• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Microsoft Windows Server 2019 Multiple Vulnerabilities
April 11, 2019
Rewterz Threat Advisory – Microsoft Windows Server 2008 / Windows 7 Multiple Vulnerabilities
April 11, 2019

Rewterz Threat Advisory – Microsoft Windows Server 2012 / Windows RT 8.1 / 8.1 Multiple Vulnerabilities

April 11, 2019

Severity

Medium

Analysis Summary

CVE-2019-0853

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka ‘GDI+ Remote Code Execution Vulnerability’.

CVE-2019-0803

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka ‘Win32k Elevation of Privilege Vulnerability’. 

CVE-2019-0732

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka ‘Windows Security Feature Bypass Vulnerability’.

CVE-2019-0879

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ‘Jet Database Engine Remote Code Execution Vulnerability’.

CVE-2019-0848

An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka ‘Win32k Information Disclosure Vulnerability’. 

CVE-2019-0839

An information disclosure vulnerability exists when the Terminal Services component improperly discloses the contents of its memory, aka ‘Windows Information Disclosure Vulnerability’. 

CVE-2019-0791

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka ‘MS XML Remote Code Execution Vulnerability’. 

CVE-2019-0845

A remote code execution vulnerability exists when the IOleCvt interface renders ASP webpage content, aka ‘Windows IOleCvt Interface Remote Code Execution Vulnerability’.

CVE-2019-0731

An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka ‘Windows Elevation of Privilege Vulnerability’. 

CVE-2019-0844

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka ‘Windows Kernel Information Disclosure Vulnerability’. 

CVE-2019-0846

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ‘Jet Database Engine Remote Code Execution Vulnerability’. 

CVE-2019-0796

An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka ‘Windows Elevation of Privilege Vulnerability’.

CVE-2019-0859

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka ‘Win32k Elevation of Privilege Vulnerability’. 

CVE-2019-0730

An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka ‘Windows Elevation of Privilege Vulnerability’. 

CVE-2019-0877

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ‘Jet Database Engine Remote Code Execution Vulnerability’.

CVE-2019-0842

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka ‘Windows VBScript Engine Remote Code Execution Vulnerability’.

CVE-2019-0805

An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka ‘Windows Elevation of Privilege Vulnerability’.

CVE-2019-0802

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka ‘Windows GDI Information Disclosure Vulnerability’. 

CVE-2019-0735

An elevation of privilege vulnerability exists when the Windows Client Server Run-Time Subsystem (CSRSS) fails to properly handle objects in memory, aka ‘Windows CSRSS Elevation of Privilege Vulnerability’.

CVE-2019-0849

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka ‘Windows GDI Information Disclosure Vulnerability’.

CVE-2019-0790

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka ‘MS XML Remote Code Execution Vulnerability’.

CVE-2019-0792

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka ‘MS XML Remote Code Execution Vulnerability’.

CVE-2019-0793

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka ‘MS XML Remote Code Execution Vulnerability’.


CVE-2019-0836

An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka ‘Windows Elevation of Privilege Vulnerability’.

CVE-2019-0847

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ‘Jet Database Engine Remote Code Execution Vulnerability’. 

CVE-2019-0851

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ‘Jet Database Engine Remote Code Execution Vulnerability’.

CVE-2019-0688

An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets, aka ‘Windows TCP/IP Information Disclosure Vulnerability’.

CVE-2019-0795

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka ‘MS XML Remote Code Execution Vulnerability’.

CVE-2019-0794

A remote code execution vulnerability exists when OLE automation improperly handles objects in memory, aka ‘OLE Automation Remote Code Execution Vulnerability’.

CVE-2019-0838

An information disclosure vulnerability exists when Windows Task Scheduler improperly discloses credentials to Windows Credential Manager, aka ‘Windows Information Disclosure Vulnerability’.

Impact

  • System access 
  • Privilege escalation 
  • Exposure of sensitive information 
  • Manipulation of data 
  • Security Bypass

Affected Vendors

Microsoft

Affected Products

Microsoft Windows Server 2012
Microsoft Windows RT 8.1
Microsoft Windows 8.1

Remediation

Vendor has released updates for the following products.

Windows 8.1 for 32-bit systems (KB4493467):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4493467

Windows RT 8.1 (KB4493446):

Apply update (please see the vendor’s service database for details).

Windows 8.1 for x64-based systems (KB4493446):

Windows Server 2012 R2 (KB4493446):

Windows Server 2012 R2 (Server Core installation) (KB4493446):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4493446

Windows 8.1 for 32-bit systems (KB4493446):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4493446

Windows Server 2012 (KB4493450):

Windows Server 2012 (Server Core installation) (KB4493450):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4493450

Windows Server 2012 (KB4493451):

Windows Server 2012 (Server Core installation) (KB4493451):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4493451

Windows 8.1 for x64-based systems (KB4493467):

Windows Server 2012 R2 (KB4493467):

Windows Server 2012 R2 (Server Core installation) (KB4493467):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4493467

Windows Server 2012 (KB3173426):

Windows Server 2012 (Server Core installation) (KB3173426):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3173426

Windows 8.1 for x64-based systems (KB3173424):

Windows Server 2012 R2 (KB3173424):

Windows Server 2012 R2 (Server Core installation) (KB3173424):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3173424

Windows 8.1 for 32-bit systems (KB3173424):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3173424

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.