[Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems'

Notification of New Vulnerabilties to Windows Systems Fixlet Messages winvulns-announcements at bigmail.bigfix.com
Sat Apr 14 05:21:20 PDT 2018


Fixlet Site - 'Vulnerabilities to Windows Systems'
Current Version: 581	Published: Fri, 13 Apr 2018 18:33:59  GMT

New Fixlets:
============

***************************************************************
Title: Guidance to mitigate speculative execution side-channel vulnerabilities - CVE-2017-5753
Severity: Medium
Fixlet ID: 391501
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3915
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

***************************************************************
Title: Branch Target Injection Vulnerability- CVE-2017-5715
Severity: Medium
Fixlet ID: 392401
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3924
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5715
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

***************************************************************
Title: Rogue Data Cache Load Vulnerability - CVE-2017-5754
Severity: Medium
Fixlet ID: 392501
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3925
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5754
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

***************************************************************
Title: Use of uninitialized value in Skia - CVE-2017-15418
Severity: <Unspecified>
Fixlet ID: 394701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3947
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15418
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use of uninitialized value in Skia.

***************************************************************
Title: Buffer overflow when drawing and validating elements with ANGLE library using Direct 3D 9 - CVE-2017-7845
Severity: <Unspecified>
Fixlet ID: 400302
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4003
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7845
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash.

***************************************************************
Title: Speculative execution side-channel attack ("Spectre") - CVE-2017-5753
Severity: Medium
Fixlet ID: 400502
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4005
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Speculative execution side-channel attack ("Spectre").

***************************************************************
Title: Speculative execution side-channel attack ("Spectre") - CVE-2017-5715
Severity: Medium
Fixlet ID: 400601
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4006
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5715
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Speculative execution side-channel attack ("Spectre").

***************************************************************
Title: Memory safety bugs fixed in Firefox 57 and Firefox ESR 52.5 - CVE-2017-7826
Severity: <Unspecified>
Fixlet ID: 400701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4007
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7826
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Mozilla developers and community members Christian Holler, David Keeler, Jon Coppeard, Julien Cristau, Jan de Mooij, Jason Kratzer, Philipp, Nicholas Nethercote, Oriol Brufau, André Bargull, Bob Clary, Jet Villegas, Randell Jesup, Tyson Smith, Gary Kwong, and Ryan VanderMeulen reported memory safety bugs present in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

***************************************************************
Title: Use-after-free of PressShell while restyling layout - CVE-2017-7828
Severity: <Unspecified>
Fixlet ID: 400801
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4008
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7828
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: A use-after-free vulnerability can occur when flushing and resizing layout because the PressShell object has been freed while still in use. This results in a potentially exploitable crash during these operations.

***************************************************************
Title: Developer Tools can expose style editor information cross-origin through service worker - CVE-2018-5106
Severity: <Unspecified>
Fixlet ID: 404901
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4049
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5106
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Style editor traffic in the Developer Tools can be routed through a service worker hosted on a third party website if a user selects error links when these tools are open. This can allow style editor information used within Developer Tools to leak cross-origin.

***************************************************************
Title: Race when opening downloaded files - CVE-2018-6033
Severity: <Unspecified>
Fixlet ID: 407001
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4070
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6033
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Race when opening downloaded files.

***************************************************************
Title: UI spoof in Permissions - CVE-2018-6049
Severity: <Unspecified>
Fixlet ID: 407201
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4072
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6049
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: UI spoof in Permissions.

***************************************************************
Title: Referrer policy bypass in Blink - CVE-2018-6048
Severity: <Unspecified>
Fixlet ID: 407301
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4073
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6048
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Referrer policy bypass in Blink.

***************************************************************
Title: Leak of page thumbnails in New Tab Page - CVE-2018-6053
Severity: <Unspecified>
Fixlet ID: 407501
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4075
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6053
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Leak of page thumbnails in New Tab Page.

***************************************************************
Title: Use after free in WebUI - CVE-2018-6054
Severity: <Unspecified>
Fixlet ID: 407701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4077
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6054
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use after free in WebUI.

***************************************************************
Title: Insufficient user gesture requirements in autofill - CVE-2018-6037
Severity: <Unspecified>
Fixlet ID: 407901
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4079
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6037
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Insufficient user gesture requirements in autofill.

***************************************************************
Title: Insufficient isolation of devtools from extensions - CVE-2018-6045
Severity: <Unspecified>
Fixlet ID: 408101
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4081
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6045
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Insufficient isolation of devtools from extensions.

***************************************************************
Title: Cross origin URL leak in WebGL - CVE-2018-6047
Severity: <Unspecified>
Fixlet ID: 408301
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4083
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6047
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Cross origin URL leak in WebGL.

***************************************************************
Title: Insufficient escaping with external URL handlers - CVE-2018-6043
Severity: <Unspecified>
Fixlet ID: 408502
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4085
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6043
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Insufficient escaping with external URL handlers.

***************************************************************
Title: Same origin bypass in Shared Worker - CVE-2018-6032
Severity: <Unspecified>
Fixlet ID: 408601
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4086
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6032
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Same origin bypass in Shared Worker.

***************************************************************
Title: XSS in DevTools - CVE-2018-6039
Severity: <Unspecified>
Fixlet ID: 408801
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4088
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6039
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: XSS in DevTools.

***************************************************************
Title: Heap buffer overflow in WebGL - CVE-2018-6038
Severity: <Unspecified>
Fixlet ID: 409001
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4090
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6038
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Heap buffer overflow in WebGL.

***************************************************************
Title: WebExtension ActiveTab permission allows cross-origin frame content access - CVE-2018-5116
Severity: <Unspecified>
Fixlet ID: 409701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4097
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5116
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: WebExtensions with the ActiveTab permission are able to access frames hosted within the active tab even if the frames are cross-origin. Malicious extensions can inject frames from arbitrary origins into the loaded page and then interact with them, bypassing same-origin user expectations with this permission.

***************************************************************
Title: Memory safety bugs fixed in Firefox 58 - CVE-2018-5090
Severity: <Unspecified>
Fixlet ID: 409901
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4099
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5090
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Mozilla developers and community members Calixte Denizet, Christian Holler, Alex Gaynor, Yoshi Huang, Bob Clary, Nils Ohlmeier, Jason Kratzer, Jesse Ruderman, Philipp, Mike Taylor, Marcia Knous, Paul Adenot, Randell Jesup, JW Wang, Tyson Smith, Emilio Cobos Álvarez, Ted Campbell, Stephen Fewer, and Tristan Bourvon reported memory safety bugs present in Firefox 57. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

***************************************************************
Title: Activity Stream images can attempt to load local content through file: - CVE-2018-5118
Severity: <Unspecified>
Fixlet ID: 410101
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4101
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5118
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through file: URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections.

***************************************************************
Title: Use-after-free while editing form elements - CVE-2018-5096
Severity: <Unspecified>
Fixlet ID: 415701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4157
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5096
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash.

***************************************************************
Title: Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier - CVE-2018-4918
Severity: <Unspecified>
Fixlet ID: 460001
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4600
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4918
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier.

***************************************************************
Title: Microsoft Video Control Elevation of Privilege Vulnerability - CVE-2018-0881
Severity: <Unspecified>
Fixlet ID: 465501
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4655
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0881
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Microsoft Video Control in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege due to how objects are handled in memory, aka "Microsoft Video Control Elevation of Privilege Vulnerability".

***************************************************************
Title: Heap Overflow vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions - CVE-2018-4917
Severity: <Unspecified>
Fixlet ID: 465901
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4659
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4917
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Heap Overflow vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions.

***************************************************************
Title: Windows Desktop Bridge Elevation of Privilege Vulnerability - CVE-2018-0880
Severity: <Unspecified>
Fixlet ID: 468701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4687
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0880
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0882.

***************************************************************
Title: Windows Desktop Bridge Elevation of Privilege Vulnerability - CVE-2018-0882
Severity: <Unspecified>
Fixlet ID: 468901
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4689
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0882
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0880.

***************************************************************
Title: Hyper-V Information Disclosure Vulnerability - CVE-2018-0885
Severity: <Unspecified>
Fixlet ID: 470301
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4703
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0885
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows a denial of service vulnerability due to how input from a privileged user on a guest operating system is validated, aka "Hyper-V Denial of Service Vulnerability".

***************************************************************
Title: Windows Security Feature Bypass Vulnerability - CVE-2018-0884
Severity: <Unspecified>
Fixlet ID: 470701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4707
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0884
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Windows Scripting Host (WSH) in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to how objects are handled in memory, aka "Windows Security Feature Bypass Vulnerability". This CVE is unique from CVE-2018-0902.

***************************************************************
Title: CredSSP Remote Code Execution Vulnerability - CVE-2018-0886
Severity: <Unspecified>
Fixlet ID: 470801
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4708
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0886
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".

***************************************************************
Title: CNG Security Feature Bypass Vulnerability - CVE-2018-0902
Severity: <Unspecified>
Fixlet ID: 470901
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4709
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0902
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Cryptography Next Generation (CNG) kernel-mode driver (cng.sys) in Windows 10 Gold, 1511, 1607, 1703, and 1709. Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to the way the kernel-mode driver validates and enforces impersonation levels, aka "Windows Security Feature Bypass Vulnerability". This CVE is unique from CVE-2018-0884.

***************************************************************
Title: Use After Free (RCE) vulnerability in Adobe Flash Player before 29.0.0.113 - CVE-2018-4919
Severity: <Unspecified>
Fixlet ID: 472801
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4728
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4919
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use After Free (RCE) vulnerability in Adobe Flash Player before 29.0.0.113.

***************************************************************
Title: Type confusion in V8 - CVE-2018-6064
Severity: <Unspecified>
Fixlet ID: 473101
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4731
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6064
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Type confusion in V8.

***************************************************************
Title: Same Origin Bypass via canvas - CVE-2018-6066
Severity: <Unspecified>
Fixlet ID: 473201
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4732
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6066
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Same Origin Bypass via canvas.

***************************************************************
Title: Buffer overflow in Skia - CVE-2018-6067
Severity: <Unspecified>
Fixlet ID: 473401
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4734
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6067
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Buffer overflow in Skia.

***************************************************************
Title: Race condition in V8 - CVE-2018-6061
Severity: <Unspecified>
Fixlet ID: 473701
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4737
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6061
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Race condition in V8.

***************************************************************
Title: Microsoft Exchange Information Disclosure Vulnerability - CVE-2018-0924
Severity: <Unspecified>
Fixlet ID: 474902
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4749
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0924
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allow an information disclosure vulnerability due to how URL redirects are handled, aka "Microsoft Exchange Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0941.

***************************************************************
Title: Microsoft Exchange Elevation of Privilege Vulnerability - CVE-2018-0940
Severity: <Unspecified>
Fixlet ID: 475601
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A4756
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0940
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Exchange Outlook Web Access (OWA) in Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allows an elevation of privilege vulnerability due to how links in the body of an email message are rewritten, aka "Microsoft Exchange Elevation of Privilege Vulnerability".



More information about the WinVulns-Announcements mailing list