

Rewterz Threat Advisory – CVE-2018- 8416 – Microsoft .NET core security bypass vulnerability
November 15, 2018
Rewterz Threat Advisory – CVE-2018-18559 – Linux Kernel “packet_do_bind()” Privilege Escalation Vulnerability
November 16, 2018
Rewterz Threat Advisory – CVE-2018- 8416 – Microsoft .NET core security bypass vulnerability
November 15, 2018
Rewterz Threat Advisory – CVE-2018-18559 – Linux Kernel “packet_do_bind()” Privilege Escalation Vulnerability
November 16, 2018Multiple vulnerabilities have been reported in Microsoft Windows Server 2008 and Windows 7, causing remote code execution, privilege escalation and information disclosure.
IMPACT: HIGH
PUBLISH DATE: 11-15-2018
OVERVIEW
Multiple vulnerabilities have been reported in Microsoft Windows Server 2008 and Microsoft Windows 7, which can be exploited by malicious, local users to disclose sensitive information, bypass certain security restrictions, and gain escalated privileges and by malicious people to compromise a vulnerable system.
ANALYSIS
CVE-2018-8544
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka “Windows VBScript Engine Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8450
A remote code execution vulnerability exists when Windows Search handles objects in memory, aka “Windows Search Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8550
An elevation of privilege exists in Windows COM Aggregate Marshaler, aka “Windows COM Elevation of Privilege Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8407
An information disclosure vulnerability exists when “Kernel Remote Procedure Call Provider” driver improperly initializes objects in memory, aka “MSRPC Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8589
An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka “Windows Win32k Elevation of Privilege Vulnerability.” This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.
CVE-2018-8476
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory, aka “Windows Deployment Services TFTP Server Remote Code Execution Vulnerability.” This affects Windows Server 2012 R2, Windows Server 2008, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows Server 2008 R2, Windows 10 Servers.
CVE-2018-8256
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka “Microsoft PowerShell Remote Code Execution Vulnerability.” This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1.
CVE-2018-8565
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka “Win32k Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8563
An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka “DirectX Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2008 R2.
CVE-2018-8415
A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka “Microsoft PowerShell Tampering Vulnerability.” This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8553
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka “Microsoft Graphics Components Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10.
CVE-2018-8408
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory, aka “Windows Kernel Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2018-8471
An elevation of privilege vulnerability exists in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory, aka “Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability.” This affects Windows Server 2016, Windows 10, Windows 8.1, Windows 7, Windows Server 2019.
CVE-2018-8562
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka “Win32k Elevation of Privilege Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
AFFECTED PRODUCTS
- Microsoft Windows Server 2008
- Microsoft Windows 7
UPDATES
Update the following versions as suggested:
- Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (KB4467106):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467106
- Windows 7 for x64-based Systems Service Pack 1 (KB4467106):
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (KB4467106):
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB4467106):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467106
- Windows 7 for 32-bit Systems Service Pack 1 (KB4467106):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467106
- Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (KB4467107):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467107
- Windows 7 for x64-based Systems Service Pack 1 (KB4467107):
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (KB4467107):
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB4467107):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467107
- Windows 7 for 32-bit Systems Service Pack 1 (KB4467107):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467107
- Windows Server 2008 for Itanium-Based Systems Service Pack 2 (KB4467706):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467706
- Windows Server 2008 for Itanium-Based Systems Service Pack 2 (KB4467700):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467700
- Windows Server 2008 for x64-based Systems Service Pack 2 (KB4467700):
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (KB4467700):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467700
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (KB4467700):
- Windows Server 2008 for 32-bit Systems Service Pack 2 (KB4467700):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467700
- Windows Server 2008 for x64-based Systems Service Pack 2 (KB4467706):
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (KB4467706):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467706
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (KB4467706):
- Windows Server 2008 for 32-bit Systems Service Pack 2 (KB4467706):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467706
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (KB3020369):
- Windows Server 2008 for 32-bit Systems Service Pack 2 (KB3020369):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3020369
- Windows Server 2008 for Itanium-Based Systems Service Pack 2 (KB3020369):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3020369
- Windows Server 2008 for x64-based Systems Service Pack 2 (KB3020369):
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (KB3020369):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3020369
- Windows 7 for x64-based Systems Service Pack 1 (KB3177467):
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (KB3177467):
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB3177467):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3177467
- Windows 7 for 32-bit Systems Service Pack 1 (KB3177467):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3177467
- Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (KB3177467):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3177467
It is recommended to update the products you’re using, if any, as soon as possible.
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.