LanGuard reports



Supported OVAL Bulletins


More information on 2020 updates



ID:
CISEC:7128
Title:
oval:org.cisecurity:def:7128: Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:7128
CVE-2020-0621
Severity:
Low
Description:
A security feature bypass vulnerability exists in Windows 10 when third party filters are called during a password update. Successful exploitation of the vulnerability could allow a user to make use of a blocked password for their account. To exploit the vulnerability, an attacker would need have access and the current password for the target user. The update addresses how password filters are called during a password update.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7139
Title:
oval:org.cisecurity:def:7139: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7139
CVE-2020-0614
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7138
Title:
oval:org.cisecurity:def:7138: Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7138
CVE-2020-0636
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files. An attacker who successfully exploited the vulnerability could execute code with elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows Subsystem for Linux handles files.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7150
Title:
oval:org.cisecurity:def:7150: Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7150
CVE-2020-0641
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how the Windows Media Service handles file creation.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7153
Title:
oval:org.cisecurity:def:7153: Microsoft Graphics Components Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7153
CVE-2020-0607
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7126
Title:
oval:org.cisecurity:def:7126: Remote Desktop Web Access Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7126
CVE-2020-0637
Severity:
Low
Description:
An information disclosure vulnerability exists when Remote Desktop Web Access improperly handles credential information. An attacker who successfully exploited this vulnerability could obtain legitimate users' credentials. To exploit this vulnerability, an attacker would need access to a vulnerable server with the Remote Desktop Web Access role. The security update addresses the vulnerability by correcting how Remote Desktop Web Access handles credential information.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7124
Title:
oval:org.cisecurity:def:7124: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7124
CVE-2020-0632
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7156
Title:
oval:org.cisecurity:def:7156: Windows CryptoAPI Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:7156
CVE-2020-0601
Severity:
Low
Description:
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider. A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software. The security update addresses the vulnerability by ensuring that Windows CryptoAPI completely validates ECC certificates.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7121
Title:
oval:org.cisecurity:def:7121: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7121
CVE-2020-0608
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7149
Title:
oval:org.cisecurity:def:7149: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7149
CVE-2020-0628
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7145
Title:
oval:org.cisecurity:def:7145: Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7145
CVE-2020-0643
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how GDI+ handles memory addresses.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7137
Title:
oval:org.cisecurity:def:7137: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7137
CVE-2020-0626
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7133
Title:
oval:org.cisecurity:def:7133: Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7133
CVE-2020-0609
Severity:
Low
Description:
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP. The update addresses the vulnerability by correcting how RD Gateway handles connection requests.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7148
Title:
oval:org.cisecurity:def:7148: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7148
CVE-2020-0629
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7136
Title:
oval:org.cisecurity:def:7136: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7136
CVE-2020-0630
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7130
Title:
oval:org.cisecurity:def:7130: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7130
CVE-2020-0642
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7155
Title:
oval:org.cisecurity:def:7155: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7155
CVE-2020-0623
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7125
Title:
oval:org.cisecurity:def:7125: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7125
CVE-2020-0635
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows handles symbolic links.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7134
Title:
oval:org.cisecurity:def:7134: Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7134
CVE-2020-0610
Severity:
Low
Description:
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP. The update addresses the vulnerability by correcting how RD Gateway handles connection requests.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7144
Title:
oval:org.cisecurity:def:7144: Windows Common Log File System Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7144
CVE-2020-0639
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7132
Title:
oval:org.cisecurity:def:7132: Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7132
CVE-2020-0634
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7151
Title:
oval:org.cisecurity:def:7151: Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7151
CVE-2020-0612
Severity:
Low
Description:
A denial of service vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RD Gateway service on the target system to stop responding. To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides RD Gateway services. The update addresses the vulnerability by correcting how RD Gateway handles connection requests.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7127
Title:
oval:org.cisecurity:def:7127: Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7127
CVE-2020-0620
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft Cryptographic Services improperly handles files. An attacker could exploit the vulnerability to overwrite or modify a protected file leading to a privilege escalation. To exploit the vulnerability, an attacker would first require execution on the victim system. The security update addresses the vulnerability by addressing how Microsoft Cryptographic Services handles files.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7154
Title:
oval:org.cisecurity:def:7154: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7154
CVE-2020-0633
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7122
Title:
oval:org.cisecurity:def:7122: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7122
CVE-2020-0627
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7143
Title:
oval:org.cisecurity:def:7143: Windows Common Log File System Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7143
CVE-2020-0615
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7141
Title:
oval:org.cisecurity:def:7141: Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7141
CVE-2020-0622
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7123
Title:
oval:org.cisecurity:def:7123: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7123
CVE-2020-0624
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7135
Title:
oval:org.cisecurity:def:7135: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7135
CVE-2020-0625
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7146
Title:
oval:org.cisecurity:def:7146: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7146
CVE-2020-0631
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7142
Title:
oval:org.cisecurity:def:7142: Windows Search Indexer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7142
CVE-2020-0613
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Search Indexer properly handles objects in memory.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7147
Title:
oval:org.cisecurity:def:7147: Update Notification Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7147
CVE-2020-0638
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way the Update Notification Manager handles files. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Update Notification Manager handles files.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7140
Title:
oval:org.cisecurity:def:7140: Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7140
CVE-2020-0611
Severity:
Low
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7152
Title:
oval:org.cisecurity:def:7152: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7152
CVE-2020-0644
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft Windows implements predictable memory section names. An attacker who successfully exploited this vulnerability could run arbitrary code as system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application designed to elevate privileges. The update addresses the vulnerability by correcting how Windows assigns memory to specific processes.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7129
Title:
oval:org.cisecurity:def:7129: Microsoft Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7129
CVE-2020-0616
Severity:
Low
Description:
A denial of service vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would allow an attacker to overwrite system files. The update addresses the vulnerability by correcting ACLs to system files.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7131
Title:
oval:org.cisecurity:def:7131: Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7131
CVE-2020-0617
Severity:
Low
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Virtual PCI on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by properly validating input.
Applies to:
Created:
2020-02-14
Updated:
2020-02-14

ID:
CISEC:7173
Title:
oval:org.cisecurity:def:7173: Adobe Photoshop CC versions before 20.0.8 and 21.0.x before 21.0.2 have a memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:7173
Severity:
Low
Description:
Adobe Photoshop CC versions before 20.0.8 and 21.0.x before 21.0.2 have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Photoshop
Created:
2020-01-29
Updated:
2020-02-14

ID:
CISEC:7164
Title:
oval:org.cisecurity:def:7164: Multiple vulnerabilities on Adobe Acrobat and Reader versions, 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and ...
Type:
Software
Bulletins:
CISEC:7164
Severity:
Low
Description:
Adobe Acrobat and Reader versions, 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have a heap overflow vulnerability (CVE-2019-16451); have a buffer error vulnerability (CVE-2019-16462); have a security bypass vulnerability (CVE-2019-16453); have an out-of-bounds write vulnerability (CVE-2019-16450, CVE-2019-16454); have an use after free vulnerability (CVE-2019-16445, CVE-2019-16448, CVE-2019-16452, CVE-2019-16459, CVE-2019-16464); have an untrusted pointer dereference vulnerability (CVE-2019-16446, CVE-2019-16455, CVE-2019-16460, CVE-2019-16463). Successful exploitation could lead to arbitrary code execution. Adobe Acrobat and Reader versions, 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have a binary planting (default folder privilege escalation) vulnerability (CVE-2019-16444). Successful exploitation could lead to privilege escalation. Adobe Acrobat and Reader versions, 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an out-of-bounds read vulnerability (CVE-2019-16449, CVE-2019-16456, CVE-2019-16457, CVE-2019-16458, CVE-2019-16461, CVE-2019-16465). Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2020-01-27
Updated:
2020-02-14

ID:
CISEC:7163
Title:
oval:org.cisecurity:def:7163: Microsoft Browser Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:7163
CVE-2019-1220
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Microsoft Browsers fail to validate the correct Security Zone of requests for specific URLs, aka 'Microsoft Browser Security Feature Bypass Vulnerability'.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2020-01-23
Updated:
2020-02-14

ID:
CISEC:7162
Title:
oval:org.cisecurity:def:7162: Microsoft Browser Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:7162
CVE-2019-1357
Severity:
Low
Description:
A spoofing vulnerability exists when Microsoft Browsers improperly handle browser cookies, aka 'Microsoft Browser Spoofing Vulnerability'.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2020-01-23
Updated:
2020-02-14

ID:
CISEC:7158
Title:
oval:org.cisecurity:def:7158: Adobe Bridge CC versions 9.1 and earlier have a memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:7158
Severity:
Low
Description:
Adobe Bridge CC versions 9.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Bridge
Created:
2020-01-21
Updated:
2020-02-14

ID:
CISEC:7157
Title:
oval:org.cisecurity:def:7157: Adobe Bridge CC version 9.0.2 and earlier versions have an out of bound read vulnerability
Type:
Software
Bulletins:
CISEC:7157
Severity:
Low
Description:
Adobe Bridge CC version 9.0.2 and earlier versions have an out of bound read vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
Applies to:
Adobe Bridge
Created:
2020-01-21
Updated:
2020-02-14

ID:
CISEC:7160
Title:
oval:org.cisecurity:def:7160: VBScript Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7160
CVE-2019-1208
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2020-01-21
Updated:
2020-02-14

ID:
CISEC:6827
Title:
oval:org.cisecurity:def:6827: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6827
CVE-2019-1469
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6840
Title:
oval:org.cisecurity:def:6840: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6840
CVE-2019-1474
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6842
Title:
oval:org.cisecurity:def:6842: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6842
CVE-2019-1472
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6836
Title:
oval:org.cisecurity:def:6836: Windows OLE Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6836
CVE-2019-1484
Severity:
Low
Description:
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code. To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file or a program, causing Windows to execute arbitrary code. The update addresses the vulnerability by correcting how Windows OLE validates user input.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6844
Title:
oval:org.cisecurity:def:6844: Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6844
CVE-2019-1471
Severity:
Low
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6833
Title:
oval:org.cisecurity:def:6833: Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6833
CVE-2019-1453
Severity:
Low
Description:
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding. To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides Remote Desktop Protocol (RDP) services. The update addresses the vulnerability by correcting how RDP handles connection requests.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6830
Title:
oval:org.cisecurity:def:6830: Windows Printer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6830
CVE-2019-1477
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers. An authenticated attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows Printer Service validates file paths.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6843
Title:
oval:org.cisecurity:def:6843: Win32k Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6843
CVE-2019-1468
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit this vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a user to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6826
Title:
oval:org.cisecurity:def:6826: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6826
CVE-2019-1465
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6837
Title:
oval:org.cisecurity:def:6837: Microsoft Defender Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6837
CVE-2019-1488
Severity:
Low
Description:
A security feature bypass vulnerability exists when Microsoft Defender improperly handles specific buffers. An attacker could exploit the vulnerability to trigger warnings and false positives when no threat is present. To exploit the vulnerability, an attacker would first require execution permissions on the victim system. The security update addresses the vulnerability by ensuring Microsoft Defender properly handles these buffers.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6841
Title:
oval:org.cisecurity:def:6841: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6841
CVE-2019-1458
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6839
Title:
oval:org.cisecurity:def:6839: Windows Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6839
CVE-2019-1470
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. An attacker who successfully exploited the vulnerability could gain access to information on the Hyper-V host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6831
Title:
oval:org.cisecurity:def:6831: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6831
CVE-2019-1466
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6828
Title:
oval:org.cisecurity:def:6828: Windows Media Player Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6828
CVE-2019-1480
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. To exploit this vulnerability, an attacker would have to log on to an affected system and open a specifically crafted file. The update addresses the vulnerability by correcting how Windows Media Player handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6834
Title:
oval:org.cisecurity:def:6834: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6834
CVE-2019-1467
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6832
Title:
oval:org.cisecurity:def:6832: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6832
CVE-2019-1476
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6829
Title:
oval:org.cisecurity:def:6829: Windows Media Player Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6829
CVE-2019-1481
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. To exploit this vulnerability, an attacker would have to log on to an affected system and open a specifically crafted file. The update addresses the vulnerability by correcting how Windows Media Player handles objects in memory.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6835
Title:
oval:org.cisecurity:def:6835: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6835
CVE-2019-1483
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Server handles junctions.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23

ID:
CISEC:6838
Title:
oval:org.cisecurity:def:6838: Windows COM Server Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6838
CVE-2019-1478
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how the Windows COM Server creates COM objects.
Applies to:
Created:
2020-01-17
Updated:
2020-01-23