

Rewterz Threat Advisory – Adobe Flash Player Security Bypass Vulnerability
September 12, 2018
Rewterz Threat Advisory – Microsoft Windows Server 2016 / Windows 10 Multiple Vulnerabilities
September 12, 2018
Rewterz Threat Advisory – Adobe Flash Player Security Bypass Vulnerability
September 12, 2018
Rewterz Threat Advisory – Microsoft Windows Server 2016 / Windows 10 Multiple Vulnerabilities
September 12, 2018Multiple vulnerabilities have been reported in Microsoft Windows Server 2012, Microsoft Windows RT 8.1, and Microsoft Windows 8.1 and updates are available.
IMPACT: HIGH
PUBLISH DATE: 12-09-2018
OVERVIEW
Multiple vulnerabilities have been reported in Microsoft Windows Server 2012, Microsoft Windows RT 8.1, and Microsoft Windows 8.1, which can be exploited to cause a number of inconveniences including denial of service and security bypass leading to exposure of sensitive information. The vendor has released multiple updates to fix these vulnerabilities.
ANALYSIS
Many of these vulnerabilities when exploited may lead to system access, DoS, Privilege escalation, Exposure of sensitive information and Security Bypass. Local users with malicious intent may expose sensitive information or gain elevated privileges.
Similarly, malicious users in a guest virtual machine may cause a DoS (Denial of Service), or expose sensitive data and bypass certain security restrictions. Malicious people can exploit these vulnerabilities to compromise a vulnerable system.
A number of CVE references are associated with the updates, whose descriptions are not available at the time of creation of this advisory.
These include:
CVE-2018-8455
CVE-2018-8271
CVE-2018-8434
CVE-2018-8446
CVE-2018-8420
CVE-2018-8442
CVE-2018-8443
CVE-2018-8444
CVE-2018-8475
CVE-2018-8424
CVE-2018-8392
CVE-2018-8393
CVE-2018-8410
CVE-2018-8468
CVE-2018-8332
CVE-2018-8419
CVE-2018-8438
CVE-2018-8440
CVE-2018-8433
CVE-2018-8439
CVE-2018-8335
Apart from these, CVE-2018-5391 is identified as a Linux kernel, versions 3.9+ vulnerability. An attacker may cause a denial of service condition by sending specially crafted IP fragments.
AFFECTED PRODUCTS
Microsoft Windows Server 2012
Microsoft Windows RT 8.1
Microsoft Windows 8.1
UPDATES
Update the following versions as suggested:
- Windows 8.1 for 32-bit systems (KB4457143)
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457143
- Windows RT 8.1 (KB4457129):
Apply update (Security updates for Windows RT 8.1 are available via e.g. Windows Update or Windows Update Catalog only.)
- Windows 8.1 for x64-based systems (KB4457129):
- Windows Server 2012 R2 (KB4457129):
- Windows Server 2012 R2 (Server Core installation) (KB4457129):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457129
- Windows 8.1 for 32-bit systems (KB4457129):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457129
- Windows Server 2012 (KB4457135):
- Windows Server 2012 (Server Core installation) (KB4457135):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457135
- Windows Server 2012 (KB4457140):
- Windows Server 2012 (Server Core installation) (KB4457140):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457140
- Windows 8.1 for x64-based systems (KB4457143):
- Windows Server 2012 R2 (KB4457143):
- Windows Server 2012 R2 (Server Core installation) (KB4457143):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457143
It is recommended to update the products you’re using, if any, as soon as possible.
If you think you’re the victim of a cyber-attack, immediately send an email to info@rewterz.com.