Vulnerabilities > CVE-2019-0664 - Unspecified vulnerability in Microsoft products

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
microsoft
nessus

Summary

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660.

Nessus

  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS19_FEB_4487000.NASL
    descriptionThe remote Windows host is missing security update 4487028 or cumulative update 4487000. It is, therefore, affected by multiple vulnerabilities : - An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0656) - An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0623) - An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2019-0635) - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660, CVE-2019-0664) - An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. (CVE-2019-0600, CVE-2019-0601) - A remote code execution vulnerability exists in .NET Framework and Visual Studio software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0613) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2019-0621) - An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2019-0628) - An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack to be successful, an attacker must persuade a user to open a malicious website. The security update addresses the vulnerability by changing the way Internet Explorer handles objects in memory. (CVE-2019-0676) - A vulnerability exists in certain .Net Framework API
    last seen2020-03-18
    modified2019-02-12
    plugin id122120
    published2019-02-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122120
    titleKB4487028: Windows 8.1 and Windows Server 2012 R2 February 2019 Security Update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were  
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(122120);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2019/10/31");
    
      script_cve_id(
        "CVE-2019-0595",
        "CVE-2019-0596",
        "CVE-2019-0597",
        "CVE-2019-0598",
        "CVE-2019-0599",
        "CVE-2019-0600",
        "CVE-2019-0601",
        "CVE-2019-0602",
        "CVE-2019-0606",
        "CVE-2019-0613",
        "CVE-2019-0615",
        "CVE-2019-0616",
        "CVE-2019-0618",
        "CVE-2019-0619",
        "CVE-2019-0621",
        "CVE-2019-0623",
        "CVE-2019-0625",
        "CVE-2019-0626",
        "CVE-2019-0628",
        "CVE-2019-0630",
        "CVE-2019-0633",
        "CVE-2019-0635",
        "CVE-2019-0636",
        "CVE-2019-0654",
        "CVE-2019-0656",
        "CVE-2019-0657",
        "CVE-2019-0660",
        "CVE-2019-0662",
        "CVE-2019-0663",
        "CVE-2019-0664",
        "CVE-2019-0676"
      );
      script_xref(name:"MSKB", value:"4487028");
      script_xref(name:"MSKB", value:"4487000");
      script_xref(name:"MSFT", value:"MS19-4487028");
      script_xref(name:"MSFT", value:"MS19-4487000");
    
      script_name(english:"KB4487028: Windows 8.1 and Windows Server 2012 R2 February 2019 Security Update");
      script_summary(english:"Checks for rollup.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Windows host is missing security update 4487028
    or cumulative update 4487000. It is, therefore, affected by
    multiple vulnerabilities :
    
      - An elevation of privilege vulnerability exists when the
        Windows kernel fails to properly handle objects in
        memory. An attacker who successfully exploited this
        vulnerability could run arbitrary code in kernel mode.
        An attacker could then install programs; view, change,
        or delete data; or create new accounts with full user
        rights.  (CVE-2019-0656)
    
      - An elevation of privilege vulnerability exists in
        Windows when the Win32k component fails to properly
        handle objects in memory. An attacker who successfully
        exploited this vulnerability could run arbitrary code in
        kernel mode. An attacker could then install programs;
        view, change, or delete data; or create new accounts
        with full user rights.  (CVE-2019-0623)
    
      - An information disclosure vulnerability exists when
        Windows Hyper-V on a host operating system fails to
        properly validate input from an authenticated user on a
        guest operating system.  (CVE-2019-0635)
    
      - An information disclosure vulnerability exists when the
        Windows GDI component improperly discloses the contents
        of its memory. An attacker who successfully exploited
        the vulnerability could obtain information to further
        compromise the users system. There are multiple ways an
        attacker could exploit the vulnerability, such as by
        convincing a user to open a specially crafted document,
        or by convincing a user to visit an untrusted webpage.
        The security update addresses the vulnerability by
        correcting how the Windows GDI component handles objects
        in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616,
        CVE-2019-0619, CVE-2019-0660, CVE-2019-0664)
    
      - An information disclosure vulnerability exists when the
        Human Interface Devices (HID) component improperly
        handles objects in memory. An attacker who successfully
        exploited this vulnerability could obtain information to
        further compromise the victims system.  (CVE-2019-0600,
        CVE-2019-0601)
    
      - A remote code execution vulnerability exists in .NET
        Framework and Visual Studio software when the software
        fails to check the source markup of a file. An attacker
        who successfully exploited the vulnerability could run
        arbitrary code in the context of the current user. If
        the current user is logged on with administrative user
        rights, an attacker could take control of the affected
        system. An attacker could then install programs; view,
        change, or delete data; or create new accounts with full
        user rights.  (CVE-2019-0613)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0621)
    
      - An information disclosure vulnerability exists when the
        win32k component improperly provides kernel information.
        An attacker who successfully exploited the vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0628)
    
      - An information disclosure vulnerability exists when
        Internet Explorer improperly handles objects in memory.
        An attacker who successfully exploited this
        vulnerability could test for the presence of files on
        disk. For an attack to be successful, an attacker must
        persuade a user to open a malicious website. The
        security update addresses the vulnerability by changing
        the way Internet Explorer handles objects in memory.
        (CVE-2019-0676)
    
      - A vulnerability exists in certain .Net Framework API's
        and Visual Studio in the way they parse URL's. An
        attacker who successfully exploited this vulnerability
        could use it to bypass security logic intended to ensure
        that a user-provided URL belonged to a specific hostname
        or a subdomain of that hostname. This could be used to
        cause privileged communication to be made to an
        untrusted service as if it was a trusted service.
        (CVE-2019-0657)
    
      - A remote code execution vulnerability exists when
        Internet Explorer improperly accesses objects in memory.
        The vulnerability could corrupt memory in such a way
        that an attacker could execute arbitrary code in the
        context of the current user. An attacker who
        successfully exploited the vulnerability could gain the
        same user rights as the current user.  (CVE-2019-0606)
    
      - A remote code execution vulnerability exists in the way
        that the Windows Graphics Device Interface (GDI) handles
        objects in the memory. An attacker who successfully
        exploited this vulnerability could take control of the
        affected system. An attacker could then install
        programs; view, change, or delete data; or create new
        accounts with full user rights.  (CVE-2019-0618,
        CVE-2019-0662)
    
      - An information vulnerability exists when Windows
        improperly discloses file information. Successful
        exploitation of the vulnerability could allow the
        attacker to read the contents of files on disk.
        (CVE-2019-0636)
    
      - A spoofing vulnerability exists when Microsoft browsers
        improperly handles specific redirects. An attacker who
        successfully exploited this vulnerability could trick a
        user into believing that the user was on a legitimate
        website. The specially crafted website could either
        spoof content or serve as a pivot to chain an attack
        with other vulnerabilities in web services.
        (CVE-2019-0654)
    
      - A remote code execution vulnerability exists in the way
        that the Microsoft Server Message Block 2.0 (SMBv2)
        server handles certain requests. An attacker who
        successfully exploited the vulnerability could gain the
        ability to execute code on the target server.
        (CVE-2019-0630, CVE-2019-0633)
    
      - A memory corruption vulnerability exists in the Windows
        Server DHCP service when an attacker sends specially
        crafted packets to a DHCP server. An attacker who
        successfully exploited the vulnerability could run
        arbitrary code on the DHCP server.  (CVE-2019-0626)
    
      - A remote code execution vulnerability exists when the
        Windows Jet Database Engine improperly handles objects
        in memory. An attacker who successfully exploited this
        vulnerability could execute arbitrary code on a victim
        system. An attacker could exploit this vulnerability by
        enticing a victim to open a specially crafted file. The
        update addresses the vulnerability by correcting the way
        the Windows Jet Database Engine handles objects in
        memory. (CVE-2019-0595, CVE-2019-0596, CVE-2019-0597,
        CVE-2019-0598, CVE-2019-0599, CVE-2019-0625)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly initializes objects in memory.
        To exploit this vulnerability, an authenticated attacker
        could run a specially crafted application. An attacker who
        successfully exploited this vulnerability could obtain
        information to further compromise the user's system.
        (CVE-2019-0663)");
      # https://support.microsoft.com/en-us/help/4487028/windows-8-1-update-kb4487028
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?220ebfca");
      # https://support.microsoft.com/en-us/help/4487000/windows-8-1-update-kb4487000
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1a603136");
      script_set_attribute(attribute:"solution", value:
    "Apply Security Only update KB4487028 or Cumulative Update KB4487000.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0662");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_hotfixes.inc");
    include("smb_func.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = "MS19-02";
    kbs = make_list('4487028', '4487000');
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    # Windows 8 EOL
    productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
    if ("Windows 8" >< productname && "8.1" >!< productname)
      audit(AUDIT_OS_SP_NOT_VULN);
    
    share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if (
      smb_check_rollup(os:"6.3",
                       sp:0,
                       rollup_date:"02_2019",
                       bulletin:bulletin,
                       rollup_kb_list:[4487028, 4487000])
    )
    {
      replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_hole();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, hotfix_get_audit_report());
    }
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS19_FEB_4487019.NASL
    descriptionThe remote Windows host is missing security update 4487019 or cumulative update 4487023. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. (CVE-2019-0630) - An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0623) - An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2019-0635) - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660, CVE-2019-0664) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory. (CVE-2019-0661) - An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. (CVE-2019-0600, CVE-2019-0601) - A remote code execution vulnerability exists in .NET Framework and Visual Studio software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0613) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2019-0621) - An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2019-0628) - A vulnerability exists in certain .Net Framework API
    last seen2020-03-18
    modified2019-02-12
    plugin id122123
    published2019-02-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122123
    titleKB4487019: Windows Server 2008 February 2019 Security Update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were  
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(122123);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2019/10/31");
    
      script_cve_id(
        "CVE-2019-0595",
        "CVE-2019-0596",
        "CVE-2019-0597",
        "CVE-2019-0598",
        "CVE-2019-0599",
        "CVE-2019-0600",
        "CVE-2019-0601",
        "CVE-2019-0602",
        "CVE-2019-0613",
        "CVE-2019-0615",
        "CVE-2019-0616",
        "CVE-2019-0618",
        "CVE-2019-0619",
        "CVE-2019-0621",
        "CVE-2019-0623",
        "CVE-2019-0625",
        "CVE-2019-0626",
        "CVE-2019-0628",
        "CVE-2019-0630",
        "CVE-2019-0635",
        "CVE-2019-0636",
        "CVE-2019-0654",
        "CVE-2019-0657",
        "CVE-2019-0660",
        "CVE-2019-0661",
        "CVE-2019-0662",
        "CVE-2019-0664"
      );
      script_xref(name:"MSKB", value:"4487023");
      script_xref(name:"MSKB", value:"4487019");
      script_xref(name:"MSFT", value:"MS19-4487023");
      script_xref(name:"MSFT", value:"MS19-4487019");
    
      script_name(english:"KB4487019: Windows Server 2008 February 2019 Security Update");
      script_summary(english:"Checks for rollup.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Windows host is missing security update 4487019
    or cumulative update 4487023. It is, therefore, affected by
    multiple vulnerabilities :
    
      - A remote code execution vulnerability exists in the way
        that the Microsoft Server Message Block 2.0 (SMBv2)
        server handles certain requests. An attacker who
        successfully exploited the vulnerability could gain the
        ability to execute code on the target server.
        (CVE-2019-0630)
    
      - An elevation of privilege vulnerability exists in
        Windows when the Win32k component fails to properly
        handle objects in memory. An attacker who successfully
        exploited this vulnerability could run arbitrary code in
        kernel mode. An attacker could then install programs;
        view, change, or delete data; or create new accounts
        with full user rights.  (CVE-2019-0623)
    
      - An information disclosure vulnerability exists when
        Windows Hyper-V on a host operating system fails to
        properly validate input from an authenticated user on a
        guest operating system.  (CVE-2019-0635)
    
      - An information disclosure vulnerability exists when the
        Windows GDI component improperly discloses the contents
        of its memory. An attacker who successfully exploited
        the vulnerability could obtain information to further
        compromise the users system. There are multiple ways an
        attacker could exploit the vulnerability, such as by
        convincing a user to open a specially crafted document,
        or by convincing a user to visit an untrusted webpage.
        The security update addresses the vulnerability by
        correcting how the Windows GDI component handles objects
        in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616,
        CVE-2019-0619, CVE-2019-0660, CVE-2019-0664)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system. An authenticated attacker could exploit this
        vulnerability by running a specially crafted
        application. The update addresses the vulnerability by
        correcting how the Windows kernel handles objects in
        memory. (CVE-2019-0661)
    
      - An information disclosure vulnerability exists when the
        Human Interface Devices (HID) component improperly
        handles objects in memory. An attacker who successfully
        exploited this vulnerability could obtain information to
        further compromise the victims system.  (CVE-2019-0600,
        CVE-2019-0601)
    
      - A remote code execution vulnerability exists in .NET
        Framework and Visual Studio software when the software
        fails to check the source markup of a file. An attacker
        who successfully exploited the vulnerability could run
        arbitrary code in the context of the current user. If
        the current user is logged on with administrative user
        rights, an attacker could take control of the affected
        system. An attacker could then install programs; view,
        change, or delete data; or create new accounts with full
        user rights.  (CVE-2019-0613)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0621)
    
      - An information disclosure vulnerability exists when the
        win32k component improperly provides kernel information.
        An attacker who successfully exploited the vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0628)
    
      - A vulnerability exists in certain .Net Framework API's
        and Visual Studio in the way they parse URL's. An
        attacker who successfully exploited this vulnerability
        could use it to bypass security logic intended to ensure
        that a user-provided URL belonged to a specific hostname
        or a subdomain of that hostname. This could be used to
        cause privileged communication to be made to an
        untrusted service as if it was a trusted service.
        (CVE-2019-0657)
    
      - A remote code execution vulnerability exists in the way
        that the Windows Graphics Device Interface (GDI) handles
        objects in the memory. An attacker who successfully
        exploited this vulnerability could take control of the
        affected system. An attacker could then install
        programs; view, change, or delete data; or create new
        accounts with full user rights.  (CVE-2019-0618,
        CVE-2019-0662)
    
      - An information vulnerability exists when Windows
        improperly discloses file information. Successful
        exploitation of the vulnerability could allow the
        attacker to read the contents of files on disk.
        (CVE-2019-0636)
    
      - A spoofing vulnerability exists when Microsoft browsers
        improperly handles specific redirects. An attacker who
        successfully exploited this vulnerability could trick a
        user into believing that the user was on a legitimate
        website. The specially crafted website could either
        spoof content or serve as a pivot to chain an attack
        with other vulnerabilities in web services.
        (CVE-2019-0654)
    
      - A memory corruption vulnerability exists in the Windows
        Server DHCP service when an attacker sends specially
        crafted packets to a DHCP server. An attacker who
        successfully exploited the vulnerability could run
        arbitrary code on the DHCP server.  (CVE-2019-0626)
    
      - A remote code execution vulnerability exists when the
        Windows Jet Database Engine improperly handles objects
        in memory. An attacker who successfully exploited this
        vulnerability could execute arbitrary code on a victim
        system. An attacker could exploit this vulnerability by
        enticing a victim to open a specially crafted file. The
        update addresses the vulnerability by correcting the way
        the Windows Jet Database Engine handles objects in
        memory. (CVE-2019-0595, CVE-2019-0596, CVE-2019-0597,
        CVE-2019-0598, CVE-2019-0599, CVE-2019-0625)");
      # https://support.microsoft.com/en-us/help/4487023/windows-server-2008-update-kb4487023
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?68a182bd");
      # https://support.microsoft.com/en-us/help/4487019/windows-server-2008-update-kb4487019
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e07d6a61");
      script_set_attribute(attribute:"solution", value:
    "Apply Security Only update KB4487019 or Cumulative Update KB4487023.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0662");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_hotfixes.inc");
    include("smb_func.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = "MS19-02";
    kbs = make_list('4487019', '4487023');
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
    if ("Vista" >< productname) audit(AUDIT_OS_SP_NOT_VULN);
    
    share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if (
      smb_check_rollup(os:"6.0",
                       sp:2,
                       rollup_date:"02_2019",
                       bulletin:bulletin,
                       rollup_kb_list:[4487019, 4487023])
    )
    {
      replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_hole();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, hotfix_get_audit_report());
    }
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS19_FEB_4487025.NASL
    descriptionThe remote Windows host is missing security update 4486993 or cumulative update 4487025. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in .NET Framework and Visual Studio software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0613) - An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0623) - An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2019-0635) - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660, CVE-2019-0664) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory. (CVE-2019-0661) - An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. (CVE-2019-0600, CVE-2019-0601) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2019-0621) - An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2019-0628) - An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack to be successful, an attacker must persuade a user to open a malicious website. The security update addresses the vulnerability by changing the way Internet Explorer handles objects in memory. (CVE-2019-0676) - A vulnerability exists in certain .Net Framework API
    last seen2020-03-18
    modified2019-02-12
    plugin id122125
    published2019-02-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122125
    titleKB4486993: Windows Server 2012 February 2019 Security Update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were  
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(122125);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2019/10/31");
    
      script_cve_id(
        "CVE-2019-0595",
        "CVE-2019-0596",
        "CVE-2019-0597",
        "CVE-2019-0598",
        "CVE-2019-0599",
        "CVE-2019-0600",
        "CVE-2019-0601",
        "CVE-2019-0602",
        "CVE-2019-0613",
        "CVE-2019-0615",
        "CVE-2019-0616",
        "CVE-2019-0618",
        "CVE-2019-0619",
        "CVE-2019-0621",
        "CVE-2019-0623",
        "CVE-2019-0625",
        "CVE-2019-0626",
        "CVE-2019-0628",
        "CVE-2019-0630",
        "CVE-2019-0633",
        "CVE-2019-0635",
        "CVE-2019-0636",
        "CVE-2019-0654",
        "CVE-2019-0657",
        "CVE-2019-0660",
        "CVE-2019-0661",
        "CVE-2019-0662",
        "CVE-2019-0663",
        "CVE-2019-0664",
        "CVE-2019-0676"
      );
      script_xref(name:"MSKB", value:"4486993");
      script_xref(name:"MSKB", value:"4487025");
      script_xref(name:"MSFT", value:"MS19-4486993");
      script_xref(name:"MSFT", value:"MS19-4487025");
    
      script_name(english:"KB4486993: Windows Server 2012 February 2019 Security Update");
      script_summary(english:"Checks for rollup.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Windows host is missing security update 4486993
    or cumulative update 4487025. It is, therefore, affected by
    multiple vulnerabilities :
    
      - A remote code execution vulnerability exists in .NET
        Framework and Visual Studio software when the software
        fails to check the source markup of a file. An attacker
        who successfully exploited the vulnerability could run
        arbitrary code in the context of the current user. If
        the current user is logged on with administrative user
        rights, an attacker could take control of the affected
        system. An attacker could then install programs; view,
        change, or delete data; or create new accounts with full
        user rights.  (CVE-2019-0613)
    
      - An elevation of privilege vulnerability exists in
        Windows when the Win32k component fails to properly
        handle objects in memory. An attacker who successfully
        exploited this vulnerability could run arbitrary code in
        kernel mode. An attacker could then install programs;
        view, change, or delete data; or create new accounts
        with full user rights.  (CVE-2019-0623)
    
      - An information disclosure vulnerability exists when
        Windows Hyper-V on a host operating system fails to
        properly validate input from an authenticated user on a
        guest operating system.  (CVE-2019-0635)
    
      - An information disclosure vulnerability exists when the
        Windows GDI component improperly discloses the contents
        of its memory. An attacker who successfully exploited
        the vulnerability could obtain information to further
        compromise the users system. There are multiple ways an
        attacker could exploit the vulnerability, such as by
        convincing a user to open a specially crafted document,
        or by convincing a user to visit an untrusted webpage.
        The security update addresses the vulnerability by
        correcting how the Windows GDI component handles objects
        in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616,
        CVE-2019-0619, CVE-2019-0660, CVE-2019-0664)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system. An authenticated attacker could exploit this
        vulnerability by running a specially crafted
        application. The update addresses the vulnerability by
        correcting how the Windows kernel handles objects in
        memory. (CVE-2019-0661)
    
      - An information disclosure vulnerability exists when the
        Human Interface Devices (HID) component improperly
        handles objects in memory. An attacker who successfully
        exploited this vulnerability could obtain information to
        further compromise the victims system.  (CVE-2019-0600,
        CVE-2019-0601)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0621)
    
      - An information disclosure vulnerability exists when the
        win32k component improperly provides kernel information.
        An attacker who successfully exploited the vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0628)
    
      - An information disclosure vulnerability exists when
        Internet Explorer improperly handles objects in memory.
        An attacker who successfully exploited this
        vulnerability could test for the presence of files on
        disk. For an attack to be successful, an attacker must
        persuade a user to open a malicious website. The
        security update addresses the vulnerability by changing
        the way Internet Explorer handles objects in memory.
        (CVE-2019-0676)
    
      - A vulnerability exists in certain .Net Framework API's
        and Visual Studio in the way they parse URL's. An
        attacker who successfully exploited this vulnerability
        could use it to bypass security logic intended to ensure
        that a user-provided URL belonged to a specific hostname
        or a subdomain of that hostname. This could be used to
        cause privileged communication to be made to an
        untrusted service as if it was a trusted service.
        (CVE-2019-0657)
    
      - A remote code execution vulnerability exists in the way
        that the Windows Graphics Device Interface (GDI) handles
        objects in the memory. An attacker who successfully
        exploited this vulnerability could take control of the
        affected system. An attacker could then install
        programs; view, change, or delete data; or create new
        accounts with full user rights.  (CVE-2019-0618,
        CVE-2019-0662)
    
      - An information vulnerability exists when Windows
        improperly discloses file information. Successful
        exploitation of the vulnerability could allow the
        attacker to read the contents of files on disk.
        (CVE-2019-0636)
    
      - A spoofing vulnerability exists when Microsoft browsers
        improperly handles specific redirects. An attacker who
        successfully exploited this vulnerability could trick a
        user into believing that the user was on a legitimate
        website. The specially crafted website could either
        spoof content or serve as a pivot to chain an attack
        with other vulnerabilities in web services.
        (CVE-2019-0654)
    
      - A remote code execution vulnerability exists in the way
        that the Microsoft Server Message Block 2.0 (SMBv2)
        server handles certain requests. An attacker who
        successfully exploited the vulnerability could gain the
        ability to execute code on the target server.
        (CVE-2019-0630, CVE-2019-0633)
    
      - A memory corruption vulnerability exists in the Windows
        Server DHCP service when an attacker sends specially
        crafted packets to a DHCP server. An attacker who
        successfully exploited the vulnerability could run
        arbitrary code on the DHCP server.  (CVE-2019-0626)
    
      - A remote code execution vulnerability exists when the
        Windows Jet Database Engine improperly handles objects
        in memory. An attacker who successfully exploited this
        vulnerability could execute arbitrary code on a victim
        system. An attacker could exploit this vulnerability by
        enticing a victim to open a specially crafted file. The
        update addresses the vulnerability by correcting the way
        the Windows Jet Database Engine handles objects in
        memory. (CVE-2019-0595, CVE-2019-0596, CVE-2019-0597,
        CVE-2019-0598, CVE-2019-0599, CVE-2019-0625)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly initializes objects in memory.
        To exploit this vulnerability, an authenticated attacker
        could run a specially crafted application. An attacker who
        successfully exploited this vulnerability could obtain
        information to further compromise the user's system.
        (CVE-2019-0663)");
      # https://support.microsoft.com/en-us/help/4486993/windows-server-2012-update-kb4486993
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?067a0516");
      # https://support.microsoft.com/en-us/help/4487025/windows-server-2012-update-kb4487025
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b2ede4e6");
      script_set_attribute(attribute:"solution", value:
    "Apply Security Only update KB4486993 or Cumulative Update KB4487025.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0662");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_hotfixes.inc");
    include("smb_func.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = "MS19-02";
    kbs = make_list('4486993', '4487025');
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    # Windows 8 EOL
    productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
    if ("Windows 8" >< productname) audit(AUDIT_OS_SP_NOT_VULN);
    
    share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if (
      smb_check_rollup(os:"6.2",
                       sp:0,
                       rollup_date:"02_2019",
                       bulletin:bulletin,
                       rollup_kb_list:[4486993, 4487025])
    )
    {
      replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_hole();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, hotfix_get_audit_report());
    }
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS19_FEB_4486563.NASL
    descriptionThe remote Windows host is missing security update 4486564 or cumulative update 4486563. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. (CVE-2019-0630) - An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0623) - An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. (CVE-2019-0635) - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616, CVE-2019-0619, CVE-2019-0660, CVE-2019-0664) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory. (CVE-2019-0661) - An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victims system. (CVE-2019-0600, CVE-2019-0601) - A remote code execution vulnerability exists in .NET Framework and Visual Studio software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2019-0613) - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2019-0621) - An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2019-0628) - An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack to be successful, an attacker must persuade a user to open a malicious website. The security update addresses the vulnerability by changing the way Internet Explorer handles objects in memory. (CVE-2019-0676) - A vulnerability exists in certain .Net Framework API
    last seen2020-03-18
    modified2019-02-12
    plugin id122118
    published2019-02-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122118
    titleKB4486564: Windows 7 and Windows Server 2008 R2 February 2019 Security Update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were  
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(122118);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2019/10/31");
    
      script_cve_id(
        "CVE-2019-0595",
        "CVE-2019-0596",
        "CVE-2019-0597",
        "CVE-2019-0598",
        "CVE-2019-0599",
        "CVE-2019-0600",
        "CVE-2019-0601",
        "CVE-2019-0602",
        "CVE-2019-0606",
        "CVE-2019-0613",
        "CVE-2019-0615",
        "CVE-2019-0616",
        "CVE-2019-0618",
        "CVE-2019-0619",
        "CVE-2019-0621",
        "CVE-2019-0623",
        "CVE-2019-0625",
        "CVE-2019-0626",
        "CVE-2019-0628",
        "CVE-2019-0630",
        "CVE-2019-0635",
        "CVE-2019-0636",
        "CVE-2019-0654",
        "CVE-2019-0657",
        "CVE-2019-0660",
        "CVE-2019-0661",
        "CVE-2019-0662",
        "CVE-2019-0663",
        "CVE-2019-0664",
        "CVE-2019-0676"
      );
      script_xref(name:"MSKB", value:"4486564");
      script_xref(name:"MSKB", value:"4486563");
      script_xref(name:"MSFT", value:"MS19-4486564");
      script_xref(name:"MSFT", value:"MS19-4486563");
    
      script_name(english:"KB4486564: Windows 7 and Windows Server 2008 R2 February 2019 Security Update");
      script_summary(english:"Checks for rollup.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Windows host is missing security update 4486564
    or cumulative update 4486563. It is, therefore, affected by
    multiple vulnerabilities :
    
      - A remote code execution vulnerability exists in the way
        that the Microsoft Server Message Block 2.0 (SMBv2)
        server handles certain requests. An attacker who
        successfully exploited the vulnerability could gain the
        ability to execute code on the target server.
        (CVE-2019-0630)
    
      - An elevation of privilege vulnerability exists in
        Windows when the Win32k component fails to properly
        handle objects in memory. An attacker who successfully
        exploited this vulnerability could run arbitrary code in
        kernel mode. An attacker could then install programs;
        view, change, or delete data; or create new accounts
        with full user rights.  (CVE-2019-0623)
    
      - An information disclosure vulnerability exists when
        Windows Hyper-V on a host operating system fails to
        properly validate input from an authenticated user on a
        guest operating system.  (CVE-2019-0635)
    
      - An information disclosure vulnerability exists when the
        Windows GDI component improperly discloses the contents
        of its memory. An attacker who successfully exploited
        the vulnerability could obtain information to further
        compromise the users system. There are multiple ways an
        attacker could exploit the vulnerability, such as by
        convincing a user to open a specially crafted document,
        or by convincing a user to visit an untrusted webpage.
        The security update addresses the vulnerability by
        correcting how the Windows GDI component handles objects
        in memory. (CVE-2019-0602, CVE-2019-0615, CVE-2019-0616,
        CVE-2019-0619, CVE-2019-0660, CVE-2019-0664)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system. An authenticated attacker could exploit this
        vulnerability by running a specially crafted
        application. The update addresses the vulnerability by
        correcting how the Windows kernel handles objects in
        memory. (CVE-2019-0661)
    
      - An information disclosure vulnerability exists when the
        Human Interface Devices (HID) component improperly
        handles objects in memory. An attacker who successfully
        exploited this vulnerability could obtain information to
        further compromise the victims system.  (CVE-2019-0600,
        CVE-2019-0601)
    
      - A remote code execution vulnerability exists in .NET
        Framework and Visual Studio software when the software
        fails to check the source markup of a file. An attacker
        who successfully exploited the vulnerability could run
        arbitrary code in the context of the current user. If
        the current user is logged on with administrative user
        rights, an attacker could take control of the affected
        system. An attacker could then install programs; view,
        change, or delete data; or create new accounts with full
        user rights.  (CVE-2019-0613)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly handles objects in memory. An
        attacker who successfully exploited this vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0621)
    
      - An information disclosure vulnerability exists when the
        win32k component improperly provides kernel information.
        An attacker who successfully exploited the vulnerability
        could obtain information to further compromise the users
        system.  (CVE-2019-0628)
    
      - An information disclosure vulnerability exists when
        Internet Explorer improperly handles objects in memory.
        An attacker who successfully exploited this
        vulnerability could test for the presence of files on
        disk. For an attack to be successful, an attacker must
        persuade a user to open a malicious website. The
        security update addresses the vulnerability by changing
        the way Internet Explorer handles objects in memory.
        (CVE-2019-0676)
    
      - A vulnerability exists in certain .Net Framework API's
        and Visual Studio in the way they parse URL's. An
        attacker who successfully exploited this vulnerability
        could use it to bypass security logic intended to ensure
        that a user-provided URL belonged to a specific hostname
        or a subdomain of that hostname. This could be used to
        cause privileged communication to be made to an
        untrusted service as if it was a trusted service.
        (CVE-2019-0657)
    
      - A remote code execution vulnerability exists when
        Internet Explorer improperly accesses objects in memory.
        The vulnerability could corrupt memory in such a way
        that an attacker could execute arbitrary code in the
        context of the current user. An attacker who
        successfully exploited the vulnerability could gain the
        same user rights as the current user.  (CVE-2019-0606)
    
      - A remote code execution vulnerability exists in the way
        that the Windows Graphics Device Interface (GDI) handles
        objects in the memory. An attacker who successfully
        exploited this vulnerability could take control of the
        affected system. An attacker could then install
        programs; view, change, or delete data; or create new
        accounts with full user rights.  (CVE-2019-0618,
        CVE-2019-0662)
    
      - An information vulnerability exists when Windows
        improperly discloses file information. Successful
        exploitation of the vulnerability could allow the
        attacker to read the contents of files on disk.
        (CVE-2019-0636)
    
      - A spoofing vulnerability exists when Microsoft browsers
        improperly handles specific redirects. An attacker who
        successfully exploited this vulnerability could trick a
        user into believing that the user was on a legitimate
        website. The specially crafted website could either
        spoof content or serve as a pivot to chain an attack
        with other vulnerabilities in web services.
        (CVE-2019-0654)
    
      - A memory corruption vulnerability exists in the Windows
        Server DHCP service when an attacker sends specially
        crafted packets to a DHCP server. An attacker who
        successfully exploited the vulnerability could run
        arbitrary code on the DHCP server.  (CVE-2019-0626)
    
      - A remote code execution vulnerability exists when the
        Windows Jet Database Engine improperly handles objects
        in memory. An attacker who successfully exploited this
        vulnerability could execute arbitrary code on a victim
        system. An attacker could exploit this vulnerability by
        enticing a victim to open a specially crafted file. The
        update addresses the vulnerability by correcting the way
        the Windows Jet Database Engine handles objects in
        memory. (CVE-2019-0595, CVE-2019-0596, CVE-2019-0597,
        CVE-2019-0598, CVE-2019-0599, CVE-2019-0625)
    
      - An information disclosure vulnerability exists when the
        Windows kernel improperly initializes objects in memory.
        To exploit this vulnerability, an authenticated attacker
        could run a specially crafted application. An attacker who
        successfully exploited this vulnerability could obtain
        information to further compromise the user's system.
        (CVE-2019-0663)");
      # https://support.microsoft.com/en-us/help/4486564/windows-7-update-kb4486564
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a2c21cca");
      # https://support.microsoft.com/en-us/help/4486563/windows-7-update-kb4486563
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bf04f83f");
      script_set_attribute(attribute:"solution", value:
    "Apply Security Only update KB4486564 or Cumulative Update KB4486563.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0662");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/02/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_hotfixes.inc");
    include("smb_func.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = "MS19-02";
    kbs = make_list('4486564', '4486563');
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if (
      smb_check_rollup(os:"6.1",
                       sp:1,
                       rollup_date:"02_2019",
                       bulletin:bulletin,
                       rollup_kb_list:[4486564, 4486563])
    )
    {
      replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_hole();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, hotfix_get_audit_report());
    }