Latest Advisories Notable Vulnerabilities

  • February 2018 - Microsoft Releases 50 Security Patches
     Advisory Date:  13 February 2018
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses 50 vulnerabilities in its February batch of patches. Trend Micro Deep Security covers the following:

    • CVE-2018-0844 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
      Risk Rating: Important

      This elevation of privilege vulnerability is exploited when an attacker who can log on to the system runs specially crafted code. The security update corrects how the Windows Common Log File System (CLFS) handles objects in memory.


    • CVE-2018-0846 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
      Risk Rating: Important

      This elevation of privilege vulnerability is exploited when an attacker who can log on to the system runs specially crafted code. The security update corrects how the Windows Common Log File System (CLFS) handles objects in memory.


    • CVE-2018-0825 - StructuredQuery Remote Code Execution Vulnerability
      Risk Rating: Critical

      The vulnerability exists in StructuredQuery when it fails to handle objects in memory. Attackers looking to exploit this remote code execution vulnerability will have to find a way for a logged on user to execute a specially crafted file.


    • CVE-2018-0860 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      The vulnerability exists in the way Microsoft Edge handles objects in memory. This remote code execution vulnerability, when exploited successfully, gives attackers rights equal to the rights of the logged on user.


    • CVE-2018-0840 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      This remote code execution vulnerability exists in Microsoft browsers' scripting engines. In particular, the bulnerability lies in the way said browsers handles objects in memory.


    • CVE-2018-0742 - Windows Kernel Elevation of Privilege Vulnerability
      Risk Rating: Important

      This elevation of privilege vulnerability is addressed in the current security update from Microsoft. This vulnerbaility exists in the way Windows Kernel handles objects in memory.


    • CVE-2018-0756 - Windows Kernel Elevation of Privilege Vulnerability
      Risk Rating: Important

      This elevation of privilege vulnerability is addressed in the current security update from Microsoft. This vulnerbaility exists in the way Windows Kernel handles objects in memory.


    • CVE-2018-0842 - Windows Kernel Elevation of Privilege Vulnerability
      Risk Rating: Important

      This elevation of privilege vulnerability is addressed in the current security update from Microsoft. This vulnerbaility exists in the way Windows Kernel handles objects in memory.


    • CVE-2018-0834 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      The vulnerability exists in the way Microsoft Edge handles objects in memory. This remote code execution vulnerability, when exploited successfully, gives attackers rights equal to the rights of the logged on user.


    • CVE-2018-0838 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      The vulnerability exists in the way Microsoft Edge handles objects in memory. This remote code execution vulnerability, when exploited successfully, gives attackers rights equal to the rights of the logged on user.


    • CVE-2018-0841 - Microsoft Excel Remote Code Execution Vulnerability
      Risk Rating: Important

      This remote code execution vulnerability in Microsoft Excel exists in the way it handles objects in memory. Attackers looking to exploit this vulnerability must convince a target machine's user to open a specially crafted file.


    • CVE-2018-0837 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      The vulnerability exists in the way Microsoft Edge handles objects in memory. This remote code execution vulnerability, when exploited successfully, gives attackers rights equal to the rights of the logged on user.


    • CVE-2018-0835 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      The vulnerability exists in the way Microsoft Edge handles objects in memory. This remote code execution vulnerability, when exploited successfully, gives attackers rights equal to the rights of the logged on user.


    • CVE-2018-0858 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      This remote code execution vulnerability exists in the ChakraCore scripting engine. It is resolved by the update that modifies the way the said scripting engine handles objects in memory.


    • CVE-2018-0866 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      This remote code execution vulnerability exists in Internet Explorer. It is resolved by the update that modifies the way the said scripting engine handles objects in memory.


  • January 2018 - Microsoft Releases 56 Security Patches
     Advisory Date:  10 January 2018
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses 56 vulnerabilities in its January batch of patches.

    • CVE-2018-0804 - Microsoft Word Remote Code Execution Vulnerability
      Risk Rating: Low

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0805 - Microsoft Word Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0806 - Microsoft Word Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0807 - Microsoft Word Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0812 - Microsoft Word Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0818 - Scripting Engine Security Feature Bypass
      Risk Rating: Important

      A security feature bypass vulnerability exists in the Microsoft Chakra scripting engine that allows Control Flow Guard (CFG) to be bypassed. An attacker could use the CFG bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code on a target system. The security update addresses the CFG bypass vulnerability by helping to ensure that the Microsoft Chakra scripting engine properly handles accessing memory.


    • CVE-2018-0819 - Spoofing Vulnerability in Microsoft Office for MAC
      Risk Rating: Important

      A spoofing vulnerability exists when Microsoft Outlook for MAC does not properly handle the encoding and display of email addresses. This improper handling and display may cause antivirus or antispam scanning to not work as intended. The security update addresses the vulnerability by correcting how Outlook for MAC displays encoded email addresses.


    • CVE-2018-0746 - Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.


    • CVE-2018-0747 - Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.


    • CVE-2018-0748 - Windows Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly enforces permissions.


    • CVE-2018-0748 - Windows Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly enforces permissions.


    • CVE-2018-0751 - Windows Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly enforces permissions.


    • CVE-2018-0752 - Windows Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly enforces permissions.


    • CVE-2018-0753 - Windows IPSec Denial of Service Vulnerability
      Risk Rating: Important

      A denial of service vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. The security update addresses the vulnerability by correcting how Windows handles objects in memory.


    • CVE-2018-0750 - Windows GDI Information Disclosure Vulnerability
      Risk Rating: Important

      A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


    • CVE-2018-0773 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0774 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0781 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0784 - ASP.NET Core Elevation Of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when a ASP.NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests. An attacker who successfully exploited this vulnerability could perform content injection attacks and run script in the security context of the logged-on user. The security update addresses the vulnerability by correcting the ASP.NET Core project templates.


    • CVE-2018-0786 - .NET Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass vulnerability exists when Microsoft .NET Framework (and .NET Core) components do not completely validate certificates. An attacker could present a certificate that is marked invalid for a specific use, but the component uses it for that purpose. The security update addresses the vulnerability by helping to ensure that .NET Framework (and .NET Core) components completely validate certificates.


    • CVE-2018-0788 - OpenType Font Driver Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. The security update addresses the vulnerability by correcting how ATMFD.dll handles objects in memory.


    • CVE-2018-0795 - Microsoft Office Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2018-0797 - Microsoft Word Memory Corruption Vulnerability
      Risk Rating: Critical

      An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by changing the way Microsoft Office software handles RTF content.


    • CVE-2018-0799 - Microsoft Access Tampering Vulnerability
      Risk Rating: Important

      A cross-site-scripting (XSS) vulnerability exists when Microsoft Access does not properly sanitize inputs to image fields edited within Design view. An attacker could exploit the vulnerability by sending a specially crafted file to a victim, or by hosting the file on a web server. The security update addresses the vulnerability by helping to ensure that Microsoft Access properly sanitizes image field values.


    • CVE-2018-0802 - Microsoft Office Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0801 - Microsoft Office Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


    • CVE-2018-0803 - Microsoft Edge Elevation of Privilege Vulnerability
      Risk Rating: Risk Rating: Low

      An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain. The security update addresses the vulnerability by helping to ensure that cross-domain policies are properly enforced in Microsoft Edge.


    • CVE-2018-0800 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Critical

      An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


    • CVE-2018-0741 - Microsoft Color Management Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the way that the Color Management Module (ICM32.dll) handles objects in memory. This vulnerability allows an attacker to retrieve information to bypass usermode ASLR (Address Space Layout Randomization) on a targeted system. The security update addresses the vulnerability by correcting how Color Management Module handles objects in memory.


    • CVE-2018-0743 - Windows Subsystem for Linux Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.


    • CVE-2018-0744 - Windows Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


    • CVE-2018-0745 - Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.


    • CVE-2018-0749 - SMB Server Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server when an attacker with valid credentials attempts to open a specially crafted file over the SMB protocol on the same machine. The update addresses the vulnerability by correcting how Windows SMB Server handles such specially crafted files.


    • CVE-2018-0754 - OpenType Font Driver Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. The update addresses the vulnerability by correcting how ATMFD.dll handles objects in memory.


    • CVE-2018-0758 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0762 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0766 - Microsoft Edge Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by modifying how Microsoft Edge PDF Reader handles objects in memory.


    • CVE-2018-0767 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Critical

      An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


    • CVE-2018-0768 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0764 - .NET and .NET Core Denial Of Service Vulnerability
      Risk Rating: Important

      A Denial of Service vulnerability exists when .NET, and .NET core, improperly process XML documents. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. The update addresses the vulnerability by correcting how a .NET, and .NET core, applications handles XML document processing


    • CVE-2018-0769 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0770 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0772 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0775 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0776 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0777 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0778 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2018-0780 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Moderate

      An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


    • CVE-2018-0785 - ASP.NET Core Cross Site Request Forgery Vulnerabilty
      Risk Rating: Moderate

      A Cross Site Request Forgery (CSRF) vulnerability exists when a ASP.NET Core web application is created using vulnerable project templates. An attacker who successfully exploited this vulnerability could change the recovery codes associated with the victim's user account without his/her consent. The update corrects the ASP.NET Core project templates.


    • CVE-2018-0789 - Microsoft SharePoint Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


    • CVE-2018-0790 - Microsoft SharePoint Cross Site Scripting Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


    • CVE-2018-0791 - Microsoft Outlook Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages. An attacker who successfully exploited the vulnerability could take control of an affected system. The security update addresses the vulnerability by correcting the way that Microsoft Outlook parses specially crafted email messages.


    • CVE-2018-0792 - Microsoft Word Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2018-0793 - Microsoft Outlook Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages. An attacker who successfully exploited the vulnerability could take control of an affected system. The security update addresses the vulnerability by correcting the way that Microsoft Outlook parses specially crafted email messages.


    • CVE-2018-0794 - Microsoft Word Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2018-0796 - Microsoft Excel Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2018-0798 - Microsoft Office Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by removing Equation Editor functionality.


  • December 2017 - Microsoft Releases 34 Security Patches
     Advisory Date:  13 December 2017
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its December batch of patches, several of which addresses remote code execution vulnerabilities.

    • CVE-2017-11885 - Windows RRAS Service Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.


    • CVE-2017-11889 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11890 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11893 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11895 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11899 - Microsoft Windows Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass exists when Device Guard incorrectly validates an untrusted file. An attacker who successfully exploited this vulnerability could make an unsigned file appear to be signed. The update addresses the vulnerability by correcting how Device Guard handles untrusted files.


    • CVE-2017-11901 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11903 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11906 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Low

      An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11908 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11909 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11910 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11911 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11912 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11913 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11914 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11918 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11927 - Microsoft Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL. This could potentially result in the disclosure of sensitive information to a malicious site. The security update addresses the vulnerability by correcting how the Windows its:// protocol handler determines the zone of a request.


    • CVE-2017-11930 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11932 - Microsoft Exchange Spoofing Vulnerability
      Risk Rating: Important

      A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests. An attacker who successfully exploited the vulnerability could perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information. The security update addresses the vulnerability by correcting how OWA validates web requests.


    • CVE-2017-11937 - Microsoft Malware Protection Engine Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. The update addresses the vulnerability by correcting the manner in which the Microsoft Malware Protection Engine scans specially crafted files.


    • CVE-2017-11886 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11887 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Low

      An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11888 - Microsoft Edge Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


    • CVE-2017-11894 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11907 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11905 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11916 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.


    • CVE-2017-11919 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


    • CVE-2017-11934 - Microsoft PowerPoint Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. The update addresses the vulnerability by changing the way certain functions handle objects in memory.


    • CVE-2017-11935 - Microsoft Excel Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory.


    • CVE-2017-11936 - Microsoft SharePoint Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


    • CVE-2017-11939 - Microsoft Office Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Microsoft Outlook fails to enforce copy/paste permissions on DRM-protected emails. An attacker who successfully exploited the vulnerability could potentially extract plaintext content from DRM-protected draft emails. The security update addresses the vulnerability by correcting how Microsoft Outlook enforces DRM copy/paste permissions.


    • CVE-2017-11940 - Microsoft Malware Protection Engine Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. The update addresses the vulnerability by correcting the manner in which the Microsoft Malware Protection Engine scans specially crafted files.


  • November 2017 - Microsoft Releases 52 Security Patches
     Advisory Date:  16 November 2017
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its November batch of patches.

    • CVE-2017-8700 - ASP.NET Core Information Disclosure Vulnerability
      Risk Rating: Moderate

      A n information disclosure vulnerability exists in ASP.NET Core that allows bypassing Cross-origin Resource Sharing (CORS) configurations. An attacker who successfully exploited the vulnerability could retrieve content, that is normally restricted, from a web application. The security update addresses the vulnerability by enforcing CORS configuration to prevent its bypass.


    • CVE-2017-11770 - .NET CORE Denial Of Service Vulnerability
      Risk Rating: Important

      A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Core web application. The update addresses the vulnerability by correcting how the .NET Core web application handles parsing certificate data.


    • CVE-2017-11788 - Windows Search Denial of Service Vulnerability
      Risk Rating: Important

      A denial of service vulnerability exists when Windows Search improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system. The security update addresses the vulnerability by correcting how Windows Search handles objects in memory.


    • CVE-2017-11791 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Low

      An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


    • CVE-2017-11803 - Microsoft Edge Information Disclosure Vulnerability
      Risk Rating: Low

      An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


    • CVE-2017-11827 - Microsoft Browser Memory Corruption Vulnerability
      Risk Rating: Low

      A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.


    • CVE-2017-11830 - Device Guard Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass exists when Device Guard incorrectly validates an untrusted file. An attacker who successfully exploited this vulnerability could make an unsigned file appear to be signed. The update addresses the vulnerability by correcting how Device Guard handles untrusted files.


    • CVE-2017-11831 - Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.


    • CVE-2017-11832 - Windows EOT Font Engine Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. The security update addresses the vulnerability by correcting how the Windows EOT font engine handles embedded fonts.


    • CVE-2017-11833 - Microsoft Edge Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the way that Microsoft Edge handles cross-origin requests. An attacker who successfully exploited this vulnerability could determine the origin of all webpages in the affected browser. The security update addresses the vulnerability by correcting how Microsoft Edge handles cross-origin requests.


    • CVE-2017-11837 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11839 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11841 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11844 - Microsoft Edge Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


    • CVE-2017-11845 - Microsoft Edge Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


    • CVE-2017-11851 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


    • CVE-2017-11856 - Internet Explorer Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11861 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11862 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11863 - Microsoft Edge Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass vulnerability exists in Microsoft Edge when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents. An attacker who exploited the bypass could trick a user into loading a page containing malicious content. The security update addresses the bypass by correcting how the Edge CSP validates documents.


    • CVE-2017-11870 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11872 - Microsoft Edge Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass vulnerability exists when Microsoft Edge improperly handles redirect requests. The vulnerability allows Microsoft Edge to bypass Cross-Origin Resource Sharing (CORS) redirect restrictions, and to follow redirect requests that should otherwise be ignored. The security update addresses the vulnerability by modifying how affected Microsoft Edge handles redirect requests.


    • CVE-2017-11873 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11874 - Microsoft Edge Security Feature Bypass Vulnerability
      Risk Rating: Low

      A security feature bypass vulnerability exists in Microsoft Edge as a result of how memory is accessed in code compiled by the Edge Just-In-Time (JIT) compiler that allows Control Flow Guard (CFG) to be bypassed. By itself, this CFG bypass vulnerability does not allow arbitrary code execution. However, an attacker could use the CFG bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code on a target system. The security update addresses the CFG bypass vulnerability by helping to ensure that Microsoft Edge properly handles accessing memory in code compiled by the Edge JIT compiler.


    • CVE-2017-11876 - Microsoft Project Server Elevation of Privilege Vulnerability
      Risk Rating: Moderate

      An elevation of privilege vulnerability exists in Microsoft Project when Microsoft Project Server does not properly manage user sessions. For this Cross-site Request Forgery(CSRF/XSRF) vulnerability to be exploited, the victim must be authenticated to (logged on) the target site. The update addresses the vulnerability by modifying how Microsoft Project Server manages user session authentication.


    • CVE-2017-11877 - Microsoft Excel Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. To successfully exploit the vulnerability, an attacker would have to embed a control in an Excel worksheet that specifies a macro should be run. The security update addresses the vulnerability by enforcing macro settings on Excel documents.


    • CVE-2017-11878 - Microsoft Excel Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2017-11768 - Windows Media Player Information Disclosure Vulnerability
      Risk Rating: Important

      An information vulnerability exists when Windows Media Player improperly discloses file information. To exploit the vulnerability, an attacker would have to log onto an affected system and run a specially crafted application. The update addresses the vulnerability by changing the way Windows Media Player discloses file information.


    • CVE-2017-11883 - ASP.NET Core Denial Of Service Vulnerability
      Risk Rating: Important

      A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a ASP.NET Core web application. The update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.


    • CVE-2017-11884 - Microsoft Office Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2017-11834 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Low

      An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


    • CVE-2017-11835 - Windows EOT Font Engine Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. The security update addresses the vulnerability by correcting how the Windows EOT font engine handles embedded fonts.


    • CVE-2017-11836 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11838 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11840 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11843 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11842 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.


    • CVE-2017-11846 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11847 - Windows Kernel Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


    • CVE-2017-11848 - Internet Explorer Information Disclosure Vulnerability
      Risk Rating: Moderate

      An information disclosure vulnerability exists when Internet Explorer improperly handles page content, which could allow an attacker to detect the navigation of the user leaving a maliciously crafted page. The security update addresses the vulnerability by changing how page content is handled by Internet Explorer.


    • CVE-2017-11849 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.


    • CVE-2017-11850 - Microsoft Graphics Component Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.


    • CVE-2017-11852 - Windows GDI Information Disclosure Vulnerability
      Risk Rating: Important

      A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


    • CVE-2017-11853 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.


    • CVE-2017-11855 - Internet Explorer Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11854 - Microsoft Word Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2017-11866 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11858 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.


    • CVE-2017-11869 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11871 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Moderate

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11879 - ASP.NET Core Elevation Of Privilege Vulnerability
      Risk Rating: Important

      An open redirect vulnerability exists in ASP.NET Core that could lead to elevation of privilege. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL, and convince the user to click the link. The update addresses the vulnerability by correcting how ASP.NET Core handles open redirect requests.


    • CVE-2017-11880 - Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.


    • CVE-2017-11882 - Microsoft Office Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how the affected Office component handles objects in memory.


  • October 2017 - Microsoft Releases 66 Security Patches
     Advisory Date:  11 October 2017
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its October batch of patches. It also addresses one of several vulnerabilities found in WPA2 via issuing a patch for CVE-2017-13080

    • CVE-2017-8715 - Windows Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the local machine. The update addresses the vulnerability by correcting how PowerShell exposes functions and processes user supplied code.


    • CVE-2017-11823 - Microsoft Windows Security Feature Bypass
      Risk Rating: Important

      A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the local machine. The update addresses the vulnerability by correcting how PowerShell exposes functions and processes user supplied code.


    • CVE-2017-11790 - Internet Explorer Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by modifying how Internet Explorer handle objects in memory.


    • CVE-2017-11810 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11822 - Internet Explorer Memory Corruption Vulnerability
      Risk Rating: Moderate

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-11813 - Internet Explorer Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


    • CVE-2017-8726 - Microsoft Edge Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how affected Microsoft scripting engines handle objects in memory.


    • CVE-2017-11794 - Microsoft Edge Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by modifying how Microsoft Edge handle objects in memory.


    • CVE-2017-11816 - Windows GDI Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. The security update addresses the vulnerability by correcting how GDI handles memory addresses.


    • CVE-2017-11763 - Microsoft Graphics Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.


    • CVE-2017-11762 - Microsoft Graphics Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.


    • CVE-2017-11824 - Windows Graphics Component Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.


    • CVE-2017-8693 - Microsoft Graphics Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.


    • CVE-2017-8718 - Microsoft JET Database Engine Remote Code Execution Vulnerability
      Risk Rating: Important

      A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take control of an affected system. The security update addresses the vulnerability by modifying how the Microsoft JET Database Engine handles objects in memory.


    • CVE-2017-8717 - Microsoft JET Database Engine Remote Code Execution Vulnerability
      Risk Rating: Important

      A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take control of an affected system. The security update addresses the vulnerability by modifying how the Microsoft JET Database Engine handles objects in memory.


    • CVE-2017-11776 - Microsoft Outlook Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when Microsoft Outlook fails to establish a secure connection. An attacker who exploited the vulnerability could use it to obtain the email content of a user. The security update addresses the vulnerability by preventing Outlook from disclosing user email content.


    • CVE-2017-11775 - Microsoft Office SharePoint XSS Vulnerability
      Risk Rating: Important

      A cross-site scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


    • CVE-2017-11774 - Microsoft Outlook Security Feature Bypass Vulnerability
      Risk Rating: Important

      A security feature bypass vulnerability exists when Microsoft Office improperly handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary commands. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.


    • CVE-2017-11777 - Microsoft Office SharePoint XSS Vulnerability
      Risk Rating: Important

      A cross-site scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


    • CVE-2017-11826 - Microsoft Office Memory Corruption Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Office handles objects in memory.


    • CVE-2017-11825 - Microsoft Office Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory.


    • ADV170017 - Office Defense in Depth Update
      Risk Rating: Unknown

      Microsoft has released an update for Microsoft Office that provides enhanced security as a defense-in-depth measure.


    • CVE-2017-11786 - Skype for Business Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when Skype for Business fails to properly handle specific authentication requests. An authenticated attacker who successfully exploited this vulnerability could steal an authentication hash that can be reused elsewhere. The security update addresses the vulnerability by correcting how Skype for Business handles authentication requests.


    • CVE-2017-11820 - Microsoft Office SharePoint XSS Vulnerability
      Risk Rating: Important

      A cross-site scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


    • CVE-2017-11798 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11799 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Moderate

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11809 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way the scripting engine handle objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11796 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11797 - Scripting Engine Information Disclosure Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.


    • CVE-2017-11806 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11800 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11808 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11807 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11805 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11804 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11811 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11801 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.


    • CVE-2017-11802 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11812 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11821 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11793 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Moderate

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11792 - Scripting Engine Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


    • CVE-2017-11818 - Windows Storage Security Feature Bypass Vulnerability
      Risk Rating: Important

      An Security Feature bypass vulnerability exists in Microsoft Windows storage when it fails to validate an integrity-level check. An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level. The update addresses the vulnerability by correcting how Microsoft storage validates an integrity-level check.


    • ADV170016 - Windows Server 2008 Defense in Depth
      Risk Rating: Unknown

      Microsoft has released an update for Microsoft Windows Server 2008 that provides enhanced security as a defense-in-depth measure.


    • CVE-2017-11783 - Windows Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.


    • CVE-2017-11769 - TRIE Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in the way that certain Windows components handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


    • CVE-2017-11779 - Windows DNSAPI Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. The update addresses the vulnerability by modifying how Windows DNSAPI.dll handles DNS responses.


    • CVE-2017-11772 - Microsoft Search Information Disclosure Vulnerability
      Risk Rating: Important

      An Information disclosure vulnerability exists when Windows Search improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how Windows Search handles objects in memory.


    • CVE-2017-11771 - Windows Search Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. The security update addresses the vulnerability by correcting how Windows Search handles objects in memory.


    • CVE-2017-11784 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.


    • CVE-2017-11817 - Windows Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.


    • CVE-2017-11814 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


    • CVE-2017-11765 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


    • CVE-2017-11785 - Windows Kernel Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. The security update addresses the vulnerability by correcting how the Windows kernel handles emory addresses.


    • CVE-2017-8694 - Win32k Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The update addresses the vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.


    • CVE-2017-8689 - Win32k Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The update addresses the vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.


    • ADV170014 - Optional Windows NTLM SSO authentication changes
      Risk Rating: Unknown

      Microsoft is releasing an optional security enhancement to NT LAN Manager (NTLM), limiting which network resources various clients in the Windows 10 or the Windows Server 2016 operating systems can use NTLM Single Sign On(SSO) as an authentication method. When you deploy the new security enhancement with a Network Isolation Policy defining your organization's resources, attackers can no longer redirect a user to a malicious resource outside your organization to obtain the NTLM authentication messages. This new behavior is optional, and requires customers who wish to enable it to opt in via a Windows Registry Setting or other means described below.


    • CVE-2017-8727 - Windows Shell Memory Corruption Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory via the Microsoft Windows Text Services Framework. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how the Microsoft Windows Text Services Framework handles objects in memory.


    • CVE-2017-11819 - Windows Shell Remote Code Execution Vulnerability
      Risk Rating: Critical

      A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.


    • CVE-2017-11815 - Windows SMB Information Disclosure Vulnerability
      Risk Rating: Important

      An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. The security update addresses the vulnerability by correcting how Windows SMB Server handles authenticated requests.


    • CVE-2017-11782 - Windows SMB Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists in the default Windows SMB Server configuration which allows anonymous users to remotely access certain named pipes that are also configured to allow anonymous access to users who are logged on locally. An unauthenticated attacker who successfully exploits this configuration error could remotely send specially crafted requests to certain services that accept requests via named pipes. The update addresses the vulnerability by correcting the Windows SMB Server default configuration.


    • CVE-2017-11781 - Windows SMB Denial of Service Vulnerability
      Risk Rating: Important

      A denial of service vulnerability exists in the Microsoft Server Block Message (SMB) when an attacker sends specially crafted requests to the server. An attacker who exploited this vulnerability could cause the affected system to crash. The security update addresses the vulnerability by correcting the manner in which SMB handles specially crafted client requests.


    • CVE-2017-11780 - Windows SMB Remote Code Execution Vulnerability
      Risk Rating: Important

      A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. The security update addresses the vulnerability by correcting how SMBv1 handles these specially crafted requests.


    • CVE-2017-8703 - Windows Subsystem for Linux Denial of Service Vulnerability
      Risk Rating: Important

      A denial of service vulnerability exists when Windows Subsystem for Linux improperly handles objects in memory. An attacker who successfully exploited this vulnerability could cause a denial of service against the local system. The update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.


    • ADV170012 - Vulnerability in TPM could allow Security Feature Bypass
      Risk Rating: Critical

      A security vulnerability exists in certain Trusted Platform Module (TPM) chipsets. The vulnerability weakens key strength. It is important to note that this is a firmware vulnerability, and not a vulnerability in the operating system or a specific application. After you have installed software and/or firmware updates, you will need to re-enroll in any security services you are running to remediate those services.


    • CVE-2017-11829 - Windows Update Delivery Optimization Elevation of Privilege Vulnerability
      Risk Rating: Important

      An elevation of privilege vulnerability exists when the Windows Update Delivery Optimization does not properly enforce file share permissions. An attacker who successfully exploited the vulnerability could overwrite files that require higher privileges than what the attacker already has. The security update addresses the vulnerability by correcting how the Delivery Optimization services enforces permissions.
  • September 2017 - Microsoft Releases 82 Security Patches
     Advisory Date:  14 September 2017
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its September batch of patches:


  • CVE-2017-8597 | Microsoft Edge Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability when Microsoft Edge does not properly handle objects in memory. Attackers who successfuly exploit the vulnerability can obtain information to further compromise the user's system. The security update addresses the vulnerability by changing how Microsoft Edge handles objects in memory.


  • CVE-2017-8629 | Microsoft SharePoint XSS Vulnerability
  • Risk Rating: Important

    This security update resolves an elevation of privilege vulnerability when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. This update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.



  • CVE-2017-8630 | Microsoft Office Memory Corruption Vulnerability
  • Risk Rating: Important

    This security update resolves a remote code execution vulnerability in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory.



  • CVE-2017-8631 | Microsoft Office Memory Corruption Vulnerability
  • Risk Rating: Important

    This security update resolves a vulnerability the way JavaScript engines render when handling objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines handle objects in memory.



  • CVE-2017-8632 | Microsoft Office Memory Corruption Vulnerability
  • Risk Rating: Important

    This security update resolves a remote code execution vulnerability in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. This security update addresses the vulnerability by correcting how Microsoft Office handles files in memory.


  • CVE-2017-8675 | Win32k Elevation of Privilege Vulnerability
  • Risk Rating: Important

    This security update resolves an elevation of privilege vulnerability in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. This update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.


  • CVE-2017-8676| Windows GDI Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. The security update addresses the vulnerability by correcting how GDI handles memory addresses.



  • CVE-2017-8677| Win32k Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. This security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


  • CVE-2017-8678 | Win32k Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


  • CVE-2017-8679 | Windows Kernel Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. This update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


  • CVE-2017-8680 |Win32k Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. This security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


  • CVE-2017-8681 | Win32k Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. This security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


  • CVE-2017-8682 | Win32k Graphics Remote Code Execution Vulnerability
  • Risk Rating: Important

    A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected system. This security update addresses the vulnerabilities by correcting how the Windows font library handles embedded fonts.


  • CVE-2017-8683 | Win32k Graphics Information Disclosure Vulnerability
  • Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.





  • CVE-2017-8684 | Windows GDI Information Disclosure Vulnerability
    Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


  • CVE-2017-8685 | Windows GDI Information Disclosure Vulnerability
    Risk Rating: Important

    This security update resolves an information disclosure vulnerability when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.


  • CVE-2017-0250 | Microsoft JET Database Engine Remote Code Execution Vulnerability
    Risk Rating: Critical

    A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take complete control of an affected system. The update addresses the vulnerability by modifying how the Microsoft JET Database Engine handles objects in memory.


  • CVE-2017-8686 | Windows DHCP Server Remote Code Execution Vulnerability
    Risk Rating: Critical

    This security update resolves a memory corruption vulnerability in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could either run arbitrary code on the DHCP failover server or cause the DHCP service to become nonresponsive. The security update addresses the vulnerability by correcting how DHCP failover servers handle network packets.


  • CVE-2017-8687 | Win32k Information Disclosure Vulnerability
    Risk Rating: Important

    This security update resolves an Information disclosure vulnerability in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the memory address of a kernel object. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.


  • CVE-2017-8688 | Windows GDI Information Disclosure Vulnerability
    Risk Rating: Important

    This security update resolves an information disclosure vulnerability in the way that the Windows Graphics Device Interface (GDI ) handles objects in memory, allowing an attacker to retrieve information from a targeted system. The security update addresses the vulnerability by correcting how GDI handles memory addresses.


  • CVE-2017-9417 | Broadcom BCM43xx Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists when the Broadcom chipset in HoloLens improperly handles objects in memory. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The update addresses the vulnerability by correcting how the Broadcom chipset in HoloLens handles objects in memory.


  • ADV170013 | September 2017 Flash Security Update
    Risk Rating: Critical

    This security update addresses the following vulnerabilities, which are described in Adobe Security Bulletin APSB17-28: CVE-2017-11281, CVE-2017-11282.


  • CVE-2017-8744 | Microsoft Office Memory Corruption Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory.


  • CVE-2017-8745 | Microsoft SharePoint Cross Site Scripting Vulnerability
    Risk Rating: Important

    This security update addresses a cross-site scripting (XSS) vulnerability when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.


  • CVE-2017-8737 | Microsoft PDF Remote Code Execution Vulnerability
    Risk Rating: Moderate

    A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The update addresses the vulnerability by modifying how affected systems handle objects in memory.


  • CVE-2017-8748 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines handle objects in memory.


  • CVE-2017-8758 | Microsoft Exchange Cross-Site Scripting Vulnerability
    Risk Rating: Important

    This security update addresses an elevation of privilege vulnerability when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests. An attacker who successfully exploited this vulnerability could perform script/content injection attacks and attempt to trick the user into disclosing sensitive information. The security update addresses the vulnerability by correcting how Microsoft Exchange validates web requests.


  • CVE-2017-0161 | NetBIOS Remote Code Execution Vulnerability
    Risk Rating: Critical

    A race condition that could lead to a remote code execution vulnerability exists in NetBT Session Services when NetBT fails to maintain certain sequencing requirements. To exploit the vulnerability, an attacker needs to be able to send specially crafted NetBT Session Service packets to an impacted system. The security update addresses the vulnerability by correcting how NetBT sequences certain operations.


  • CVE-2017-8567 | Microsoft Office Remote Code Execution
    Risk Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Office handles objects in memory.


  • CVE-2017-8628 | Microsoft Bluetooth Driver Spoofing Vulnerability
    Risk Rating: Important

    A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. An attacker who successfully exploited this vulnerability could perform a man-in-the-middle attack and force a user's computer to unknowingly route traffic through the attacker's computer. The security update addresses the vulnerability by correcting how Windows handles Bluetooth requests.


  • CVE-2017-8643 | Microsoft Edge Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Microsoft Edge improperly handles clipboard events. For an attack to be successful, an attacker must persuade a user to visit a malicious website and leave it open during clipboard activities. The update addresses the vulnerability by changing how Microsoft Edge handles clipboard events in the browser.


  • CVE-2017-8648 | Microsoft Edge Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by modifying how Microsoft Edge handle objects in memory.


  • CVE-2017-8649 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines handle objects in memory.


  • CVE-2017-8660 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines handle objects in memory.


  • CVE-2017-8692 | Uniscribe Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.


  • CVE-2017-8695 | Graphics Component Information Disclosure Vulnerability
    Risk Rating: Important

    AAn information disclosure vulnerability exists when Windows Uniscribe improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how Windows Uniscribe handles objects in memory.


  • CVE-2017-8696 | Microsoft Graphics Component Remote Code Execution
    Risk Rating: Important

    A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.


  • CVE-2017-8699 | Windows Shell Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists when Windows Shell does not properly validate file copy destinations. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by helping to ensure that Windows Shell validates file copy destinations.


  • CVE-2017-8702 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Important

    A denial of service vulnerability exists when Microsoft Hyper-V Virtual PCI on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The security update addresses the vulnerability by properly validating input.


  • CVE-2017-8706 | Hyper-V Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.


  • CVE-2017-8707 | Hyper-V Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.


  • CVE-2017-8708 | Windows Kernel Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.


  • CVE-2017-8709 | Windows Kernel Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


  • CVE-2017-8710 | Volume Manager Extension Driver Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists in the Windows System Information Console when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration. The update addresses the vulnerability by modifying the way that the Windows System Information Console parses XML input.


  • CVE-2017-8711 | Hyper-V Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.


  • CVE-2017-8712 | Hyper-V Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.


  • CVE-2017-8713| Hyper-V Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.


  • CVE-2017-8714 | Remote Desktop Virtual Host Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists in the VM Host Agent Service of Remote Desktop Virtual Host role when it fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could issue a specially crafted certificate on the guest operating system that could cause the VM host agent service on the host operating system to execute arbitrary code. The security update addresses the vulnerability by correcting how VM host agent service validates guest operating system user input.


  • CVE-2017-8716| Windows Security Feature Bypass Vulnerability
    Risk Rating: Important

    A security feature bypass vulnerability exists when Windows Control Flow Guard mishandles objects in memory. To exploit the vulnerability, an attacker could run a specially crafted application to bypass Control Flow Guard. The security update addresses the vulnerability by correcting how Windows Control Flow Guard handles objects in memory.


  • CVE-2017-8719 | Windows Kernel Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.


  • CVE-2017-8720 | Win32k Elevation of Privilege Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how affected Microsoft scripting engines handle objects in memory.


  • CVE-2017-8723 | Microsoft Edge Security Feature Bypass Vulnerability
    Risk Rating: Low

    A security feature bypass exists in Microsoft Edge when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents. An attacker who exploited the bypass could trick a user into loading a page containing malicious content. The update addresses the bypass by correcting how the Edge CSP validates documents.


  • CVE-2017-8724 | Microsoft Edge Spoofing Vulnerability
    Risk Rating: Important

    A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website. The update addresses the vulnerability by correcting how Microsoft Edge parses HTTP responses.


  • CVE-2017-8728 | Microsoft PDF Remote Code Execution Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how affected systems handle objects in memory.


  • CVE-2017-8729 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8731 | Microsoft Edge Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


  • CVE-2017-8733 | Internet Explorer Spoofing Vulnerability
    Risk Rating: Important

    A spoofing vulnerability exists when Internet Explorer improperly handles specific HTML content. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was visiting a legitimate website. The security update addresses the vulnerability by correcting how Internet Explorer handles specific HTML content.


  • CVE-2017-8734 | Microsoft Edge Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


  • CVE-2017-8736 | Microsoft Browser Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists in Microsoft browsers due to improper parent domain verification in certain functionality. An attacker who successfully exploited the vulnerability could obtain specific information that is used in the parent domain. The security update addresses the vulnerability by helping to ensure that Microsoft browsers restrict access to certain functionality between the subdomain and the parent domain.


  • CVE-2017-8738 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8739 | Scripting Engine Information Disclosure Vulnerability
    Risk Rating: Important

    An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by changing how the scripting engine handles objects in memory.


  • CVE-2017-8740 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8741| Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that Microsoft browser JavaScript engines render content when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines handle objects in memory.


  • CVE-2017-8742 | PowerPoint Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Office handles objects in memory.


  • CVE-2017-8743 | PowerPoint Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The security update addresses the vulnerability by correcting how Office handles objects in memory.


  • CVE-2017-8725 | Microsoft Office Publisher Remote Code Execution
    Risk Rating: Important

    A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory.


  • CVE-2017-8735| Microsoft Edge Spoofing Vulnerability
    Risk Rating: Moderate

    A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website. The update addresses the vulnerability by correcting how Microsoft Edge parses HTTP responses.


  • CVE-2017-8746 | Device Guard Security Feature Bypass Vulnerability
    Risk Rating: Important

    A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the local machine. The update addresses the vulnerability by correcting how PowerShell exposes functions and processes user supplied code.


  • CVE-2017-8747 | Internet Explorer Memory Corruption Vulnerability
    Risk Rating: Moderate

    A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


  • CVE-2017-8749 | Internet Explorer Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.


  • CVE-2017-8750 | Microsoft Browser Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists when Microsoft browsers improperly access objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.


  • CVE-2017-8751 | Microsoft Edge Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


  • CVE-2017-8752 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8753 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8754 | Microsoft Edge Security Feature Bypass Vulnerability
    Risk Rating: Important

    A security feature bypass exists in Microsoft Edge when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents. An attacker who exploited the bypass could trick a user into loading a page containing malicious content. The update addresses the bypass by correcting how the Edge CSP validates documents.


  • CVE-2017-8755 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8756 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-8757 | Microsoft Edge Remote Code Execution Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way Microsoft Edge handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


  • CVE-2017-11761 | Microsoft Exchange Information Disclosure Vulnerability
    Risk Rating: Important

    An input sanitization issue exists with Microsoft Exchange that could potentially result in unintended Information Disclosure. An attacker who successfully exploited the vulnerability could identify the existence of RFC1918 addresses on the local network from a client on the Internet. The update corrects the way that Exchange parses Calendar-related messages.


  • CVE-2017-11764 | Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how the scripting engine handles objects in memory.


  • CVE-2017-11766 | Microsoft Edge Memory Corruption Vulnerability
    Risk Rating: Critical

    A vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.


  • CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability
    Risk Rating: Important

    A remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input. An attacker who successfully exploited this vulnerability in software using the .NET framework could take control of an affected system. The security update addresses the vulnerability by correcting how .NET validates untrusted input.


  • Ознакомиться со статьей   
  • August 2017 - Microsoft Releases 48 Security Patches
     Advisory Date:  09 August 2017
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its August batch of patches:

  • < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its July batch of patches:

  • < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its June batch of patches:

  • May 2017 - Microsoft Releases Security Patches
     Advisory Date:  10 May 2017
    < div id="listDescVul"class="pane showpane noborder" >

    Microsoft addresses several vulnerabilities in its May batch of patches: