions from
within vulnerable sandboxed applications. A remote attacker can exploit this vulnerability by convincing a user to
open a specially crafted file that invokes a vulnerable sandboxed application, to interact with the filesystem and
escape the application sandbox, resulting in a privilege escalation. (CVE-2015-2430)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-090
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, and
2012 R2.
Risk Factor
Medium
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 76227
BID 76231
BID 76233
CVE CVE-2015-2428
CVE CVE-2015-2429
CVE CVE-2015-2430
MSKB 3060716
XREF MSFT:MS15-090
XREF IAVA:2015-A-0193
Plugin Information
Plugin Output
tcp/445
KB : 3060716
- C:\Windows\system32\ntdll.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.17933
85846 - MS15-096: Vulnerability in Active Directory Service Could Allow Denial of Service (3072595)
Synopsis
Description
The remote Windows host is affected by a denial of service vulnerability in Active Directory that is triggered
during the handling of a saturation of account creations. An authenticated, remote attacker, with privileges to join
machines to a domain, can exploit this vulnerability by creating multiple machine accounts, resulting in the Active
Directory service becoming non-responsive.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-096
Solution
Microsoft has released a set of patches for Windows 2008, 2008 R2, 2012, and 2012 R2.
Risk Factor
Medium
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 76554
CVE CVE-2015-2535
MSKB 3072595
XREF MSFT:MS15-096
XREF IAVB:2015-B-0110
Plugin Information
tcp/445
KB : 3072595
- C:\Windows\system32\samsrv.dll has not been patched.
Remote version : 6.3.9600.16506
Should be : 6.3.9600.18009
86825 - MS15-118: Security Update for .NET Framework to Address Elevation of Privilege (3104507)
Synopsis
The version of the .NET Framework installed on the remote host is affected by multiple vulnerabilities.
Description
The remote Windows host has a version of the Microsoft .NET Framework that is affected by multiple
vulnerabilities :
- An information disclosure vulnerability exists in the .NET Framework due to improper DTD parsing of crafted
XML files. An unauthenticated, remote attacker can exploit this, via a malicious application file, to gain read
access to the local files on the system.
(CVE-2015-6096)
- A cross-site scripting vulnerability exists in ASP.NET due to improper validation of values in HTTP requests.
An unauthenticated, remote attacker can exploit this to inject arbitrary script into the user's browser session.
(CVE-2015-6099)
- A security feature bypass vulnerability exists in the .NET Framework due to improper implementation of the
Address Space Layout Randomization (ASLR) feature. An unauthenticated, remote attacker can exploit this, via
crafted website content, to predict memory offsets in a call stack. (CVE-2015-6115)
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-118
Solution
Microsoft has released a set of patches for .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, 4.5.1, 4.5.2, and 4.6.
Risk Factor
Medium
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 77474
BID 77479
BID 77482
CVE CVE-2015-6096
CVE CVE-2015-6099
CVE CVE-2015-6115
MSKB 3097988
MSKB 3097989
MSKB 3097991
MSKB 3097992
MSKB 3097994
MSKB 3097995
MSKB 3097996
MSKB 3097997
MSKB 3097999
MSKB 3098000
MSKB 3098001
MSKB 3098778
MSKB 3098779
MSKB 3098780
MSKB 3098781
MSKB 3098784
MSKB 3098785
MSKB 3098786
MSKB 3105213
XREF MSFT:MS15-118
XREF IAVA:2015-A-0271
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a denial of service vulnerability in the Internet Protocol Security (IPSec)
service due to improper handling of encryption negotiation. An authenticated, remote attacker can exploit this,
via a malicious application, to cause the host to become unresponsive.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-120
Solution
Microsoft has released a set of patches for Windows 8, 2012, 8.1, and 2012 R2
Risk Factor
Medium
6.3 (CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:C)
4.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 77481
CVE CVE-2015-6111
MSKB 3102939
XREF MSFT:MS15-120
XREF IAVB:2015-B-0133
Plugin Information
tcp/445
KB : 3102939
- C:\Windows\system32\ikeext.dll has not been patched.
Remote version : 6.3.9600.16427
Should be : 6.3.9600.18086
86827 - MS15-121: Security Update for Schannel to Address Spoofing (3081320)
Synopsis
Description
The remote Windows host is affected by a spoofing vulnerability due to a weakness in the Secure Channel
(SChannel) TLS protocol implementation. A man-in-the-middle attacker can exploit this vulnerability to
impersonate a victim on any other server that uses the same credentials as those used between the client and
server where the attack is initiated.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-121
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, and
2012 R2.
Risk Factor
Medium
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
4.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 77484
CVE CVE-2015-6112
MSKB 3081320
XREF MSFT:MS15-121
XREF IAVA:2015-A-0273
Plugin Information
Published: 2015/11/10, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3081320
- C:\Windows\system32\schannel.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18088
88652 - MS16-020: Security Update for Active Directory Federation Services to Address Denial of
Service (3134222)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a denial of service
vulnerability in Active Directory Federation Services (ADFS) due to a failure to properly process certain input
during forms-based authentication. A remote attacker can exploit this, via crafted input, to cause the server to
become unresponsive.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-020
Solution
Microsoft has released a set of patches for Windows Server 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2016-0037
MSKB 3134222
XREF MSFT:MS16-020
XREF IAVB:2016-B-0023
Plugin Information
tcp/445
KB : 3134222
None of the versions of 'Microsoft.IdentityServer.dll' under C:\Windows\WinSxS
have been patched.
Fixed version : 6.3.9600.18192
88653 - MS16-021: Security Update for NPS RADIUS Server to Address Denial of Service (3133043)
Synopsis
Description
The remote Windows host is affected by a denial of service vulnerability in the Network Policy Server (NPS) due
to improper handling of RADIUS authentication requests. An unauthenticated, remote attacker can exploit this,
via specially crafted username strings, to cause a denial of service condition for RADIUS authentication on the
NPS.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-021
Solution
Microsoft has released a set of patches for Windows 2008, 2008 R2, 2012, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 82513
CVE CVE-2016-0050
MSKB 3133043
XREF MSFT:MS16-021
XREF IAVA:2016-A-0047
Plugin Information
tcp/445
KB : 3133043
- C:\Windows\system32\iassam.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18191
90440 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager
(SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level
negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept
communications between a client and a server hosting a SAM database can exploit this to force the
authentication level to downgrade, allowing the attacker to impersonate an authenticated user and access the
SAM database.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-047
http://badlock.org/
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
Medium
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 86002
CVE CVE-2016-0128
MSKB 3148527
MSKB 3149090
MSKB 3147461
MSKB 3147458
XREF MSFT:MS16-047
XREF CERT:813296
XREF IAVA:2016-A-0093
Plugin Information
Plugin Output
tcp/445
KB : 3149090
- C:\Windows\system32\lsasrv.dll has not been patched.
Remote version : 6.3.9600.16473
Should be : 6.3.9600.18267
192.168.100.4 710
90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock)
(uncredentialed check)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager
(SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level
negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept
communications between a client and a server hosting a SAM database can exploit this to force the
authentication level to downgrade, allowing the attacker to impersonate an authenticated user and access the
SAM database.
See Also
http://www.nessus.org/u?52ade1e9
http://badlock.org/
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
Medium
6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)
5.9 (CVSS:3.0/E:U/RL:O/RC:C)
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
4.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
192.168.100.4 71
References
BID 86002
CVE CVE-2016-0128
MSKB 3148527
MSKB 3149090
MSKB 3147461
MSKB 3147458
XREF MSFT:MS16-047
XREF CERT:813296
XREF IAVA:2016-A-0093
Plugin Information
Plugin Output
tcp/49155
90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock)
(uncredentialed check)
Synopsis
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager
(SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level
negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept
communications between a client and a server hosting a SAM database can exploit this to force the
authentication level to downgrade, allowing the attacker to impersonate an authenticated user and access the
SAM database.
See Also
http://www.nessus.org/u?52ade1e9
http://badlock.org/
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
Medium
6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)
5.9 (CVSS:3.0/E:U/RL:O/RC:C)
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
4.3 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
BID 86002
CVE CVE-2016-0128
MSKB 3148527
MSKB 3149090
MSKB 3147461
MSKB 3147458
XREF MSFT:MS16-047
XREF CERT:813296
XREF IAVA:2016-A-0093
Plugin Information
Plugin Output
tcp/49158
91016 - MS16-067: Security Update for Volume Manager Driver (3155784)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an information disclosure
vulnerability due to a failure to correctly tie the session of the mounting user to the USB disk being mounted.
This issue occurs when the USB disk is mounted over the Remote Desktop Protocol (RDP) via RemoteFX. An
attacker can exploit this to access the file and directory information on the mounted USB disk.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-067
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, and 2012 R2.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 90075
CVE CVE-2016-0190
MSKB 3155784
XREF MSFT:MS16-067
XREF IAVB:2016-B-0089
Plugin Information
tcp/445
KB : 3155784
- C:\Windows\system32\drivers\volmgr.sys has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18302
91608 - MS16-081: Security Update for Active Directory (3160352)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a denial of service
vulnerability in Active Directory. An authenticated, remote attacker can exploit this, via the creation of multiple
machine accounts, to cause the Active Directory service to stop responding.
Note that an attacker must have access to an account that has privileges to join machines to the domain in order
to exploit this vulnerability.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-081
Solution
Microsoft has released a set of patches for Windows 2008 R2, 2012, and 2012 R2.
Risk Factor
Medium
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91118
CVE CVE-2016-3226
MSKB 3160352
XREF MSFT:MS16-081
XREF IAVB:2016-B-0101
Plugin Information
Plugin Output
tcp/445
KB : 3160352
- C:\Windows\system32\Ntdsai.dll has not been patched.
Remote version : 6.3.9600.16517
Should be : 6.3.9600.18331
91609 - MS16-082: Security Update for Microsoft Windows Search Component (3165270)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a flaw in the Windows Search
component due to improper handling of objects in memory. An authenticated attacker can exploit this to degrade
server performance, resulting in a denial of service condition.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-082
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10
Risk Factor
Medium
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91113
CVE CVE-2016-3230
MSKB 3161958
MSKB 3163017
MSKB 3163018
XREF MSFT:MS16-082
XREF IAVB:2016-B-0100
Plugin Information
Published: 2016/06/14, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3161958
- C:\Windows\system32\structuredquery.dll has not been patched.
Remote version : 7.0.9600.16384
Should be : 7.0.9600.18334
192.168.100.4 720
93474 - MS16-115: Security Update for Microsoft Windows PDF Library (3188733)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple information
disclosure vulnerabilities in the Windows PDF Library due to improper handling of objects in memory. An
unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to open a specially crafted
PDF file or visit a website containing specially crafted PDF content, to disclose sensitive information from
memory.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-115
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
Medium
4.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
4.1 (CVSS:3.0/E:H/RL:O/RC:C)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
II
References
BID 92838
192.168.100.4 72
BID 92839
CVE CVE-2016-3370
CVE CVE-2016-3374
MSKB 3184943
MSKB 3185611
MSKB 3185614
MSKB 3189866
XREF MSFT:MS16-115
XREF IAVA:2016-A-0244
Plugin Information
Plugin Output
tcp/445
KB : 3184943
- C:\Windows\system32\windows.data.pdf.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.18454
97741 - MS17-016: Security Update for Windows IIS (4013074)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by a cross-site scripting (XSS)
vulnerability due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit
this, via a specially crafted request, to execute arbitrary script code in a user's browser session.
See Also
https://technet.microsoft.com/library/security/MS17-016
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
Medium
4.7 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)
4.1 (CVSS:3.0/E:U/RL:O/RC:C)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 96622
CVE CVE-2017-0055
MSKB 4012373
MSKB 4012212
MSKB 4012215
MSKB 4012213
MSKB 4012216
MSKB 4012214
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-016
XREF IAVB:2017-B-0033
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an information disclosure
vulnerability in Windows DirectShow due to improper handling of objects in memory. An unauthenticated, remote
attacker can exploit this, by convincing a user to visit a website containing specially crafted media content, to
disclose sensitive information.
See Also
https://technet.microsoft.com/library/security/ms17-021
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Note that the Microsoft Bulletin contains contradictory information regarding the Windows 2012 Security Only
Update and the Windows 2012 Monthly Rollup Update. These updates may not resolve the vulnerability. Please
contact Microsoft for clarification if you are running Windows 2012.
Risk Factor
Medium
4.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
3.8 (CVSS:3.0/E:U/RL:O/RC:C)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 96098
CVE CVE-2017-0042
MSKB 3214051
MSKB 4012212
MSKB 4012215
MSKB 4012213
MSKB 4012216
MSKB 4015548
MSKB 4015551
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-021
XREF IAVB:2017-B-0031
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by an information disclosure vulnerability in Microsoft XML Core Services
(MSXML) due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this
vulnerability, by convincing a user to visit a specially crafted website, to test for the presence of files on disk.
See Also
https://technet.microsoft.com/library/security/MS17-022
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
Medium
4.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
3.8 (CVSS:3.0/E:U/RL:O/RC:C)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 96069
CVE CVE-2017-0022
MSKB 3216916
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
XREF MSFT:MS17-022
XREF IAVA:2017-A-0067
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host has at least one service installed that uses an unquoted service path.
Description
The remote Windows host has at least one service installed that uses an unquoted service path, which contains
at least one whitespace. A local attacker can gain elevated privileges by inserting an executable file in the path
of the affected service.
Note that this is a generic test that will flag any application affected by the described vulnerability.
See Also
http://www.nessus.org/u?84a4cc1c
http://cwe.mitre.org/data/definitions/428.html
https://www.commonexploits.com/unquoted-service-paths/
http://www.nessus.org/u?4aa6acbc
Solution
Ensure that any services that contain a space in the path enclose the path in quotes.
Risk Factor
Medium
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 58591
BID 58617
BID 65873
BID 68520
CVE CVE-2013-1609
CVE CVE-2014-0759
CVE CVE-2014-5455
XREF ICSA:14-058-01
XREF EDB-ID:34037
Exploitable With
Metasploit (true)
Plugin Information
Plugin Output
tcp/445
192.168.100.4 730
111163 - Oracle Java SE Multiple Vulnerabilities (July 2018 CPU)
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 10
Update 2, 8 Update 181, 7 Update 191, or 6 Update 201. It is, therefore, affected by multiple vulnerabilities
related to the following components :
- Concurrency. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via
multiple protocols to compromise Java SE (CVE-2018-2952)
- Deployment. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via
multiple protocols to compromise Java SE (CVE-2018-2964)
- JSSE. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via multiple
protocols to compromise Java SE (CVE-2018-2973)
- Java DB. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via multiple
protocols to compromise Java SE. (CVE-2018-2938)
- JavaFX. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via multiple
protocols to compromise Java SE. (CVE-2018-2941)
- Libraries. An easily exploitable vulnerability allows an unauthenticated attacker with network access via multiple
protocols to compromise Java SE. (CVE-2018-2940)
- Security. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via multiple
protocols to compromise Java SE (CVE-2018-2972)
- Windows DLL. A difficult to exploit vulnerability allows an unauthenticated attacker with network access via
multiple protocols to compromise Java SE (CVE-2018-2942)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
http://www.nessus.org/u?dbb3b1db
http://www.nessus.org/u?8a11ccea
http://www.nessus.org/u?6c975c0b
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?726f7054
Solution
Upgrade to Oracle JDK / JRE 10 Update 2, 8 Update 181 / 7 Update 191 / 6 Update 201 or later. If necessary,
remove any affected versions.
192.168.100.4 73
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
Medium
9.0 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
References
BID 104765
BID 104768
BID 104773
BID 104774
BID 104775
BID 104780
BID 104781
BID 104782
CVE CVE-2018-2938
CVE CVE-2018-2940
CVE CVE-2018-2941
CVE CVE-2018-2942
CVE CVE-2018-2952
CVE CVE-2018-2964
CVE CVE-2018-2972
CVE CVE-2018-2973
Plugin Information
Plugin Output
tcp/445
Synopsis
The remote Windows host contains a programming platform that is affected by multiple vulnerabilities.
Description
The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 11
Update 1, 8 Update 191, 7 Update 201, or 6 Update 211. It is, therefore, affected by multiple vulnerabilities
related to the following components :
- An unspecified vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE in the
Deployment (libpng) subcomponent could allow an unauthenticated, remote attacker with network access via
HTTP to compromise Java SE, Java SE Embedded. (CVE-2018-13785)
- An unspecified vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE in the Hotspot
subcomponent could allow an unauthenticated, remote attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. (CVE-2018-3169)
- An unspecified vulnerability in the Java SE component of Oracle Java SE in the JavaFX subcomponent could
allow an unauthenticated, remote attacker with network access via multiple protocols to compromise Java SE.
(CVE-2018-3209)
- An unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE in the
JNDI subcomponent could allow an unauthenticated, remote attacker with network access via multiple protocols
to compromise Java SE, Java SE Embedded, JRockit.
(CVE-2018-3149)
- An unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE in
the JSSE subcomponent could allow an unauthenticated, remote attacker with network access via SSL/TLS to
compromise Java SE, Java SE Embedded, JRockit.
(CVE-2018-3180)
- An unspecified vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE in the
Networking subcomponent could allow an unauthenticated, remote attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded.
(CVE-2018-3139)
- An unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE in
the Scripting subcomponent could allow an unauthenticated, remote attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded, JRockit. (CVE-2018-3183)
- An unspecified vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE in the Security
subcomponent could allow an unauthenticated, remote attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. (CVE-2018-3136)
- An unspecified vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE in the
Serviceability subcomponent could allow a low privileged attacker with logon to the infrastructure where Java
SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. (CVE-2018-3211)
- An unspecified vulnerability in the Java SE component of Oracle Java SE in the Sound subcomponent could
allow an unauthenticated, remote attacker with network access via multiple protocols to compromise Java SE.
(CVE-2018-3157)
- An unspecified vulnerability in the Java SE component of Oracle Java SE in the Utility subcomponent could
allow an unauthenticated, remote attacker with network access via multiple protocols to compromise Java SE.
(CVE-2018-3150)
Please consult the CVRF details for the applicable CVEs for additional information.
Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.
See Also
http://www.nessus.org/u?705136d8
http://www.nessus.org/u?278f2590
http://www.nessus.org/u?adc8ef52
http://www.nessus.org/u?2fbcacca
http://www.nessus.org/u?de812f33
Solution
Upgrade to Oracle JDK / JRE 11 Update 1, 8 Update 191 / 7 Update 201 / 6 Update 211 or later. If necessary,
remove any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later.
Risk Factor
Medium
5.6 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
References
BID 105587
BID 105590
BID 105591
BID 105595
BID 105597
BID 105599
BID 105601
BID 105602
BID 105608
BID 105615
BID 105617
BID 105622
CVE CVE-2018-3136
CVE CVE-2018-3139
CVE CVE-2018-3149
CVE CVE-2018-3150
CVE CVE-2018-3157
CVE CVE-2018-3169
CVE CVE-2018-3180
CVE CVE-2018-3183
CVE CVE-2018-3209
CVE CVE-2018-3211
CVE CVE-2018-3214
CVE CVE-2018-13785
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Oracle VM VirtualBox installed on the remote host is 5.0.x prior to 5.0.34 or 5.1.x prior to 5.1.16.
It is, therefore, affected by an information disclosure vulnerability within the shared folder implementation,
specifically in the vbsfPathCheckRootEscape() function, that permits cooperating guests that have write access
to the same shared folder to gain access to the file system of the Linux host. An authenticated attacker within a
guest VM can exploit this to read arbitrary files on the host. However, exploitation requires that the shared folder
is not more than nine levels away from the file system root.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.
See Also
http://www.nessus.org/u?a61fdb8e
https://www.virtualbox.org/wiki/Changelog
Solution
Risk Factor
Medium
7.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
6.3 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:N)
4.7 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2017-3538
Plugin Information
Plugin Output
tcp/445
Synopsis
An application installed on the remote host is affected by multiple unspecified denial of service vulnerabilities.
Description
The Oracle VM VirtualBox application installed on the remote host is a version prior to 4.0.34, 4.1.42, 4.2.34,
4.3.32, or 5.0.8. It is, therefore, affected by multiple unspecified flaws in the Core subcomponent. A local attacker
can exploit these to cause a denial of service.
See Also
http://www.nessus.org/u?75a4a4fb
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 4.0.34 / 4.1.42 / 4.2.34 / 4.3.32 / 5.0.8 or later as referenced in the
October 2015 Oracle Critical Patch Update advisory.
Risk Factor
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2015-4813
CVE CVE-2015-4896
Plugin Information
Plugin Output
tcp/445
192.168.100.4 740
88052 - Oracle VM VirtualBox < 4.3.36 / 5.0.14 Multiple Vulnerabilities (January 2016 CPU)
Synopsis
Description
The Oracle VM VirtualBox application installed on the remote host is a version prior to 4.3.36 or 5.0.14. It is,
therefore, affected by the following vulnerabilities :
- An unspecified vulnerability exists in the Core subcomponent that allows a remote attacker to affect the
availability of the system. No other details are available. (CVE-2016-0495)
- An unspecified vulnerability exists in the Core subcomponent that allows a local attacker to affect the
availability of the system. No other details are available. (CVE-2016-0592)
- An unspecified vulnerability exists in the Windows Installer subcomponent that allows a local attacker to gain
elevated privileges. No other details are available. (CVE-2016-0602)
See Also
http://www.nessus.org/u?ab4ebec1
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 4.3.36 / 5.0.14 or later as referenced in the January 2016 Oracle
Critical Patch Update advisory.
Risk Factor
Medium
6.2 (CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)
4.6 (CVSS2#E:U/RL:OF/RC:C)
References
CVE CVE-2016-0495
CVE CVE-2016-0592
CVE CVE-2016-0602
192.168.100.4 74
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The Oracle VM VirtualBox application installed on the remote host is a version prior to 4.3.36 or 5.0.18. It is,
therefore, affected by an unspecified flaw in the Core subcomponent that allows a local attacker to gain elevated
privileges. Additionally, multiple vulnerabilities exist in the bundled version of OpenSSL :
- A flaw exists in the ssl3_get_key_exchange() function in file s3_clnt.c when handling a ServerKeyExchange
message for an anonymous DH ciphersuite with the value of 'p' set to 0. A attacker can exploit this, by causing a
segmentation fault, to crash an application linked against the library, resulting in a denial of service.
(CVE-2015-1794)
- A carry propagating flaw exists in the x86_64 Montgomery squaring implementation that may cause the
BN_mod_exp() function to produce incorrect results. An attacker can exploit this to obtain sensitive information
regarding private keys. (CVE-2015-3193)
- A NULL pointer dereference flaw exists in file rsa_ameth.c due to improper handling of ASN.1 signatures that
are missing the PSS parameter. A remote attacker can exploit this to cause the signature verification routine to
crash, resulting in a denial of service condition. (CVE-2015-3194)
- A flaw exists in the ASN1_TFLG_COMBINE implementation in file tasn_dec.c related to handling malformed
X509_ATTRIBUTE structures. A remote attacker can exploit this to cause a memory leak by triggering a
decoding failure in a PKCS#7 or CMS application, resulting in a denial of service. (CVE-2015-3195)
- A race condition exists in s3_clnt.c that is triggered when PSK identity hints are incorrectly updated in the
parent SSL_CTX structure when they are received by a multi-threaded client. A remote attacker can exploit
this, via a crafted ServerKeyExchange message, to cause a double-free memory error, resulting in a denial of
service. (CVE-2015-3196)
- A cipher algorithm downgrade vulnerability exists due to a flaw that is triggered when handling cipher
negotiation. A remote attacker can exploit this to negotiate SSLv2 ciphers and complete SSLv2 handshakes
even if all SSLv2 ciphers have been disabled on the server. Note that this vulnerability only exists if the
SSL_OP_NO_SSLv2 option has not been disabled.
(CVE-2015-3197)
See Also
http://www.nessus.org/u?ffb7b96f
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 4.3.36 / 5.0.18 or later as referenced in the April 2016 Oracle Critical
Patch Update advisory.
Risk Factor
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 78622
BID 78623
BID 78626
BID 82237
CVE CVE-2015-1794
CVE CVE-2015-3193
CVE CVE-2015-3194
CVE CVE-2015-3195
CVE CVE-2015-3196
CVE CVE-2015-3197
CVE CVE-2016-0678
XREF CERT:257823
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The Oracle VM VirtualBox application installed on the remote host is a version prior to 5.0.26. It is, therefore,
affected by an unspecified flaw in the Core subcomponent that allows a local attacker to cause a denial of
service condition.
See Also
http://www.nessus.org/u?453b5f8c
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 5.0.26 or later as referenced in the July 2016 Oracle Critical Patch
Update advisory.
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
4.9 (CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)
References
CVE CVE-2016-3597
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.20. It is, therefore, affected
by multiple vulnerabilities as noted in the October 2018 Critical Patch Update advisory :
- An unspecified vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization in the Core
subcomponent could allow an unauthenticated, remote attacker with logon to the infrastructure where Oracle VM
VirtualBox executes to compromise Oracle VM VirtualBox. (CVE-2018-2909, CVE-2018-3287, CVE-2018-3288,
CVE-2018-3289, CVE-2018-3290, CVE-2018-3291, CVE-2018-3292, CVE-2018-3293, CVE-2018-3294,
CVE-2018-3295, CVE-2018-3296, CVE-2018-3297, CVE-2018-3298)
- An unspecified vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization in the OpenSSL
subcomponent could allow an unauthenticated, remote attacker with network access via TLS to compromise
Oracle VM VirtualBox. (CVE-2018-0732)
Please consult the CVRF details for the applicable CVEs for additional information.
Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.
See Also
http://www.nessus.org/u?aca0e0f6
https://www.virtualbox.org/wiki/Changelog
Solution
Upgrade to Oracle VM VirtualBox version 5.2.20 or later as referenced in the October 2018 Oracle Critical Patch
Update advisory.
Risk Factor
Medium
9.0 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
6.0 (CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P)
References
BID 104442
CVE CVE-2018-0732
CVE CVE-2018-2909
CVE CVE-2018-3287
CVE CVE-2018-3288
CVE CVE-2018-3289
CVE CVE-2018-3290
CVE CVE-2018-3291
CVE CVE-2018-3292
CVE CVE-2018-3293
CVE CVE-2018-3294
CVE CVE-2018-3295
CVE CVE-2018-3296
CVE CVE-2018-3297
CVE CVE-2018-3298
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The version of RARLAB WinRAR installed on the remote Windows host is prior to 5.70 Beta 1. It is, therefore,
affected by the following vulnerabilities :
- An error exists in the file 'unacev2.dll' related to the 'filename' field, that allows a specially crafted ACE archive
to overwrite files outside the destination folder. Such files could be in the system startup locations, and thus, lead
to arbitrary code execution on next boot. (CVE-2018-20250)
- An input-validation error exists in the file 'unacev2.dll' related to handling ACE archives and filenames that
allows path traversal pattern checking to be bypassed. (CVE-2018-2051)
- An out-of-bounds write error exists related to handling ACE and RAR file parsing that allows arbitrary code
execution. (CVE-2018-20252)
- An out-of-bounds write error exists related to handling LHA and LZH file parsing that allows arbitrary code
execution. (CVE-2018-20253)
See Also
https://research.checkpoint.com/extracting-code-execution-from-winrar/
https://github.com/Ridter/acefile
Solution
Risk Factor
Medium
7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
7.5 (CVSS:3.0/E:H/RL:O/RC:C)
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.9 (CVSS2#E:H/RL:OF/RC:C)
References
BID 106948
CVE CVE-2018-20250
CVE CVE-2018-20251
CVE CVE-2018-20252
CVE CVE-2018-20253
Exploitable With
Plugin Information
Plugin Output
tcp/445
192.168.100.4 750
51192 - SSL Certificate Cannot Be Trusted
Synopsis
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the
chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public certificate
authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when
intermediate certificates are missing that would connect the top of the certificate chain to a known public
certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur
either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's
'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could
not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its
issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that
Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify
the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks
against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
192.168.100.4 75
Plugin Information
Plugin Output
tcp/636
|-Subject :
|-Issuer : DC=CL/DC=CLINICAISV/CN=CLINICAISV-SERVIDORDOMINIO-CA-1
51192 - SSL Certificate Cannot Be Trusted
Synopsis
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the
chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public certificate
authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when
intermediate certificates are missing that would connect the top of the certificate chain to a known public
certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur
either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's
'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could
not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its
issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that
Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify
the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks
against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Plugin Output
tcp/3269
|-Subject :
|-Issuer : DC=CL/DC=CLINICAISV/CN=CLINICAISV-SERVIDORDOMINIO-CA-1
51192 - SSL Certificate Cannot Be Trusted
Synopsis
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the
chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public certificate
authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when
intermediate certificates are missing that would connect the top of the certificate chain to a known public
certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur
either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's
'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could
not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its
issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that
Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify
the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks
against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Plugin Output
tcp/3389
|-Subject : CN=ServidorDominio.CLINICAISV.CL
|-Issuer : CN=ServidorDominio.CLINICAISV.CL
35291 - SSL Certificate Signed Using Weak Hashing Algorithm
Synopsis
An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
Description
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing
algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision
attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an
attacker to masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as
vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.
Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been
ignored.
See Also
https://tools.ietf.org/html/rfc3279
http://www.nessus.org/u?9bb87bf2
http://www.nessus.org/u?e120eea1
http://www.nessus.org/u?5d894816
http://www.nessus.org/u?51db68aa
http://www.nessus.org/u?9dc7bfba
Solution
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.7 (CVSS:3.0/E:P/RL:O/RC:C)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.9 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 11849
BID 33065
CVE CVE-2004-2761
XREF CERT:836068
XREF CWE:310
Plugin Information
Plugin Output
tcp/3389
icates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak.
|-Subject : CN=ServidorDominio.CLINICAISV.CL
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From: Apr 11 21:29:06 2019 GMT
|-Valid To: Oct 11 21:29:06 2019 GMT
42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses
the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2016-2183
Plugin Information
Plugin Output
tcp/636
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.100.4 760
42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses
the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2016-2183
Plugin Information
Plugin Output
tcp/3269
192.168.100.4 76
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses
the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2016-2183
Plugin Information
Plugin Output
tcp/3389
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host
is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack
against the remote host.
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is
signed by an unrecognized certificate authority.
Solution
Risk Factor
Medium
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Plugin Output
tcp/3389
|-Subject : CN=ServidorDominio.CLINICAISV.CL
78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim
application to repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or
newer is supported by the client and service.
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that cannot
disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.
See Also
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
disabled.
Risk Factor
Medium
6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Plugin Output
tcp/636
Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim
application to repeatedly send the same data over newly created SSL 3.0 connections.
As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or
newer is supported by the client and service.
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that cannot
disable SSLv3 immediately should enable this mechanism.
This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.
See Also
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
disabled.
Risk Factor
Medium
6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Plugin Output
tcp/3269
Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.
Synopsis
The Internet Explorer installation on the remote host is affected by multiple vulnerabilities.
Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by
multiple vulnerabilities :
- A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different
origins. The vulnerability allows Microsoft browsers to bypass Same-Origin Policy (SOP) restrictions, and to
allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could
force the browser to send data that would otherwise be restricted.
(CVE-2019-1192)
- A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The
vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context
of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
the current user. (CVE-2019-1193)
- A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in
Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary
code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
(CVE-2019-1133, CVE-2019-1194)
See Also
http://www.nessus.org/u?b7972a29
http://www.nessus.org/u?5235a5d1
http://www.nessus.org/u?127b7a44
http://www.nessus.org/u?79b786e1
http://www.nessus.org/u?1fc7ed0c
Solution
Microsoft has released the following security updates to address this issue:
-KB4512506
-KB4512518
-KB4512476
-KB4511872
-KB4512488
Risk Factor
Medium
192.168.100.4 770
CVSS v3.0 Base Score
5.0 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
STIG Severity
II
References
CVE CVE-2019-1133
CVE CVE-2019-1192
CVE CVE-2019-1193
CVE CVE-2019-1194
MSKB 4512506
MSKB 4512518
MSKB 4512476
MSKB 4511872
MSKB 4512488
XREF MSFT:MS19-4512506
XREF MSFT:MS19-4512518
XREF MSFT:MS19-4512476
XREF MSFT:MS19-4511872
XREF MSFT:MS19-4512488
XREF IAVA:2019-A-0288
Plugin Information
Plugin Output
tcp/445
KB : 4511872
- C:\Windows\system32\mshtml.dll has not been patched.
Remote version : 11.0.9600.16438
Should be : 11.0.9600.19431
Note: The fix for this issue is available in either of the following updates:
- KB4511872 : Cumulative Security Update for Internet Explorer
- KB4512488 : Windows 8.1 / Server 2012 R2 Monthly Rollup
192.168.100.4 77
126263 - SolarWinds Dameware Mini Remote Control Client Public Key Buffer Over-read
Synopsis
The remote host is running a remote control application that is affected by a buffer over-read vulnerability.
Description
The SolarWinds Dameware Mini Remote Control Client Agent running on the remote host is affected by a buffer
over-read vulnerability due to improper validation of user-supplied data. An unauthenticated, remote attacker can
exploit this, via a series of requests, to cause a denial of service condition.
Note that the software is reportedly affected by additional vulnerabilities; however, this plugin has not tested for
these.
See Also
http://www.nessus.org/u?1220acd8
Solution
Risk Factor
Medium
7.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H)
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P)
References
CVE CVE-2019-3956
XREF TRA:TRA-2019-26
Plugin Information
Plugin Output
tcp/6129
117339 - Wireshark 2.2.x < 2.2.17 / 2.4.x < 2.4.9 / 2.6.x < 2.6.3 Multiple Vulnerabilities
Synopsis
Description
The version of Wireshark installed on the remote Windows host is 2.2.x prior to 2.2.17, 2.4.x prior to 2.4.9, or
2.6.x prior to 2.6.3.
It is, therefore, affected by multiple vulnerabilities.
See Also
https://www.wireshark.org/security/wnpa-sec-2018-44.html
https://www.wireshark.org/security/wnpa-sec-2018-45.html
https://www.wireshark.org/security/wnpa-sec-2018-46.html
Solution
Risk Factor
Medium
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
References
BID 105174
CVE CVE-2018-16056
CVE CVE-2018-16057
CVE CVE-2018-16058
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is affected by a vulnerability in the Windows Error Reporting service component that
allows bypassing the 'Protected Process Light' security feature. A remote attacker can exploit this vulnerability to
gain access to the memory of a running process.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-006
Solution
Microsoft has released a set of patches for Windows 8, 2012, 8.1, and 2012 R2.
Risk Factor
Low
1.9 (CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N)
1.4 (CVSS2#E:U/RL:OF/RC:C)
References
BID 71927
CVE CVE-2015-0001
MSKB 3004365
XREF MSFT:MS15-006
Plugin Information
Plugin Output
tcp/445
KB : 3004365
- C:\Windows\system32\wer.dll has not been patched.
Remote version : 6.3.9600.16408
Should be : 6.3.9600.17550
81267 - MS15-014: Vulnerability in Group Policy Could Allow Security Feature Bypass (3004361)
Synopsis
Description
The version of Windows running on the remote host is affected by a security downgrade vulnerability that affects
workstations and servers configured to use Group Policy. A man-in-the-middle attacker, via modified domain
controller responses sent to targeted systems, can cause the policy file to become corrupted and unreadable,
resulting in the Group Policy settings reverting to their default, potentially less secure, state.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-014
Solution
Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
Low
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
BID 72476
CVE CVE-2015-0009
MSKB 3004361
XREF CERT:787252
XREF MSFT:MS15-014
XREF IAVB:2015-B-0017
Plugin Information
Published: 2015/02/10, Modified: 2018/11/15
Plugin Output
tcp/445
KB : 3004361
- C:\Windows\system32\scesrv.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17552
81741 - MS15-027: Vulnerability in NETLOGON Could Allow Spoofing (3002657)
Synopsis
Description
The remote Windows host is affected by a spoofing vulnerability due to the Netlogon service improperly
establishing a secure communications channel to a different machine with a spoofed computer name. A remote
attacker, on a domain-joined system with the ability to observe network traffic, can exploit this vulnerability to
obtain session-related data of the spoofed computer. This information can be used to mount further attacks.
Note that this vulnerability only affects a server if it is configured as a domain controller.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-027
Solution
Microsoft has released a set of patches for Windows 2003, 2008, 2008 R2, 2012, 2012 R2.
Risk Factor
Low
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
2.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 72933
CVE CVE-2015-0005
MSKB 3002657
XREF MSFT:MS15-027
Plugin Information
Plugin Output
tcp/445
KB : 3002657
- C:\Windows\system32\netlogon.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17678
192.168.100.4 780
84735 - MS15-071: Vulnerability in NETLOGON Could Allow Elevation of Privilege (3068457)
Synopsis
Description
The remote Windows host is affected by a privilege escalation vulnerability due to the Netlogon service
improperly establishing a communications channel to a primary domain controller (PDC). An attacker, with
access to the PDC, can exploit this by using a crafted application to create a secure channel to the PDC as a
backup domain controller (BDC), possibly allowing access to sensitive credential information.
Note that this vulnerability only affects a server if it is configured as a domain controller.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-071
Solution
Microsoft has released a set of patches for Windows 2003, 2008, 2008 R2, 2012, and 2012 R2.
Risk Factor
Low
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 75633
CVE CVE-2015-2374
MSKB 3068457
XREF MSFT:MS15-071
XREF IAVA:2015-A-0173
192.168.100.4 78
Plugin Information
Plugin Output
tcp/445
KB : 3068457
- C:\Windows\system32\netlogon.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17901
92023 - MS16-092: Security Update for Windows Kernel (3171910)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :
- A security feature bypass vulnerability exists in the Windows kernel due to improper validation of how a
low integrity application can use certain object manager features. An attacker can exploit this issue to take
advantage of time-of-check time-of-use (TOCTOU) issues in file path-based checks from a low integrity
application, allowing the attacker to modify files outside of a low integrity level application.
(CVE-2016-3258)
- An information disclosure vulnerability exists in the Windows kernel due to a failure to properly handle
certain page fault system calls. A local attacker can exploit this, via a specially crafted application, to disclose
information from one process to another.
(CVE-2016-3272)
See Also
http://www.nessus.org/u?aa343793
Solution
Microsoft has released a set of patches for Windows 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
Low
2.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)
2.5 (CVSS:3.0/E:U/RL:O/RC:C)
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 91603
BID 91606
CVE CVE-2016-3258
CVE CVE-2016-3272
MSKB 3170377
MSKB 3169704
MSKB 3163912
MSKB 3172985
XREF MSFT:MS16-092
XREF IAVA:2016-A-0178
Plugin Information
Plugin Output
tcp/445
KB : 3170377
- C:\Windows\system32\ntoskrnl.exe has not been patched.
Remote version : 6.3.9600.16452
Should be : 6.3.9600.18378
94013 - MS16-124: Security Update for Windows Registry (3193227)
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by multiple information
disclosure vulnerabilities in the kernel API that allow a local attacker, via a specially crafted application, to
disclose sensitive registry information.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-124
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.
Risk Factor
Low
3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
3.0 (CVSS:3.0/E:P/RL:O/RC:C)
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 93354
BID 93355
BID 93356
BID 93357
CVE CVE-2016-0070
CVE CVE-2016-0073
CVE CVE-2016-0075
CVE CVE-2016-0079
MSKB 3185330
MSKB 3185331
MSKB 3185332
MSKB 3191256
MSKB 3192391
MSKB 3192392
MSKB 3192393
MSKB 3192440
MSKB 3192441
MSKB 3194798
XREF MSFT:MS16-124
XREF IAVA:2016-A-0282
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update. It is, therefore, affected by an information disclosure
vulnerability in the Windows Common Log File System (CLFS) due to improper handling of objects in memory.
A local attacker can exploit this vulnerability, via a specially crafted application, to bypass security measures and
disclose sensitive information.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-153
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10,
and 2016.
Risk Factor
Low
5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
4.8 (CVSS:3.0/E:U/RL:O/RC:C)
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.6 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
II
References
BID 94787
CVE CVE-2016-7295
MSKB 3203838
MSKB 3205400
MSKB 3205401
MSKB 3205408
MSKB 3205409
MSKB 3205394
MSKB 3207752
MSKB 3205383
MSKB 3206632
MSKB 3205386
XREF MSFT:MS16-153
XREF IAVA:2016-A-0351
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small
biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-
GCM suites subject to browser and web server support.
Risk Factor
Low
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
2.2 (CVSS2#E:U/RL:ND/RC:C)
References
BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808
Plugin Information
Plugin Output
tcp/636
192.168.100.4 790
65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Synopsis
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small
biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-
GCM suites subject to browser and web server support.
Risk Factor
Low
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
2.2 (CVSS2#E:U/RL:ND/RC:C)
192.168.100.4 79
References
BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808
Plugin Information
Plugin Output
tcp/3269
Synopsis
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small
biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-
GCM suites subject to browser and web server support.
Risk Factor
Low
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
2.2 (CVSS2#E:U/RL:ND/RC:C)
References
BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808
Plugin Information
Plugin Output
tcp/3389
Synopsis
Nessus was able to gather application compatibility settings on the remote host.
Description
Nessus was able to generate a report on the application compatibility cache on the remote Windows host.
See Also
https://dl.mandiant.com/EE/library/Whitepaper_ShimCacheParser.pdf
http://www.nessus.org/u?4a076105
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Nessus was able to log in to the remote host using the provided credentials. No issues were reported with
access, privilege, or intermittent failure.
Description
Nessus was able to execute credentialed checks because it was possible to log in to the remote host using
provided credentials, no access or privilege issues were reported, and no subsequent failures were reported for
the successful credentials.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
s able to log in to the following host as Administrador with no privilege or access problems reported:
Synopsis
Description
It is possible to get information about the BIOS via the host's WMI interface.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Vendor Version : HP
: J01
Release date : 20110421000000.000000+000
UUID: 32393436-3535-4D32-3232-313830315533
Secure boot : disabled
10761 - COM+ Internet Services (CIS) Server Detection
Synopsis
Description
COM+ Internet Services are RPC over HTTP tunneling and require IIS to operate. CIS ports shouldn't be visible
on internet but only behind a firewall.
See Also
http://www.nessus.org/u?d02f7e6e
https://support.microsoft.com/en-us/support/kb/articles/q282/2/61.asp
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/49157
Server banner :
ncacn_http/1.0
96533 - Chrome Browser Extension Enumeration
Synopsis
One or more Chrome browser extensions are installed on the remote host.
Description
Nessus was able to enumerate Chrome browser extensions installed on the remote host.
See Also
https://chrome.google.com/webstore/category/extensions
Solution
Make sure that the use and configuration of these extensions comply with your organization's acceptable use
and security policies.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
User : Administrador
|- Browser : Chrome
|- Add-on information :
Name : Slides
Description : Create and edit presentations Version: 0.10
Update Date : Dec. 27, 2017 at 13:59:35 GMT
Name : Docs
Description : Create and edit documents Version: 0.10
Update Date : Dec. 27, 2017 at 13:59:37 GMT
Name : Sheets
Description : Create and edit spreadsheets Version: 1.2
Update Date : Dec. 27, 2017 at 13:59:37 GMT
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration)
matches for various hardware and software products found on a host.
Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on
the information available from the scan.
See Also
http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/04/21
Plugin Output
tcp/0
cpe:/o:microsoft:windows_server_2012:r2:gold
cpe:/a:google:chrome:76.0.3809.132
cpe:/a:microsoft:.net_framework:4.5.1 -> Microsoft .NET Framework 4.5.1
cpe:/a:microsoft:ie:11.0.9600.16438
cpe:/a:microsoft:iis:8.5
cpe:/a:microsoft:remote_desktop_connection:6.3.9600.16384
cpe:/a:oracle:jre:1.6.0:update45
cpe:/a:oracle:jre:1.6.0_45
cpe:/a:oracle:vm_virtualbox:5.0.4.102546
cpe:/a:rarlab:winrar:5.11.0.0
cpe:/a:simon_tatham:putty:0.70
cpe:/a:teamviewer:teamviewer:14.5.5819
cpe:/a:wireshark:wireshark:2.2.5 -> Wireshark 2.2.5
x-cpe:/a:microsoft:dhcp_server:6.3.9600.16384
24270 - Computer Manufacturer Information (WMI)
Synopsis
Description
By making certain WMI queries, it is possible to obtain the model of the remote computer as well as the name of
its manufacturer and its serial number.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Computer Manufacturer : HP
Computer Model : ProLiant ML110 G7
Computer SerialNumber : 2M221801U3
Computer Type : Tower
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/135
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49152
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49153
192.168.100.4 810
10736 - DCE Services Enumeration
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49154
192.168.100.4 81
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.100.4
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49155
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49158
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49159
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49192
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55289
192.168.100.4 820
10736 - DCE Services Enumeration
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55292
192.168.100.4 82
10736 - DCE Services Enumeration
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55304
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55402
Synopsis
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is
possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/64933
Synopsis
Description
See Also
http://www.nessus.org/u?5a5ed447
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.
See Also
https://en.wikipedia.org/wiki/Domain_Name_System
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information
Plugin Output
tcp/53
11002 - DNS Server Detection
Synopsis
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.
See Also
https://en.wikipedia.org/wiki/Domain_Name_System
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information
Plugin Output
udp/53
55472 - Device Hostname
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Hostname : SERVIDORDOMINIO
SERVIDORDOMINIO (WMI)
54615 - Device Type
Synopsis
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer,
router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Nessus was able to connect to a host via SMB to retrieve a list of local Groups and their Members.
Description
Nessus was able to connect to a host via SMB to retrieve a list of local Groups and their Members.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.4 830
SID : S-1-5-11
Name : Usuarios del dominio
Domain : CLINICAISV
Class : Win32_Group
SID : S-1-5-21-1586170146-605884322-2766078902-513
192.168.100.4 83
35716 - Ethernet Card Manufacturer Detection
Synopsis
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.
See Also
https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios)
and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and
uniform list.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Nessus was able to gather a list of items searched for in the Windows UI.
Description
Nessus was able to gather evidence of cached search results from Windows Explorer searches.
See Also
https://www.4n6k.com/2015/05/forensics-quickie-ntuserdat-analysis.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
Google Chrome, a web browser from Google, is installed on the remote Windows host.
See Also
https://www.google.com/chrome/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Note that Nessus only looked in the registry for evidence of Google
Chrome. If there are multiple users on this host + you may wish to
enable the 'Perform thorough tests' setting and re-scan. This will
cause Nessus to scan each local user's directory for installs.
43111 - HTTP Methods Allowed (per directory)
Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.
Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response.
If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests
for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind
submission of any privileged GET request.
As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications
tests' is set to 'yes'
in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it
receives a response code of 400, 403, 405, or 501.
Note that the plugin output is only informational and does not necessarily indicate the presence of any security
vulnerabilities.
See Also
http://www.nessus.org/u?d9c03a9a
http://www.nessus.org/u?b019cbdb
https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
/
10107 - HTTP Server Type and Version
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
Microsoft-IIS/8.5
10107 - HTTP Server Type and Version
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5985
Microsoft-HTTPAPI/2.0
10107 - HTTP Server Type and Version
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/47001
Microsoft-HTTPAPI/2.0
192.168.100.4 840
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive
and HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
Content-Type: text/html
Last-Modified: Tue, 13 Oct 2015 21:39:57 GMT
Accept-Ranges: bytes
ETag: "a7cb5cb4ff5d11:0"
Server: Microsoft-IIS/8.5
Date: Mon, 09 Sep 2019 14:54:25 GMT
Content-Length: 701
Response Body :
192.168.100.4 84
color:#000000;
background-color:#0072C6;
margin:0;
}
#container
{ margin-
left:auto; margin-
right:auto; text-
align:center;
}
a img
{ border:non
e;
}
-->
</style>
</head>
<body>
<div id="container">
<a href="http://go.microsoft.com/fwlink/?linkid=66138&clcid=0x409"><img src="iis-85.png"
alt="IIS" width="960" height="600" /></a>
</div>
</body>
</html>
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive
and HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5985
Response Body :
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive
and HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/47001
Response Body :
10114 - ICMP Timestamp Request Remote Date Disclosure
Synopsis
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is
set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but
usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
References
CVE CVE-1999-0524
XREF CWE:200
Plugin Information
Plugin Output
icmp/0
Synopsis
Nessus was able to enumerate URLs that were manually typed into the Internet Explorer address bar.
Description
Nessus was able to generate a list URLs that were manually typed into the Internet Explorer address bar.
See Also
https://crucialsecurityblog.harris.com/2011/03/14/typedurls-part-1/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://go.microsoft.com/fwlink/p/?LinkId=255141
https://192.168.1.1/
http://192.168.1.11/tools_firmw.html
http://192.168.1.11/
http://192.168.1.213/
http://google.com/
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://192.168.1.11/st_log.html
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://go.microsoft.com/fwlink/p/?LinkId=255141
http://go.microsoft.com/fwlink/p/?LinkId=255141
Synopsis
Description
Nessus was able to retrieve the realm name and/or server time of the remote Kerberos server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/88
Synopsis
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the
remote LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/389
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-currentTime:
| 20190909145459.0Z
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-dsServiceName:
| CN=NTDS Settings,CN=SERVIDORDOMINIO,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-defaultNamingContext:
| DC=CLINICAISV,DC=CL
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-configurationNamingContext:
| CN=Configuration,DC=CLINICAISV,DC=CL
[+]-rootDomainNamingContext:
| DC=CLINICAISV,DC=CL
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4 [...]
25701 - LDAP Crafted Search Request Server Information Disclosure
Synopsis
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the
remote LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-currentTime:
| 20190909145459.0Z
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-dsServiceName:
| CN=NTDS Settings,CN=SERVIDORDOMINIO,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-defaultNamingContext:
| DC=CLINICAISV,DC=CL
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-configurationNamingContext:
| CN=Configuration,DC=CLINICAISV,DC=CL
[+]-rootDomainNamingContext:
| DC=CLINICAISV,DC=CL
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
192.168.100.4 850
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4 [...]
192.168.100.4 85
25701 - LDAP Crafted Search Request Server Information Disclosure
Synopsis
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the
remote LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3268
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-currentTime:
| 20190909145459.0Z
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-dsServiceName:
| CN=NTDS Settings,CN=SERVIDORDOMINIO,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-defaultNamingContext:
| DC=CLINICAISV,DC=CL
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-configurationNamingContext:
| CN=Configuration,DC=CLINICAISV,DC=CL
[+]-rootDomainNamingContext:
| DC=CLINICAISV,DC=CL
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4 [...]
25701 - LDAP Crafted Search Request Server Information Disclosure
Synopsis
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the
remote LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-currentTime:
| 20190909145459.0Z
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-dsServiceName:
| CN=NTDS Settings,CN=SERVIDORDOMINIO,CN=Servers,CN=Default-First-Site-
Name,CN=Sites,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-namingContexts:
| DC=CLINICAISV,DC=CL
| CN=Configuration,DC=CLINICAISV,DC=CL
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
| DC=DomainDnsZones,DC=CLINICAISV,DC=CL
| DC=ForestDnsZones,DC=CLINICAISV,DC=CL
[+]-defaultNamingContext:
| DC=CLINICAISV,DC=CL
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=CLINICAISV,DC=CL
[+]-configurationNamingContext:
| CN=Configuration,DC=CLINICAISV,DC=CL
[+]-rootDomainNamingContext:
| DC=CLINICAISV,DC=CL
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4 [...]
20870 - LDAP Server Detection
Synopsis
Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for
providing access to directory services over TCP/IP.
See Also
https://en.wikipedia.org/wiki/LDAP
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/389
20870 - LDAP Server Detection
Synopsis
Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for
providing access to directory services over TCP/IP.
See Also
https://en.wikipedia.org/wiki/LDAP
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
20870 - LDAP Server Detection
Synopsis
Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for
providing access to directory services over TCP/IP.
See Also
https://en.wikipedia.org/wiki/LDAP
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3268
20870 - LDAP Server Detection
Synopsis
Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for
providing access to directory services over TCP/IP.
See Also
https://en.wikipedia.org/wiki/LDAP
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
117887 - Local Checks Enabled
Synopsis
Nessus was able to log in to the remote host using the provided credentials and enable local checks.
Description
Nessus was able to enable local checks because it was possible to log in to the remote host using provided
credentials, the remote host was identified as an operating system or device for which local checks are available,
and the necessary information was able to be obtained from the remote host in order to enable local checks.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Account : CLINICAISV.CL\Administrador
Protocol : SMB
192.168.100.4 860
73990 - MS KB2871997: Update to Improve Credentials Protection and Management
Synopsis
The remote Windows host is missing an update to improve credentials protection and management.
Description
The remote host is missing one or more of the following Microsoft updates: KB2871997, KB2973351,
KB2975625, KB2982378, KB2984972, KB2984976, KB2984981, KB2973501, or KB3126593. These updates
are needed to improve the protection against possible credential theft.
These updates provide additional protection for the Local Security Authority (LSA), add a restricted
administrative mode for Credential Security Support Provider (CredSSP), introduce support for the protected
account-restricted domain user category, enforce stricter authentication policies, add additional protection for
users'
credentials, and add a restricted administrative mode for Remote Desktop Connection and Remote Desktop
Protocol.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/2871997
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk Factor
None
STIG Severity
II
References
MSKB 2871997
XREF IAVA:2016-A-0327
192.168.100.4 86
Plugin Information
Plugin Output
tcp/445
KB : 2975625
- C:\Windows\system32\lsasrv.dll has not been patched.
Remote version : 6.3.9600.16473
Should be : 6.3.9600.16670
KB : 3126593
- C:\Windows\system32\ntdll.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.18202
KB : 3126593
- C:\Windows\system32\ntdll.dll has not been patched.
Remote version : 6.3.9600.16502
Should be : 6.3.9600.18194
KB : 3126593
- C:\Windows\system32\kernelbase.dll has not been patched.
Remote version : 6.3.9600.16656
Should be : 6.3.9600.18264
Missing KBs :
2975625
83359 - MS KB3042058: Update to Default Cipher Suite Priority Order
Synopsis
Description
The remote Windows host is missing an update to the cryptographic cipher suite prioritization. The update adds
additional cipher suites and improves cipher suite priority ordering.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2015/3042058
Solution
Microsoft has released a set of patches for Windows 7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Note that Microsoft has only made this update available via the Microsoft Download Center. It will be available
via Microsoft Update and WSUS in Q4 of 2015.
Risk Factor
None
References
MSKB 3042058
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host is missing a security update that improves the authentication used by the Public Key
Cryptography User-to-User (PKU2U) security support provider (SSP).
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2015/3045755
Solution
Microsoft has released a set of updates for Windows 8.1, RT 8.1, and 2012 R2.
Risk Factor
None
References
MSKB 3045755
Plugin Information
Plugin Output
tcp/445
KB : 3045755
- C:\Windows\system32\Pku2u.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.17728
85880 - MS KB3083992: Update to Improve AppLocker Publisher Rule Enforcement
Synopsis
The remote Windows host is missing a security update that prevents a potential rules bypass.
Description
The remote Windows host is missing KB3083992, a defense-in-depth update that improves the enforcement of
publisher rules by Windows AppLocker. Specifically, the update corrects how AppLocker handles certificates to
prevent bypassing publisher rules.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2015/3083992
https://support.microsoft.com/en-us/help/3083992/microsoft-security-advisory-update-to-improve-applocker-
certificate-ha
Solution
Risk Factor
None
STIG Severity
II
References
MSKB 3083992
XREF IAVA:2015-A-0217
Plugin Information
Plugin Output
tcp/445
KB : 3083992
- C:\Windows\system32\Appidsvc.dll has not been patched.
Remote version : 6.3.9600.16384
Should be : 6.3.9600.18002
87876 - MS KB3109853: Update to Improve TLS Session Resumption Interoperability
Synopsis
The remote Windows host is missing an update to the TLS implementation in SChannel.
Description
The remote Windows host is missing an update to the Transport Layer Security (TLS) protocol implementation
in SChannel. The update improves the interoperability between Schannel-based TLS clients and 3rd-party
TLS servers that enable RFC5077-based resumption and that send the NewSessionTicket message in the
abbreviated TLS handshake.
This update also addresses an issue in schannel.dll that could cause an RFC5077 session ticket-based
resumption to fail, subsequently causing WinInet-based clients to perform a fallback to a lower TLS protocol
version than what would have been otherwise negotiated.
See Also
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/3109853
Solution
Microsoft has released a set of patches for Windows 8, RT, 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
None
References
MSKB 3109853
Plugin Information
Plugin Output
tcp/445
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to query the MUIcache registry key to find evidence of program execution.
See Also
https://forensicartifacts.com/2010/08/registry-muicache/
http://windowsir.blogspot.com/2005/12/mystery-of-muicachesolved.html
http://www.nirsoft.net/utils/muicache_view.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
Microsoft .NET Framework, a software framework for Microsoft Windows operating systems, is installed on the
remote host.
See Also
https://www.microsoft.com/net
http://www.nessus.org/u?15ae6806
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 870
72879 - Microsoft Internet Explorer Enhanced Security Configuration Detection
Synopsis
Description
Nessus detects if the remote Windows host supports IE Enhanced Security Configuration (ESC) and if IE ESC
features are enabled or disabled.
See Also
http://www.nessus.org/u?a9c4c131
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 87
72367 - Microsoft Internet Explorer Version Detection
Synopsis
Description
The remote Windows host contains Internet Explorer, a web browser created by Microsoft.
See Also
https://support.microsoft.com/en-us/help/17621/internet-explorer-downloads
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Version : 11.0.9600.16438
66424 - Microsoft Malicious Software Removal Tool Installed
Synopsis
Description
The Microsoft Malicious Software Removal Tool is installed on the remote host. This tool is an application that
attempts to detect and remove known malware from Windows systems.
See Also
https://www.microsoft.com/en-us/security/pc-security/malware-removal.aspx
https://support.microsoft.com/en-us/help/891716/deploy-windows-malicious-software-removal-tool-in-an-
enterprise-enviro
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Nessus was able to enumerate files opened in Microsoft Paint on the remote host.
Description
Nessus was able to generate a list of files opened using the Microsoft Paint program.
See Also
https://en.wikipedia.org/wiki/Microsoft_Paint
http://www.nessus.org/u?0887d2d5
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
S-1-5-21-1586170146-605884322-2766078902-1114
- C:\Fondos Escritorio\Wallpaper ClinicaISV.jpg
CLINICAISV.CL\Administrador
- C:\Users\Administrador\Pictures\Suspencion de Equipos.png
- C:\Users\Administrador\Pictures\Usuario Comun.png
- D:\Wallpaper\Oregon.jpg
- C:\Fondo Escritorio\WallpaperISV.jpg
- C:\Users\Administrador\Pictures\Usuario Admin.png
- C:\Windows\Web\Wallpaper\Windows\img0.jpg
- C:\inetpub\wwwroot\iis-85.png
- D:\Wallpaper\Fondo.jpg
- D:\Wallpaper\ISV.jpg
CLINICAISV.CL\rmedina
- D:\Wallpaper\Fondo.jpg
- D:\Wallpaper\ISV.jpg
57033 - Microsoft Patch Bulletin Feasibility Check
Synopsis
Description
Using credentials supplied in the scan policy, Nessus is able to collect information about the software and
patches installed on the remote Windows host and will use that information to check for missing Microsoft
security updates.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
Microsoft Remote Desktop Connection (also known as Remote Desktop Protocol or Terminal Services Client) is
installed on the remote Windows host.
See Also
http://www.nessus.org/u?1c33f0e7
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Path : C:\Windows\\System32\\mstsc.exe
Version : 6.3.9600.16384
10902 - Microsoft Windows 'Administrators' Group User List
Synopsis
Description
Using the supplied credentials, it is possible to extract the member list of the 'Administrators' group. Members of
this group have complete access to the remote system.
Solution
Verify that each member of the group should have this type of access.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
- CLINICAISV\Administrador (User)
- CLINICAISV\Administradores de empresas (Group)
- CLINICAISV\Admins. del dominio (Group)
- CLINICAISV\presentaciones (User)
92371 - Microsoft Windows DNS Cache
Synopsis
Nessus was able to collect and report DNS cache information from the remote host.
Description
Nessus was able to collect details of the DNS cache from the remote Windows host and generate a report as a
CSV attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
3855458e-b67a-417c-bea5-5cad1ae3463f._msdcs.clinicaisv.cl
62de932f-994f-4df5-9c58-2c199e7caaa3._msdcs.clinicaisv.cl
nas
Synopsis
Nessus was able to collect and report environment variables from the remote host.
Description
Nessus was able to collect system and active account environment variables on the remote Windows host and
generate a report as a CSV attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Nessus was able to collect the hosts file from the remote host.
Description
Nessus was able to collect the hosts file from the remote Windows host and report it as attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
MD5: 3688374325b992def12793500307566d
SHA-1: 4bed0823746a2a8577ab08ac8711b79770e48274
192.168.100.4 880
20811 - Microsoft Windows Installed Software Enumeration (credentialed check)
Synopsis
Description
This plugin lists software potentially installed on the remote host by crawling the registry entries in :
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall HKLM\SOFTWARE\Microsoft\Updates
Note that these entries do not necessarily mean the applications are actually installed on the remote host - they
may have been left behind by uninstallers, or the associated files may have been manually removed.
Solution
Remove any applications that are not compliant with your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 88
Microsoft ODBC Driver 11 for SQL Server [version 11.0.2270.0] [installed on 2015/10/27]
M.dulo URL Rewrite 2 de IIS [version 7.2.2] [installed on 2015/10/27]
Oracle VM VirtualBox 5.0.4 [version 5.0.4] [installed on 2015/09/17]
92366 - Microsoft Windows Last Boot Time
Synopsis
Nessus was able to collect the remote host's last boot time in a human readable format.
Description
Nessus was able to collect and report the remote host's last boot time as an ISO 8601 timestamp.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
It is possible to get a list of mounted devices that may have been connected to the remote system in the past.
Description
By connecting to the remote host with the supplied credentials, this plugin enumerates mounted devices that
have been connected to the remote host in the past.
See Also
http://www.nessus.org/u?99fcc329
Solution
Make sure that the mounted drives agree with your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Name : \??\volume{db841e81-30af-11e5-80b7-e83935e9a75d}
Data : _??
_USBSTOR#Disk&Ven_TOSHIBA&Prod_TransMemory&Rev_1.00#97FF92676B46CD70A984EA91&0#{53f56307-
b6bf-11d0-94f2-00a0c91efb8b}
Raw data :
5f003f003f005f00550053004200530054004f00520023004400690073006b002600560065006e005f0054004f00530048004900420041002
Name : \??\volume{df6a3a7c-30bc-11e5-80b3-806e6f6e6963}
Data : j
Raw data : 021106000000106a18000000
Name : \dosdevices\e:
Data : \??\IDE#CdRomhp_DVD-ROM_TS-
H353C JG02 #5&3994cdf4&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Raw data :
5c003f003f005c0049004400450023004300640052006f006d00680070005f004400560044002d0052004f004d005f00540053002d0048003
Name : \??\volume{df6a3a7b-30bc-11e5-80b3-806e6f6e6963}
Data :
Raw data : 021106000000f01500000000
Name : \??\volume{df6a3a7a-30bc-11e5-80b3-806e6f6e6963}
Data :
Raw data : 021106000000100000000000
Synopsis
Description
The remote host listens on tcp port 445 and replies to SMB requests.
By sending an NTLMSSP authentication request it is possible to obtain the name of the remote system and the
name of its domain.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Nessus was able to collect and report NBT information from the remote host.
Description
Nessus was able to collect details for NetBIOS over TCP/IP from the remote Windows host and generate a
report as a CSV attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
Using the supplied credentials, this plugin enumerates and reports the installed network adapters on the remote
Windows host.
Solution
Make sure that all of the installed network adapters agrees with your organization's acceptable use and security
policies.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Nessus was able to collect and report the PowerShell execution policy for the remote host.
Description
Nessus was able to collect and report the PowerShell execution policy for the remote Windows host.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell\ExecutionPolicy : RemoteSigned
HKLM\SOFTWARE\Wow6432Node\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell\ExecutionPolicy :
RemoteSigned
70329 - Microsoft Windows Process Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to confirm
that your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Process Overview :
SID: Process (PID)
0 : System Idle Process (0)
2 : explorer.exe (1420)
2 : |- ClassicStartMenu.exe (4036)
1 : explorer.exe (2564)
1 : |- ClassicStartMenu.exe (2144)
1 : |- mmc.exe (4616)
1 : |- powershell.exe (4888)
1 : |- conhost.exe (1296)
1 : |- ServerManager.exe (6352)
1 : |- dsac.exe (6668)
0 : csrss.exe (368)
1 : jusched.exe (3844)
1 : |- jucheck.exe (3876)
0 : System (4)
2 : jusched.exe (4004)
2 : |- jucheck.exe (5836)
4 : csrss.exe (4152)
2 : ServerManager.exe (4268)
2 : |- mmc.exe (2560)
1 : csrss.exe (432)
0 : wininit.exe (440)
0 : |- services.exe (536)
0 : |- svchost.exe (1000)
0 : |- svchost.exe (1008)
0 : |- dfssvc.exe (1168)
0 : |- spoolsv.exe (1364)
192.168.100.4 890
0 : |- Microsoft.ActiveDirectory.WebServices.exe (1388)
0 : |- svchost.exe (1424)
0 : |- certsrv.exe (1440)
0 : |- dfsrs.exe (1504)
0 : |- svchost.exe (1552)
0 : |- dns.exe (1568)
0 : |- DWRCS.EXE (1588)
1 : |- DWRCST.EXE (568)
0 : |- ismserv.exe (1656)
0 : |- msdtc.exe (1796)
0 : |- svchost.exe (2032)
0 : |- w3wp.exe (2832)
0 : |- vds.exe (3288)
0 : |- svchost.exe (3304)
2 : |- rdpclip.exe (4636)
2 : |- rdpinput.exe (5008)
1 : |- rdpclip.exe (5516)
1 : |- rdpinput.exe (6728)
0 : |- svchost.exe (3324)
0 : |- svchost.exe (3344)
0 : |- TeamViewer_Service.exe (6368)
2 : |- TeamViewer.exe (2172)
1 : |- TeamViewer.exe (4540)
2 : |- tv_x64.exe (4576)
1 : |- tv_x64.exe (4748)
2 : |- tv_w32.exe (6656)
1 : |- tv_w32.exe (7140)
0 : |- svchost.exe (700)
0 : |- WmiPrvSE.exe (2580)
2 : |- dllhost.exe (2992)
0 : |- WmiPrvSE.exe (3624)
1 : |- dllhost.exe (3888)
0 : |- iashost.exe (3992)
0 : |- WmiPrvSE.exe (5880)
0 : |- svchost.exe (740)
0 : |- svchost.exe (864)
0 : |- svchost.exe (888)
1 : |- taskhostex.exe (2392)
2 : |- tas [...]
192.168.100.4 89
70331 - Microsoft Windows Process Module Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to that
confirm your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/53
This process 'dns.exe' (pid 1568) is hosting the following Windows services :
DNS (@%systemroot%\system32\dns.exe,-49157)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/53
This process 'dns.exe' (pid 1568) is hosting the following Windows services :
DNS (@%systemroot%\system32\dns.exe,-49157)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/67
This process 'svchost.exe' (pid 1552) is hosting the following Windows services :
DHCPServer (@%SystemRoot%\system32\dhcpssvc.dll,-200)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/68
This process 'svchost.exe' (pid 1552) is hosting the following Windows services :
DHCPServer (@%SystemRoot%\system32\dhcpssvc.dll,-200)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/88
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/88
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/123
This process 'svchost.exe' (pid 940) is hosting the following Windows services :
EventSystem (@comres.dll,-2450)
FontCache (@%systemroot%\system32\FntCache.dll,-100)
netprofm (@%SystemRoot%\system32\netprofmsvc.dll,-202)
nsi (@%SystemRoot%\system32\nsisvc.dll,-200)
W32Time (@%SystemRoot%\system32\w32time.dll,-200)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/135
This process 'svchost.exe' (pid 740) is hosting the following Windows services :
RpcEptMapper (@%windir%\system32\RpcEpMap.dll,-1001)
RpcSs (@combase.dll,-5010)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/389
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/389
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/464
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/464
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/500
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/593
This process 'svchost.exe' (pid 740) is hosting the following Windows services :
RpcEptMapper (@%windir%\system32\RpcEpMap.dll,-1001)
RpcSs (@combase.dll,-5010)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1645
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
192.168.100.4 910
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1646
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
192.168.100.4 91
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1812
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1813
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/2535
This process 'svchost.exe' (pid 1552) is hosting the following Windows services :
DHCPServer (@%SystemRoot%\system32\dhcpssvc.dll,-200)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3268
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
This process 'svchost.exe' (pid 3304) is hosting the following Windows services :
TermService (@%SystemRoot%\System32\termsrv.dll,-268)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/3389
This process 'svchost.exe' (pid 3304) is hosting the following Windows services :
TermService (@%SystemRoot%\System32\termsrv.dll,-268)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/4500
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/5353
This process 'TeamViewer_Service.exe' (pid 6368) is hosting the following Windows services :
TeamViewer (TeamViewer 14)
192.168.100.4 920
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/5355
This process 'svchost.exe' (pid 1008) is hosting the following Windows services :
CryptSvc (@%SystemRoot%\system32\cryptsvc.dll,-1001)
Dnscache (@%SystemRoot%\System32\dnsapi.dll,-101)
LanmanWorkstation (@%systemroot%\system32\wkssvc.dll,-100)
NlaSvc (@%SystemRoot%\System32\nlasvc.dll,-1)
WinRM (@%Systemroot%\system32\wsmsvc.dll,-101)
192.168.100.4 92
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5985
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/6129
This process 'DWRCS.EXE' (pid 1588) is hosting the following Windows services :
dwmrcs (DameWare Mini Remote Control)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/6129
This process 'DWRCS.EXE' (pid 1588) is hosting the following Windows services :
dwmrcs (DameWare Mini Remote Control)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/9389
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/47001
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49152
This process 'wininit.exe' (pid 440) is hosting the following Windows services :
N/D
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49153
This process 'svchost.exe' (pid 864) is hosting the following Windows services :
Dhcp (@%SystemRoot%\system32\dhcpcore.dll,-100)
EventLog (@%SystemRoot%\system32\wevtsvc.dll,-200)
lmhosts (@%SystemRoot%\system32\lmhsvc.dll,-101)
Wcmsvc (@%SystemRoot%\System32\wcmsvc.dll,-4097)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49154
This process 'svchost.exe' (pid 888) is hosting the following Windows services :
Appinfo (@%systemroot%\system32\appinfo.dll,-100)
BITS (@%SystemRoot%\system32\qmgr.dll,-1000)
CertPropSvc (@%SystemRoot%\System32\certprop.dll,-11)
gpsvc (@gpapi.dll,-112)
IAS (@%SystemRoot%\system32\ias.dll,-1000)
IKEEXT (@%SystemRoot%\system32\ikeext.dll,-501)
iphlpsvc (@%SystemRoot%\system32\iphlpsvc.dll,-500)
LanmanServer (@%systemroot%\system32\srvsvc.dll,-100)
ProfSvc (@%systemroot%\system32\profsvc.dll,-300)
Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
SENS (@%SystemRoot%\system32\Sens.dll,-200)
SessionEnv (@%SystemRoot%\System32\SessEnv.dll,-1026)
ShellHWDetection (@%SystemRoot%\System32\shsvcs.dll,-12288)
Themes (@%SystemRoot%\System32\themeservice.dll,-8192)
Winmgmt (@%Systemroot%\system32\wbem\wmisvc.dll,-205)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49155
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
192.168.100.4 930
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49157
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
192.168.100.4 93
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49158
This process 'lsass.exe' (pid 544) is hosting the following Windows services :
Kdc (@%SystemRoot%\System32\kdcsvc.dll,-1)
KeyIso (@keyiso.dll,-100)
Netlogon (@%SystemRoot%\System32\netlogon.dll,-102)
NTDS (@%SystemRoot%\System32\ntdsmsg.dll,-1)
SamSs (@%SystemRoot%\system32\samsrv.dll,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49159
This process 'spoolsv.exe' (pid 1364) is hosting the following Windows services :
Spooler (@%systemroot%\system32\spoolsv.exe,-1)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55289
This process 'svchost.exe' (pid 3344) is hosting the following Windows services :
PolicyAgent (@%SystemRoot%\System32\polstore.dll,-5010)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55292
This process 'certsrv.exe' (pid 1440) is hosting the following Windows services :
CertSvc (@%systemroot%\system32\certocm.dll,-347)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55304
This process 'dfsrs.exe' (pid 1504) is hosting the following Windows services :
DFSR (@dfsrress.dll,-101)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55402
This process 'services.exe' (pid 536) is hosting the following Windows services :
N/D
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/60595
This process 'TeamViewer_Service.exe' (pid 6368) is hosting the following Windows services :
TeamViewer (TeamViewer 14)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/64933
This process 'svchost.exe' (pid 1552) is hosting the following Windows services :
DHCPServer (@%SystemRoot%\system32\dhcpssvc.dll,-200)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/65291
This process 'javaw.exe' (pid 6484) is hosting the following Windows services :
N/D
192.168.100.4 940
126527 - Microsoft Windows SAM user enumeration
Synopsis
Nessus was able to enumerate domain users from the local SAM.
Description
Using the domain security identifier (SID), Nessus was able to enumerate the domain users on the remote
Windows system using the Security Accounts Manager.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.4 94
- cramos (id 1165, Carrie Ramos)
- crivas (id 1512, Cynthia Rivas)
- crobles (id 1189, Cynthia Robles)
- cromero (id 1120, Claudio Romero)
- csoto (id 1518, Carlos Soto)
- cumana (id 1122, Claudia Umana)
- cvenezian.isv (id 1240, Claudia Venezian)
- daros (id 1532, Daniela Aros)
- dbarrera (id 1146, Dayan Barrera)
- despinoza (id 1140, Danilo Espinoza)
- dleighton (id 1323, Daniela Leighton Contreras)
- ealvarez.isv (id 1206, Eugenio Alvarez)
- ehettich.isv (id 1219, Eliana Hettich)
- ekeller.isv (id 1222, Eva Keller)
- esterilizacion (id 1276, Esterilizacion ClinicaISV)
- fborja.isv (id 1208, Fernando Borja)
- fcofre (id 1118, Fernando Cofre)
- fflores (id 1126, Francisco Flores)
- fguerra (id 1451, Fernanda S. Guerra Elgueta)
- fortega (id 1128, Alvaro Orellana)
- freyes (id 1 [...]
17651 - Microsoft Windows SMB : Obtains the Password Policy
Synopsis
It is possible to retrieve the remote host's password policy using the supplied credentials.
Description
Using the supplied credentials it was possible to extract the password policy for the remote Windows host. The
password policy must conform to the Informational System Policy.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Nessus was able to identify the last logged on user on the remote host.
Description
By connecting to the remote host with the supplied credentials, Nessus was able to identify the username
associated with the last successful logon.
Microsoft documentation notes that interactive console logons change the DefaultUserName registry entry to be
the last logged-on user.
See Also
http://www.nessus.org/u?a29751b5
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It
was possible to log into it using one of the following accounts :
- NULL session
- Guest account
- Supplied credentials
See Also
https://support.microsoft.com/en-us/help/143474/restricting-information-available-to-anonymous-logon-users
https://support.microsoft.com/en-us/help/246261
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
By emulating the call to LsaQueryInformationPolicy(), it was possible to obtain the host SID (Security Identifier).
The host SID can then be used to get the list of local users.
See Also
http://technet.microsoft.com/en-us/library/bb418944.aspx
Solution
You can prevent anonymous lookups of the host SID by setting the 'RestrictAnonymous' registry setting to an
appropriate value.
Risk Factor
None
References
BID 959
CVE CVE-2000-1200
Plugin Information
Plugin Output
tcp/445
1-5-21-1586170146-605884322-2766078902
Synopsis
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending
an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
It was possible to determine the processor architecture, build lab strings, and Windows OS version installed on
the remote system.
Description
Nessus was able to determine the processor architecture, build lab strings, and the Windows OS version
installed on the remote system by connecting to the remote registry with the supplied credentials.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote host seems to be a Primary Domain Controller or a Backup Domain Controller.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
11457 - Microsoft Windows SMB Registry : Winlogon Cached Password Weakness
Synopsis
Description
Cached logon credentials could be accessed by an attacker and subjected to brute force attacks.
See Also
http://www.nessus.org/u?184d3eab
http://www.nessus.org/u?fe16cea8
https://technet.microsoft.com/en-us/library/cc957390.aspx
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 950
10400 - Microsoft Windows SMB Registry Remotely Accessible
Synopsis
Description
It was possible to access the remote Windows Registry using the login / password combination used for the
Windows local checks (SMB tests).
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 95
44401 - Microsoft Windows SMB Service Config Enumeration
Synopsis
Description
Nessus was able to obtain, via the SMB protocol, the launch parameters of each active service on the remote
host (executable path, logon type, etc.).
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
This plugin implements the SvcOpenSCManager() and SvcEnumServices() calls to obtain, using the SMB
protocol, the list of active and inactive services of the remote host.
An attacker may use this feature to gain better knowledge of the remote host.
Solution
To prevent the listing of the services from being obtained, you should either have tight login restrictions, so that
only trusted users can access your host, and/or you should filter incoming traffic to this port.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Active Services :
Synopsis
Nessus was able to collect and report SMB session information from the remote host.
Description
Nessus was able to collect details of SMB sessions from the remote Windows host and generate a report as a
CSV attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
OPERADORA4$
CONSULTA5$
medicosisv
rperez
acarre.o
mrodriguez
PC-MCUBILLOS$
Synopsis
Description
By using the supplied credentials, Nessus was able to enumerate the permissions of network shares. User
permissions are enumerated for each network share that has a list of access control entries (ACEs).
See Also
https://technet.microsoft.com/en-us/library/bb456988.aspx
https://technet.microsoft.com/en-us/library/cc783530.aspx
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
References
CVE CVE-1999-0519
CVE CVE-1999-0520
Plugin Information
Plugin Output
tcp/445
- ADMIN$ - (readable,writable)
+ Content of this share :
..
ADFS
ADWS
AppCompat
apppatch
AppReadiness
assembly
bfsvc.exe
Boot
bootstat.dat
Branding
CbsTemp
certenroll.log
certocm.log
192.168.100.4 960
Cursors
debug
DesktopTileResources
diagnostics
DigitalLocker
Downloaded Program Files
drivers
DtcInstall.log
dwrcs
ELAMBKUP
en-US
es-ES
explorer.exe
Fonts
Globalization
Help
HelpPane.exe
hh.exe
iis.log
IME
ImmersiveControlPanel
Inf
InputMethod
Installer
L2Schemas
LiveKernelReports
Logs
media
mib.bin
Microsoft.NET
ModemLogs
NTDS
Offline Web Pages
Panther
PFRO.log
PLA
PolicyDefinitions
Provisioning
regedit.exe
Registration
RemotePackages
rescache
Resources
SchCache
schemas
security
ServerStandard.xml
ServerWeb.xml
ServiceProfiles
servicing
Setup
setupact.log
setuperr.log
SoftwareDistribution
Speech
splwow64.exe
System
system.ini
System32
SystemResources
SYSVOL
SysWOW64
TAPI
Tasks
Temp
ToastData
tracing
vmgcoinstall.log
Vss
Web
192.168.100.4 96
win.ini
WindowsShell.Manifest
WindowsUpdate.log
winhlp32.exe
WinSxS
wlansvc
write.exe
- C$ - (readable,writable)
+ Content of this share :
Archivos de programa
bootmgr
BOOTNXT
cpqsystem
Documents and Settings
inetpub
pagefile.sys
PerfLogs
Program Files
Program Files (x86)
ProgramData
System Volume Information
Users
Windows
- D$ - (readable,writable)
+ Content of this share :
Wallpaper
- F$ - (readable,writable)
+ Content of this share :
respaldo-elastix
- Wallpaper - (readable,writable)
+ Content of this share :
..
Icono agenda web.ico
ISV.jpg
ISV2.jpg
ISV3.jpg
ISV4.jpg
Oregon.jpg
Thumbs.db
- SYSVOL - (readable,writable)
+ Content of this share :
..
CLINICAISV.CL
- respaldo-elastix - (readable,writable)
+ Content of this share :
..
01-09-2015
02-09-2015
17-09-2015
28-08-2015
31-08-2015
- NETLOGON - (readable,writable)
+ Content of this share :
..
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Here are the SMB shares available on the remote host when logged in as Administrador:
- ADMIN$
- C$
- D$
- F$
- IPC$
- NETLOGON
- respaldo-elastix
- SYSVOL
- Wallpaper
100871 - Microsoft Windows SMB Versions Supported (remote check)
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request
to port 139 or 445.
Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
It was possible to obtain information about the dialects of SMB2 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 dialects running on the remote host by sending an authentication
request to port 139 or 445.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.1 Windows 10
3.1.1 Windows 10
92368 - Microsoft Windows Scripting Host Settings
Synopsis
Nessus was able to collect and report the Windows scripting host settings from the remote host.
Description
Nessus was able to collect system and user level Windows scripting host settings from the remote Windows host
and generate a report as a CSV attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
This plugin lists software that is configured to run on system startup by crawling the registry entries in :
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersi on\Run
Solution
Review the list of applications and remove any that are not compliant with your organization's acceptable use
and security policies.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
This plugin summarizes updates for Microsoft Security Bulletins or Knowledge Base (KB) security updates that
have not been installed on the remote Windows host based on the results of either a credentialed check using
the supplied credentials or a check done using a supported third-party patch management tool.
Review the summary and apply any missing updates in order to be up to date.
Solution
Run Windows Update on the remote host or use a patch management solution.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
The patches for the following bulletins or KBs are missing on the remote host :
- MS13-097 ( http://technet.microsoft.com/en-us/security/bulletin/ms13-097 )
- MS14-010 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-010 )
- MS14-011 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-011 )
- MS14-012 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-012 )
- MS14-018 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-018 )
- MS14-021 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-021 )
- MS14-029 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-029 )
- MS14-030 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-030 )
- MS14-031 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-031 )
- MS14-033 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-033 )
- MS14-035 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-035 )
- MS14-036 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-036 )
- MS14-037 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-037 )
- MS14-039 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-039 )
- MS14-040 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-040 )
- MS14-047 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-047 )
- MS14-049 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-049 )
- MS14-053 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-053 )
- MS14-054 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-054 )
- MS14-057 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-057 )
- MS14-058 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-058 )
- MS14-060 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-060 )
- MS14-064 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-064 )
- MS14-066 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-066 )
- MS14-068 ( http://technet.microsoft.com/en-us/security/bulletin/ms14-068 )
- MS14-071 ( http [...]
92369 - Microsoft Windows Time Zone Information
Synopsis
Nessus was able to collect and report time zone information from the remote host.
Description
Nesssus was able to collect time zone information from the remote Windows host and generate a report as a
CSV attachment.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.4 970
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.4 97
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : yes, as 'CLINICAISV.CL\Administrador' via SMB
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2019/9/9 11:53 -03
Scan duration : 1280 sec
58651 - Netstat Active Connections
Synopsis
Description
This plugin runs 'netstat' on the remote machine to enumerate all active 'ESTABLISHED' or 'LISTENING' tcp/udp
connections.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Netstat output :
Conexiones activas
Synopsis
Nessus was able to parse the results of the 'netstat' command on the remote host.
Description
The remote host has listening ports or established connections that Nessus was able to extract from the results
of the 'netstat' command.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
tcp4 (listen)
src: [host=0.0.0.0, port=80]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=88]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=135]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=389]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=445]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=464]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=593]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=636]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=3268]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=3269]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=3389]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=5985]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=6129]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=9389]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=47001]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49152]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49153]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49154]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49155]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49157]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49158]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49159]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=49192]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=55289]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=55292]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src: [host=0.0.0.0, port=55304]
dst: [host=0.0.0.0, port=0]
tcp4 (listen)
src [...]
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Note that 2503 UDP ports belonging to DNS.exe have been ignored.
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/53
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/53
192.168.100.4 980
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/67
192.168.100.4 98
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/68
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/88
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/88
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/123
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/135
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/389
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/389
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 990
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/464
192.168.100.4 991
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/464
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/500
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/593
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1645
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1646
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1812
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/1813
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/2535
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3268
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/3389
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/4500
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/5353
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/5355
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5985
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/6129
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/6129
192.168.100.4 1010
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/9389
192.168.100.4 101
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/47001
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49152
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49153
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49154
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49155
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49157
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49158
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49159
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55289
192.168.100.4 1020
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55292
192.168.100.4 102
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55304
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/55402
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/60595
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/64933
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/65291
Synopsis
Nessus was able to obtain the list of network interfaces on the remote host.
Description
Nessus was able, via WMI queries, to extract a list of network interfaces on the remote host and the IP
addresses attached to them.
Note that this plugin only enumerates IPv6 addresses for systems running Windows Vista or later.
See Also
http://www.nessus.org/u?b362cab2
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
+ Routing Information :
Destination Netmask Gateway
----------- ------- -------
0.0.0.0 0.0.0.0 192.168.100.1
10.0.0.0 255.0.0.0 0.0.0.0
10.0.0.100 255.255.255.255 0.0.0.0
10.127.127.0 255.255.255.0 0.0.0.0
10.127.127.1 255.255.255.255 0.0.0.0
10.127.127.255 255.255.255.255 0.0.0.0
10.255.255.255 255.255.255.255 0.0.0.0
127.0.0.0 255.0.0.0 0.0.0.0
127.0.0.1 255.255.255.255 0.0.0.0
127.255.255.255 255.255.255.255 0.0.0.0
192.168.56.0 255.255.255.0 0.0.0.0
192.168.56.1 255.255.255.255 0.0.0.0
192.168.56.255 255.255.255.255 0.0.0.0
192.168.100.0 255.255.255.0 0.0.0.0
192.168.100.4 255.255.255.255 0.0.0.0
192.168.100.255 255.255.255.255 0.0.0.0
224.0.0.0 240.0.0.0 0.0.0.0
224.0.0.0 240.0.0.0 0.0.0.0
224.0.0.0 240.0.0.0 0.0.0.0
224.0.0.0 240.0.0.0 0.0.0.0
255.255.255.255 255.255.255.255 0.0.0.0
255.255.255.255 255.255.255.255 0.0.0.0
255.255.255.255 255.255.255.255 0.0.0. [...]
10884 - Network Time Protocol (NTP) Server Detection
Synopsis
Description
An NTP server is listening on port 123. If not securely configured, it may provide information about its version,
current date, current time, and possibly system information.
See Also
http://www.ntp.org
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/123
Version : unknown
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Not all fingerprints could give a match. If you think some or all of
the following could be used to identify the host's operating system,
please email them to os-signatures@nessus.org. Be sure to include a
brief description of the host itself, such as the actual operating
system or product / model names.
NTP:!:unknown
HTTP:Server: Microsoft-IIS/8.5
SSLcert:!:i/CN:CLINICAISV-SERVIDORDOMINIO-CA-1
fddab2cffcaf5e1a55c3f9c3d9f9e4c4a9fef36d
i/CN:CLINICAISV-SERVIDORDOMINIO-CA-1
fddab2cffcaf5e1a55c3f9c3d9f9e4c4a9fef36d
i/CN:ServidorDominio.CLINICAISV.CLs/CN:ServidorDominio.CLINICAISV.CL
1f9e12c013519cf90ba9c6f42736cae078ed902b
192.168.100.4 1030
92426 - OpenSaveMRU History
Synopsis
Nessus was able to enumerate opened and saved files on the remote host.
Description
Nessus was able to generate a report on files that were opened using the shell dialog box or saved using the
shell dialog box. This is the box that appears when you attempt to save a document or open a document in
Windows Explorer.
See Also
http://www.nessus.org/u?ac4dd3fb
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.4 103
65743 - Oracle Java JRE Enabled (Internet Explorer)
Synopsis
The remote host has Oracle Java JRE enabled for Internet Explorer.
Description
See Also
https://support.microsoft.com/en-us/help/2751647/how-to-disable-the-java-web-plug-in-in-internet-explorer
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Note that this check may be incomplete as Nessus can only check the
SIDs of logged on users.
71462 - Oracle Java JRE Premier Support and Extended Support Version Detection
Synopsis
The remote host contains one or more versions of the Oracle Java JRE that require long-term support.
Description
According to its version, there is at least one install of Oracle (formerly Sun) Java JRE that is potentially under
either Premier Support or Extended Support.
Note that both support programs require vendor contracts. Premier Support provides upgrades and security fixes
for five years after the general availability (GA) date. Extended Support provides upgrades and security fixes for
three years after Premier Support ends.
See Also
http://www.oracle.com/technetwork/java/eol-135779.html
http://www.oracle.com/us/support/lifetime-support-068561.html
https://www.oracle.com/support/lifetime-support/
Solution
To continue receiving updates and security fixes, contact the vendor regarding Premier Support or Extended
Support contracts.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Oracle Java JRE has not been universally disabled on the remote host.
Description
Oracle Java JRE has not been universally disabled on the remote host via the Java control panel. Note that
while Java can be individually disabled for each browser, universally disabling Java prevents it from running for
all users and browsers.
See Also
https://www.java.com/en/download/help/disable_browser.xml
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
33545 - Oracle Java Runtime Environment (JRE) Detection
Synopsis
Description
One or more instances of Oracle's (formerly Sun's) Java Runtime Environment (JRE) is installed on the remote
host. This may include private JREs bundled with the Java Development Kit (JDK).
See Also
https://www.oracle.com/technetwork/java/index.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
Oracle VM VirtualBox, formerly Sun xVM VirtualBox, a free virtualization application, is installed on the remote
host.
See Also
https://www.virtualbox.org/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch to
install to make sure the remote host is up-to-date.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
+ Action to take : Upgrade to Oracle JDK / JRE 11 Update 1, 8 Update 191 / 7 Update 201 / 6 Update
211 or later. If necessary, remove any affected versions.
Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or
later.
+Impact : Taking this action will resolve 456 different vulnerabilities (CVEs).
[ Oracle [...]
57364 - PuTTY Detection
Synopsis
Description
The remote host has an installation of PuTTY, which is a suite of tools for remote console access and file
transfer.
See Also
https://www.chiark.greenend.org.uk/~sgtatham/putty/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
See Also
https://www.rarlab.com/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 1040
92428 - Recent File History
Synopsis
Nessus was able to enumerate recently opened files on the remote host.
Description
Nessus was able to gather evidence of files opened by file type from the remote host.
See Also
https://www.4n6k.com/2014/02/forensics-quickie-pinpointing-recent.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
C:\\Users\rtapia.CLINICAISV\AppData\Roaming\Microsoft\Windows\Recent\R@1n.lnk
192.168.100.4 104
92429 - Recycle Bin Files
Synopsis
Nessus was able to enumerate files in the recycle bin on the remote host.
Description
Nessus was able to generate a list of all files found in $Recycle.Bin subdirectories.
See Also
http://www.nessus.org/u?0c1a03df
http://www.nessus.org/u?61293b38
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
C:\\$Recycle.Bin\\. C:\\
$Recycle.Bin\\.. C:\\
$Recycle.Bin\\S-1-5-18
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1111
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1113
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1114
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1307
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1346
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1359
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1379
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1474
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-500
C:\\$Recycle.Bin\\S-1-5-18\. C:\\
$Recycle.Bin\\S-1-5-18\.. C:\\
$Recycle.Bin\\S-1-5-18\desktop.ini
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1111\.
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1111\..
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1111\desktop.ini
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1113\.
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1113\..
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1113\desktop.ini
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1114\.
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1114\..
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1114\desktop.ini
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1307\.
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1307\..
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1307\desktop.ini
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1346\.
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1346\..
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1346\desktop.ini
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1359\.
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1359\.. C:\\
$Recycle.Bin\\S-1-5-21-1586170146-605884322-2766078902-1359\$IDGX0ZW.lnk
C:\\$Recycle.Bin\\S-1-5-21-1586170146-605884322-27660 [...]
62042 - SMB QuickFixEngineering (QFE) Enumeration
Synopsis
Description
By connecting to the host with the supplied credentials, this plugin enumerates quick-fix engineering updates
installed on the remote host via the registry.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Synopsis
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Synopsis
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Synopsis
The remote host has an SSL certificate chain with one or more certificates that are going to expire soon.
Description
The remote host has an SSL certificate chain with one or more SSL certificates that are going to expire soon.
Failure to renew these certificates before the expiration date may result in denial of service for users.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
|-Subject : CN=ServidorDominio.CLINICAISV.CL
|-Not After : Oct 11 21:29:06 2019 GMT
42981 - SSL Certificate Expiry - Future Expiry
Synopsis
The SSL certificate associated with the remote service will expire soon.
Description
The SSL certificate associated with the remote service will expire soon.
Solution
Purchase or generate a new SSL certificate in the near future to replace the existing one.
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
The SSL certificate will expire within 60 days, at Oct 11 21:29:06 2019 GMT :
192.168.100.4 1050
10863 - SSL Certificate Information
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Subject Name:
Issuer Name:
Domain Component: CL
Domain Component: CLINICAISV
Common Name: CLINICAISV-SERVIDORDOMINIO-CA-1
Serial Number: 2E 00 00 D8 57 04 58 89 3A BA 75 5B 49 00 00 00 00 D8 57
Version: 3
192.168.100.4 105
E5 41 58 58 B5 55 5D B1 E5 55 26 76 C9 30 E9 FC B2 F0 85 E5
4E FE 47 64 02 96 7E E8 52 7E DB E9 61 76 0C 21 E1 8A 40 23
B1 F6 68 B4 67 5A 7B BB 6B 6A D2 C1 F7 50 35 33 5F
Exponent: 01 00 01
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Subject Name:
Issuer Name:
Domain Component: CL
Domain Component: CLINICAISV
Common Name: CLINICAISV-SERVIDORDOMINIO-CA-1
Serial Number: 2E 00 00 D8 57 04 58 89 3A BA 75 5B 49 00 00 00 00 D8 57
Version: 3
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Subject Name:
Issuer Name:
Serial Number: 4C 3F 56 C5 87 BF AB 9B 48 C5 68 F8 5C CA CF 6A
Version: 3
Synopsis
A known CA SSL certificate in the certificate chain has been signed using a weak hashing algorithm.
Description
The remote service uses a known CA certificate in the SSL certificate chain that has been signed using a
cryptographically weak hashing algorithm (e.g., MD2, MD4, MD5, or SHA1). These signature algorithms are
known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the
same digital signature, allowing the attacker to masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as
vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.
See Also
https://tools.ietf.org/html/rfc3279
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2008/961509
Solution
Risk Factor
None
References
BID 11849
BID 33065
CVE CVE-2004-2761
XREF CERT:836068
XREF CWE:310
Plugin Information
Plugin Output
tcp/636
Synopsis
A known CA SSL certificate in the certificate chain has been signed using a weak hashing algorithm.
Description
The remote service uses a known CA certificate in the SSL certificate chain that has been signed using a
cryptographically weak hashing algorithm (e.g., MD2, MD4, MD5, or SHA1). These signature algorithms are
known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the
same digital signature, allowing the attacker to masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as
vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.
See Also
https://tools.ietf.org/html/rfc3279
https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2008/961509
Solution
Risk Factor
None
References
BID 11849
BID 33065
CVE CVE-2004-2761
XREF CERT:836068
XREF CWE:310
Plugin Information
Plugin Output
tcp/3269
192.168.100.4 1060
70544 - SSL Cipher Block Chaining Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with
subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Here is the list of SSL CBC ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
192.168.100.4 106
{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
70544 - SSL Cipher Block Chaining Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with
subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Here is the list of SSL CBC ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with
subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Here is the list of SSL CBC ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
Synopsis
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
http://www.nessus.org/u?3a040ada
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
s the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version.
rsion : TLSv12
Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Synopsis
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
http://www.nessus.org/u?3a040ada
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
s the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version.
rsion : TLSv12
Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.100.4 1070
21643 - SSL Cipher Suites Supported
Synopsis
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
http://www.nessus.org/u?3a040ada
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
s the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version.
rsion : TLSv12
Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.100.4 107
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Here is the list of SSL PFS ciphers supported by the remote server :
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Here is the list of SSL PFS ciphers supported by the remote server :
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Here is the list of SSL PFS ciphers supported by the remote server :
Synopsis
Description
The remote service encrypts communications using SSL/TLS, requests a client certificate, and may require a
valid certificate in order to establish a connection to the underlying service.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Synopsis
Description
The remote service encrypts communications using SSL/TLS, requests a client certificate, and may require a
valid certificate in order to establish a connection to the underlying service.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
192.168.100.4 1080
51891 - SSL Session Resume Supported
Synopsis
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive
a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in
the second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
192.168.100.4 108
51891 - SSL Session Resume Supported
Synopsis
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive
a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in
the second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Synopsis
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive
a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in
the second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Synopsis
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends
that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB
versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is
unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users
disable SMBv1 per SMB best practices to mitigate these potential issues.
See Also
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-
in-windows-and
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by
blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 /
139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends
that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB
versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is
unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users
disable SMBv1 per SMB best practices to mitigate these potential issues.
See Also
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-
in-windows-and
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by
blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 /
139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/593
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5985
192.168.100.4 1090
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/6129
192.168.100.4 109
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/47001
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/49157
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/65291
Synopsis
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the
uptime of the remote host can sometimes be computed.
See Also
http://www.ietf.org/rfc/rfc1323.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
104743 - TLS Version 1.0 Protocol Detection
Synopsis
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1
and 1.2 are designed against these flaws and should be used whenever possible.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.
Solution
Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Synopsis
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1
and 1.2 are designed against these flaws and should be used whenever possible.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.
Solution
Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
Synopsis
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1
and 1.2 are designed against these flaws and should be used whenever possible.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.
Solution
Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Synopsis
Description
PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the use of TLS 1.2. A proposal
is currently before the IETF to fully deprecate TLS 1.1 and many vendors have already proactively done this.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d
Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
Risk Factor
None
Plugin Information
Plugin Output
tcp/636
Synopsis
Description
PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the use of TLS 1.2. A proposal
is currently before the IETF to fully deprecate TLS 1.1 and many vendors have already proactively done this.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d
Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
Risk Factor
None
Plugin Information
Plugin Output
tcp/3269
192.168.100.4 1100
121010 - TLS Version 1.1 Protocol Detection
Synopsis
Description
PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the use of TLS 1.2. A proposal
is currently before the IETF to fully deprecate TLS 1.1 and many vendors have already proactively done this.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d
Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
192.168.100.4 110
52715 - TeamViewer Version Detection
Synopsis
Description
See Also
https://www.teamviewer.com/en/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
Nessus was able to generate a report on terminal service connections on the target system.
See Also
http://www.nessus.org/u?15f94efb
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
Subject Name:
Issuer Name:
Serial Number: 4C 3F 56 C5 87 BF AB 9B 48 C5 68 F8 5C CA CF 6A
Version: 3
Synopsis
Description
Using the supplied credentials, Nessus was able to determine when the host was last started.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
20190706192041.491176-240
10287 - Traceroute Information
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/0
Hop Count: 5
92434 - User Download Folder Files
Synopsis
Description
Nessus was able to generate a report of all files listed in the default user download folder.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
C:\\Users\Administrador\Downloads\aida64extreme580\afaapi.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida64.chm
C:\\Users\Administrador\Downloads\aida64extreme580\aida64.dat
C:\\Users\Administrador\Downloads\aida64extreme580\aida64.exe
C:\\Users\Administrador\Downloads\aida64extreme580\aida64.exe.manifest
C:\\Users\Administrador\Downloads\aida64extreme580\aida64.mem
C:\\Users\Administrador\Downloads\aida64extreme580\aida64.web
C:\\Users\Administrador\Downloads\aida64extreme580\aida_arc.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_bench32.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_bench64.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_cpl.cpl
C:\\Users\Administrador\Downloads\aida64extreme580\aida_diskbench.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_helper64.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_icons10.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_icons2k.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_mondiag.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_uires.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_uireshd.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_update.dll
C:\\Users\Administrador\Downloads\aida64extreme580\aida_vsb.vsb
C:\\Users\Administrador\Downloads\aida64extreme580\CUESDK_2013.dll
C:\\Users\Administrador\Downloads\aida64extreme580\kerneld.ia64
C:\\Users\Administrador\Downloads\aida64extreme580\kerneld.v64
C:\\Users\Administrador\Downloads\aida64extreme580\kerneld.w9x
C:\\Users\Administrador\Downloads\aida64extreme580\kerneld.x32
C:\\Users\Administrador\Downloads\aida64extreme580\kerneld.x64
C:\\Users\Administrador\Downloads\aida64extreme580\Language\lang_aa.txt
C:\\Users\Administrador\Downloads\aida64extreme580\Language\lang_al.txt
C:\\Users\Administrador\Downloads\aida64extreme580\Language\lang_bg.txt
C:\\Users\Administrador\Downloads\aida64extreme580\Language\lang_br.txt
C:\\Users\Administrador\Downloads\aida64extreme580\Language\lan [...]
192.168.100.4 1110
92431 - User Shell Folders Settings
Synopsis
Nessus was able to find the folder paths for user folders on the remote host.
Description
Nessus was able to gather a list of settings from the target system that store common user folder locations. A
few of the more common locations are listed below :
- Administrative Tools
- AppData
- Cache
- CD Burning
- Cookies
- Desktop
- Favorites
- Fonts
- History
- Local AppData
- My Music
- My Pictures
- My Video
- NetHood
- Personal
- PrintHood
- Programs
- Recent
- SendTo
- Start Menu
- Startup
- Templates
See Also
https://technet.microsoft.com/en-us/library/cc962613.aspx
Solution
n/a
Risk Factor
192.168.100.4 111
None
Plugin Information
Plugin Output
tcp/0
S-1-5-21-1586170146-605884322-2766078902-1307
- {7d1d3a04-debb-4115-95cf-2f29da2920da} : C:\Users\pdiaz\Searches
- {1b3ea5dc-b587-4786-b4ef-bd1dc332aeae} : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows
\Libraries
- {374de290-123f-4565-9164-39c4925e467b} : C:\Users\pdiaz\Downloads
- recent : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Recent
- my video : C:\Users\pdiaz\Videos
- my music : C:\Users\pdiaz\Music
- {56784854-c6cb-462b-8169-88e350acb882} : C:\Users\pdiaz\Contacts
- {bfb9d5e0-c6a9-404c-b2b2-ae6db6af4968} : C:\Users\pdiaz\Links
- {a520a1a4-1780-4ff6-bd18-167343c5af16} : C:\Users\pdiaz\AppData\LocalLow
- sendto : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\SendTo
- start menu : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Start Menu
- cookies : C:\Users\pdiaz\AppData\Local\Microsoft\Windows\INetCookies
- personal : C:\Users\pdiaz\Documents
- administrative tools : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs
\Administrative Tools
- startup : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
- history : C:\Users\pdiaz\AppData\Local\Microsoft\Windows\History
- nethood : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Network Shortcuts
- {4c5c32ff-bb9d-43b0-b5b4-2d72e54eaaa4} : C:\Users\pdiaz\Saved Games
- {00bcfc5a-ed94-4e48-96a1-3f6217f21990} : C:\Users\pdiaz\AppData\Local\Microsoft\Windows
\RoamingTiles
- !do not use this registry key : Use the SHGetFolderPath or SHGetKnownFolderPath function instead
- local appdata : C:\Users\pdiaz\AppData\Local
- my pictures : C:\Users\pdiaz\Pictures
- templates : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Templates
- printhood : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Printer Shortcuts
- cache : C:\Users\pdiaz\AppData\Local\Microsoft\Windows\INetCache
- desktop : C:\Users\pdiaz\Desktop
- programs : C:\Users\pdiaz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs
- fonts : C:\Windows\Fonts
- cd burning : C:\Users\pdiaz\AppData\Loc [...]
92435 - UserAssist Execution History
Synopsis
Nessus was able to enumerate program execution history on the remote host.
Description
Nessus was able to gather evidence from the UserAssist registry key that has a list of programs that have been
executed.
See Also
https://www.4n6k.com/2013/05/userassist-forensics-timelines.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
By connecting to the remote host with the supplied credentials, this plugin enumerates quick-fix engineering
updates installed on the remote host via WMI.
See Also
http://www.nessus.org/u?0c4ec249
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
+ KB2862152
- Description : Security Update
- InstalledOn : 11/14/2013
+ KB2868626
- Description : Security Update
- InstalledOn : 11/14/2013
+ KB2876331
- Description : Security Update
- InstalledOn : 11/14/2013
+ KB2883200
- Description : Update
- InstalledOn : 11/14/2013
+ KB2884101
- Description : Update
- InstalledOn : 11/14/2013
+ KB2884846
- Description : Update
- InstalledOn : 11/14/2013
+ KB2887595
- Description : Update
- InstalledOn : 11/14/2013
+ KB2888505
- Description : Security Update
- InstalledOn : 11/14/2013
+ KB2892074
- Description : Security Update
- InstalledOn : 8/22/2016
+ KB2893294
- Description : Security Update
- InstalledOn : 8/24/2016
+ KB2894029
- Description : Update
- InstalledOn : 11/14/2013
+ KB2894179
- Description : Update
- InstalledOn : 11/14/2013
+ KB2898514
- Description : Update
- InstalledOn : 11/14/2013
+ KB2898871
- Description : Security Update
- InstalledOn : 8/24/2016
+ KB2900986
- Description : Security Update
- InstalledOn : 11/14/2013
+ KB2901101
- Description : Update
- InstalledOn : 11/14/2013
+ KB2901128
- Description : Security Update
- InstalledOn : 8/22/2016
+ KB2903939
- Description : Update
- InstalledOn : 8/24/2016
+ KB2904266
- Description : Update
- InstalledOn : 8/22/2016
+ KB2906956
- Description : Update
- InstalledOn : 11/14/2013
+ KB2908174
- Description : Update
- InstalledOn : 11/14/2013
+ KB2911106
- Description : Update
- InstalledOn : 8/24/2016
+ KB2912390
- Description : Security Update
- InstalledOn : 8/24/2016
+ KB2913270
- Description : Update
- InstalledOn : 8/22/2016
+ KB2913760
- Description : Update
- InstalledOn : 8/24/2016
+ KB2914218
- Description : Update
- InstalledOn : 8/22/2016
+ KB2916036
- Description : Security Update
- InstalledOn : 8/24/2016
+ KB2919394
- Description : Update
- InstalledOn : 8/24/2016
+ KB [...]
44871 - WMI Windows Feature Enumeration
Synopsis
Description
Nessus was able to enumerate the server features of the remote host by querying the 'Win32_ServerFeature'
class of the '\Root\cimv2' WMI namespace for Windows Server versions or the 'Win32_OptionalFeature' class of
the '\Root\cimv2' WMI namespace for Windows Desktop versions.
Note that Features can only be enumerated for Windows 7 and later for desktop versions.
See Also
https://msdn.microsoft.com/en-us/library/cc280268
https://docs.microsoft.com/en-us/windows/desktop/WmiSdk/querying-the-status-of-optional-features
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
The remote web server uses its default welcome page. Therefore, it's probable that this server is not used at all
or is serving content that is meant to be hidden.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/80
192.168.100.4 1120
92436 - WinRAR History
Synopsis
Nessus was able to enumerate files opened with WinRAR on the remote host.
Description
Nessus was able to gather evidence of compressed files that were opened by WinRAR. Note that only
compressed files that were opened and not extracted through the explorer shortcut or command line interface
were reported.
See Also
https://www.rarlab.com/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
C:\Users\Administrador\Desktop\KMSpico.v9.1.2.20131210-heldigard.rar
C:\Users\Administrador\Downloads\aida64extreme580.zip
192.168.100.4 112
119150 - Windows 8.1 and Server 2012 R2 KB4345424 Update
Synopsis
Description
The remote Windows host is missing update 4345424. This update includes quality improvements. No new
operating system features are being introduced in this update. Key changes include:
- Addressed issue in which some devices may experience stop error 0xD1 when you run network monitoring
workloads.
- Addresses an issue that may cause the restart of the SQL Server service to fail with the error, 'Tcp port is
already in use'.
- Addresses an issue that occurs when an administrator tries to stop the World Wide Web Publishing Service
(W3SVC). The W3SVC remains in a 'stopping' state, but cannot fully stop or it cannot be restarted.
See Also
https://support.microsoft.com/en-us/help/4345424/title
Solution
Risk Factor
None
References
MSKB 4345424
Plugin Information
Plugin Output
tcp/445
KB : 4345424
- C:\Windows\system32\hal.dll has not been patched.
Remote version : 6.3.9600.16500
Should be : 6.3.9600.18969
48337 - Windows ComputerSystemProduct Enumeration (WMI)
Synopsis
It is possible to obtain product information from the remote host using WMI.
Description
By querying the WMI class 'Win32_ComputerSystemProduct', it is possible to extract product information about
the computer system such as UUID, IdentifyingNumber, vendor, etc.
See Also
http://www.nessus.org/u?a21ce849
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Nessus enumerated the DNS servers being used by the remote Windows host.
Description
Nessus was able to enumerate the DNS servers configured on the remote Windows host by looking in the
registry.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Interface: {22872CDF-41D5-4F87-9D81-2CCDD2F31C7D}
Network Connection : Ethernet
NameServer: 192.168.100.4,8.8.4.4,127.0.0.1
72482 - Windows Display Driver Enumeration
Synopsis
Nessus was able to enumerate one or more of the display drivers on the remote host.
Description
Nessus was able to enumerate one or more of the display drivers on the remote host via WMI.
See Also
http://www.nessus.org/u?b6e87533
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to find evidence of program execution using Windows Explorer registry logs and settings.
See Also
http://www.forensicswiki.org/wiki/LastVisitedMRU
http://www.nessus.org/u?7e00b191
http://www.nessus.org/u?ac4dd3fb
http://www.nessus.org/u?c409cb41
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
mmc.exePO :i+00/D:\\1VGiWallpaperDUGeVGi.(uWallpaper
certreq.exe
VirtualBox.exe
mspaint.exePO :i+00.S:2L
iexplore.exeX\r,!PCsg<;-1SPSsC\nCOi3n51SPS0%G`\nnas-1SPS:7CD)3\\nas\PublicMicrosoft NetworkPublic
Share
NOTEPAD.EXE
config\1
cba
cmd\1
ipconfig /flushdns\1
gpedit.msc\1
ba
cmd\1
ping 192.168.1.5\1
control\1
services.msc\1
dsa.msc\1
gpedit.msc\1
DNSMGMT.msc\1
ping 192.168.1.239\1
ping 192.168.1.230\1
gpmc.msc\1
ping 192.168.1.254\1
\\192.168.1.15\1
c:\Windows\PolicyDefinitions\1
cmd\1
aqfpognmlkjidhecb
\\nas\1
\\nas\\1
dxdiag\1
calc\1
cmd\1
ba
gpmc.msc\1
cmd\1
ba
\\nas\1
mmc.exe_m\nM
certreq.exe
IEXPLORE.EXE\rX2hwW
VirtualBox.exeh;heH
mmc.exe`i%
NOTEPAD.EXENNJ[Va
mspaint.exeX\mM
X\r,!PCsg<
x@_dP/N
Synopsis
Nessus was able to enumerate the directory paths that users visited by typing the full directory path into
Windows Explorer.
Description
Nessus was able to enumerate the directory paths that users visited by manually typing the full directory path
into Windows Explorer. The generated folder list report contains folders local to the system, folders from past
mounted network drives, and folders from mounted devices.
See Also
http://www.nessus.org/u?f92f6e9f
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
\\servidordominio
\\nas
\\nas\
\\NAS
\\192.168.1.245
\\nas
\\192.168.1.38
\\192.168.1.38
\\192.168.100.21
Synopsis
Description
The supplied credentials can be used to make WMI (Windows Management Instrumentation) requests against
the remote host over DCOM.
These requests can be used to gather information about the remote host, such as its current state, network
interface configuration, etc.
See Also
http://msdn.microsoft.com/en-us/library/aa394582(v=vs.85).aspx
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.4 1130
10150 - Windows NetBIOS / SMB Remote Host Information Disclosure
Synopsis
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB
requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
192.168.100.4 113
63620 - Windows Product Key Retrieval
Synopsis
This plugin retrieves the Windows Product key of the remote Windows host.
Description
Using the supplied credentials, Nessus was able to obtain the retrieve the Windows host's partial product key'.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Note that all but the final portion of the key has been obfuscated.
10940 - Windows Terminal Services Enabled
Synopsis
Description
Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user
on the remote host).
If an attacker gains a valid login and password, this service could be used to gain further access on the remote
host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in
remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for
attackers to steal the credentials of legitimate users by impersonating the Windows server.
Solution
Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.
Risk Factor
None
Plugin Information
Plugin Output
tcp/3389
34112 - Wireshark / Ethereal Detection (Windows)
Synopsis
Description
Wireshark is a popular open source network protocol analyzer (sniffer) typically used for network troubleshooting
and protocol analysis.
See Also
https://www.wireshark.org/about.html
https://www.wireshark.org/news/20060607.html
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/445
Application : Wireshark
Path : C:\Program Files\Wireshark
Version : 2.2.5
Remediations
Suggested Remediations
Taking the following actions across 1 hosts would resolve 34% of the vulnerabilities on the network.
Oracle Java SE Multiple Vulnerabilities (October 2018 CPU): Upgrade to Oracle JDK / JRE 456 1
11 Update 1, 8 Update 191 / 7 Update 201 / 6 Update 211 or later. If necessary, remove any
affected versions. Note that an Extended Support contract with Oracle is needed to obtain
JDK / JRE 6 Update 95 or later.
Wireshark 2.2.x < 2.2.17 / 2.4.x < 2.4.9 / 2.6.x < 2.6.3 Multiple Vulnerabilities: Upgrade to 97 1
Wireshark version 2.2.17 / 2.4.9 / 2.6.3 or later.
Oracle VM VirtualBox < 5.2.20 Multiple Vulnerabilities (Oct 2018 CPU): Upgrade to Oracle 57 1
VM VirtualBox version 5.2.20 or later as referenced in the October 2018 Oracle Critical
Patch Update advisory.
Install KB4511872 32 1
Install KB3071756 12 1
Install KB3185911 8 1
PuTTY < 0.71 Multiple Vulnerabilities: Upgrade to PuTTY version 0.71 or later. 5 1
Install KB3109094 4 1
Install KB3078601 4 1
Install KB3045171 4 1
RARLAB WinRAR < 5.70 Beta 1 Multiple Vulnerabilities: Upgrade to WinRAR version 5.70 4 1
Beta 1 or later.
Install KB3156019 3 1
Install KB3139940 3 1
Install KB3177108 2 1
Install KB3157569 2 1
Install KB3149090 2 1
Install KB3126446 2 1
Install KB3010788 2 1
Install KB3184943 1 1
Install KB3161951 1 1
Install KB3153704 1 1
Install KB3134222 1 1
Install KB3133043 1 1
Install KB3126593 1 1
Install KB3126587 1 1
Install KB3097997 1 1
Install KB3084135 1 1
Install KB3076895 1 1
Install KB3075220 1 1
Install KB3059317 1 1
Install KB3037579 1 1
Install KB3004365 1 1
Install KB2973906 1 1
SolarWinds Dameware Mini Remote Control Client Public Key Buffer Over-read: Upgrade to 1 1
SolarWinds Dameware Mini Remote Control v12.1 Hotfix 2 or later.