KB5001389: Windows Server 2008 Security Update (Apr 2021)

high Nessus Plugin ID 148480

Synopsis

The remote host is missing one or more security updates.

Description

The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities:

- Microsoft Internet Messaging API Remote Code Execution Vulnerability (CVE-2021-27089)

- Windows Kernel Information Disclosure Vulnerability (CVE-2021-27093, CVE-2021-28309)

- Windows Media Video Decoder Remote Code Execution Vulnerability (CVE-2021-27095, CVE-2021-28315)

- Windows Installer Spoofing Vulnerability (CVE-2021-26413)

- Windows Installer Elevation of Privilege Vulnerability (CVE-2021-26415, CVE-2021-28440)

- Microsoft Windows Codecs Library Information Disclosure Vulnerability (CVE-2021-28317)

- Windows GDI+ Information Disclosure Vulnerability (CVE-2021-28318)

- Windows DNS Information Disclosure Vulnerability (CVE-2021-28323, CVE-2021-28328)

- Remote Procedure Call Runtime Remote Code Execution Vulnerability (CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434)

- Windows GDI+ Remote Code Execution Vulnerability (CVE-2021-28348, CVE-2021-28349, CVE-2021-28350)

- Windows Installer Information Disclosure Vulnerability (CVE-2021-28437)

- Windows TCP/IP Driver Denial of Service Vulnerability (CVE-2021-28439)

- Windows Console Driver Denial of Service Vulnerability (CVE-2021-28443)

- Windows Network File System Remote Code Execution Vulnerability (CVE-2021-28445)
- Windows Portmapping Information Disclosure Vulnerability (CVE-2021-28446)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Microsoft has released the following security updates to address this issue:
- KB5001332
- KB5001389

See Also

https://support.microsoft.com/en-us/help/5001332

https://support.microsoft.com/en-us/help/5001389

Plugin Details

Severity: High

ID: 148480

File Name: smb_nt_ms21_apr_5001389.nasl

Version: 1.10

Type: local

Agent: windows

Published: 4/13/2021

Updated: 5/10/2022

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure

Risk Information

CVSS Score Source: CVE-2021-27095

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/13/2021

Vulnerability Publication Date: 3/30/2021

Reference Information

CVE: CVE-2021-26413, CVE-2021-26415, CVE-2021-27089, CVE-2021-27093, CVE-2021-27095, CVE-2021-28309, CVE-2021-28315, CVE-2021-28317, CVE-2021-28318, CVE-2021-28323, CVE-2021-28327, CVE-2021-28328, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28348, CVE-2021-28349, CVE-2021-28350, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434, CVE-2021-28437, CVE-2021-28439, CVE-2021-28440, CVE-2021-28443, CVE-2021-28445, CVE-2021-28446

MSKB: 5001332, 5001389

MSFT: MS21-5001332, MS21-5001389

IAVA: 2021-A-0168-S, 2021-A-0171-S