Windows 2008 January 3 2018 Multiple Security Updates

Medium Nessus Plugin ID 105585

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows host is missing multiple security updates released on 2018/01/03. It is, therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerabilities exists in the way that the Color Management Module (ICM32.dll) handles objects in memory. This vulnerability allows an attacker to retrieve information to bypass usermode ASLR (Address Space Layout Randomization) on a targeted system. By itself, the information disclosure does not allow arbitrary code execution. However, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. (CVE-2018-0741)

- An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. (CVE-2018-0747)

- An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploits the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. (CVE-2018-0748)

- An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) server when an attacker who has valid credentials attempts to open a specially crafted file over the SMB protocol on the same machine. An attacker who successfully exploits this vulnerability could bypass certain security checks in the operating system. (CVE-2018-0749)

- A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploits the vulnerability could obtain information to further compromise the user's system. (CVE-2018-0750)

- An information disclosure vulnerability exists in Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploits the vulnerability could obtain information to enable the attacker to further compromise the user's system.

Solution

Apply the following security updates :

- 4056942
- 4056613
- 4056615
- 4056759
- 4056944
- 4056941

See Also

http://www.nessus.org/u?ee02a5e1

http://www.nessus.org/u?b7618d8f

http://www.nessus.org/u?14fd3757

http://www.nessus.org/u?10972e7d

http://www.nessus.org/u?a3717b24

http://www.nessus.org/u?7fd20780

Plugin Details

Severity: Medium

ID: 105585

File Name: smb_nt_ms18_jan3_win2008.nasl

Version: Revision: 1.4

Type: local

Agent: windows

Published: 2018/01/04

Modified: 2018/02/15

Dependencies: 93962, 57033, 13855

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Patch Publication Date: 2018/01/03

Vulnerability Publication Date: 2018/01/03

Reference Information

CVE: CVE-2018-0741, CVE-2018-0747, CVE-2018-0748, CVE-2018-0749, CVE-2018-0750

MSKB: 4056942, 4056613, 4056615, 4056759, 4056944, 4056941

MSFT: MS18-4056942, MS18-4056613, MS18-4056615, MS18-4056759, MS18-4056944, MS18-4056941