CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
100.0%
This host is missing a critical security
update according to Microsoft KB4022724
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811171");
script_version("2023-07-25T05:05:58+0000");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
script_cve_id("CVE-2017-0193", "CVE-2017-8472", "CVE-2017-8473", "CVE-2017-8474",
"CVE-2017-8527", "CVE-2017-8528", "CVE-2017-0282", "CVE-2017-8475",
"CVE-2017-8476", "CVE-2017-8529", "CVE-2017-8531", "CVE-2017-0283",
"CVE-2017-0284", "CVE-2017-8477", "CVE-2017-8478", "CVE-2017-8479",
"CVE-2017-8532", "CVE-2017-8533", "CVE-2017-0285", "CVE-2017-8480",
"CVE-2017-8481", "CVE-2017-8543", "CVE-2017-0287", "CVE-2017-0288",
"CVE-2017-8482", "CVE-2017-8483", "CVE-2017-8544", "CVE-2017-8547",
"CVE-2017-0289", "CVE-2017-0291", "CVE-2017-0292", "CVE-2017-8484",
"CVE-2017-8485", "CVE-2017-8553", "CVE-2017-0294", "CVE-2017-0296",
"CVE-2017-8488", "CVE-2017-8489", "CVE-2017-0297", "CVE-2017-0298",
"CVE-2017-8490", "CVE-2017-8491", "CVE-2017-8492", "CVE-2017-0299",
"CVE-2017-0300", "CVE-2017-8460", "CVE-2017-8462", "CVE-2017-8464",
"CVE-2017-8470", "CVE-2017-8471", "CVE-2017-8519", "CVE-2017-8522",
"CVE-2017-8469", "CVE-2017-8517", "CVE-2017-8554");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
script_tag(name:"creation_date", value:"2017-06-14 15:20:54 +0530 (Wed, 14 Jun 2017)");
script_name("Microsoft Windows Server 2012 Multiple Vulnerabilities (KB4022724)");
script_tag(name:"summary", value:"This host is missing a critical security
update according to Microsoft KB4022724");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- After installing KB3164035, users cannot print enhanced
metafiles (EMF) or documents containing bitmaps rendered out of bounds using the
BitMapSection(DIBSection) function.
- Updates were not correctly installing all components and would prevent them from
booting.
- An unsupported hardware notification is shown and Windows Updates not scanning,
for systems using the AMD Carrizo DDR4 processor.
- Security updates to Windows kernel, Microsoft Graphics Component, Microsoft
Uniscribe, Windows kernel-mode drivers, the Windows OS, Windows COM, Internet
Explorer and Windows Shell.");
script_tag(name:"impact", value:"Successful exploitation will allow attackers
to gain the same user rights as the current user. If the current user is logged
on with administrative user rights, an attacker who successfully exploited the
vulnerability could take control of an affected system. An attacker could then install
programs. View, change, or delete data, or create new accounts with full user rights.");
script_tag(name:"affected", value:"Microsoft Windows Server 2012.");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4022724");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98878");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98851");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98852");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98902");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98933");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98949");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98885");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98853");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98903");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98953");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98819");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98920");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98918");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98854");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98845");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98856");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98820");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98821");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98914");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98857");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98862");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98824");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98922");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98923");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98858");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98859");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98826");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98932");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98929");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98835");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98836");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98847");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98860");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98940");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98837");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98839");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98864");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98865");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98840");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98867");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98869");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98870");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98884");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98901");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98887");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98900");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98818");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98848");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98849");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98899");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98926");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98842");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98895");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_mandatory_keys("SMB/WindowsVersion");
script_require_ports(139, 445);
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win2012:1) <= 0){
exit(0);
}
sysPath = smb_get_system32root();
if(!sysPath ){
exit(0);
}
fileVer = fetch_file_version(sysPath:sysPath, file_name:"win32k.sys");
if(!fileVer){
exit(0);
}
if(version_is_less(version:fileVer, test_version:"6.2.9200.22168"))
{
report = 'File checked: ' + sysPath + "\win32k.sys" + '\n' +
'File version: ' + fileVer + '\n' +
'Vulnerable range: Less than 6.2.9200.22168\n' ;
security_message(data:report);
exit(0);
}
exit(0);
www.securityfocus.com/bid/98818
www.securityfocus.com/bid/98819
www.securityfocus.com/bid/98820
www.securityfocus.com/bid/98821
www.securityfocus.com/bid/98824
www.securityfocus.com/bid/98826
www.securityfocus.com/bid/98835
www.securityfocus.com/bid/98836
www.securityfocus.com/bid/98837
www.securityfocus.com/bid/98839
www.securityfocus.com/bid/98840
www.securityfocus.com/bid/98842
www.securityfocus.com/bid/98845
www.securityfocus.com/bid/98847
www.securityfocus.com/bid/98848
www.securityfocus.com/bid/98849
www.securityfocus.com/bid/98851
www.securityfocus.com/bid/98852
www.securityfocus.com/bid/98853
www.securityfocus.com/bid/98854
www.securityfocus.com/bid/98856
www.securityfocus.com/bid/98857
www.securityfocus.com/bid/98858
www.securityfocus.com/bid/98859
www.securityfocus.com/bid/98860
www.securityfocus.com/bid/98862
www.securityfocus.com/bid/98864
www.securityfocus.com/bid/98865
www.securityfocus.com/bid/98867
www.securityfocus.com/bid/98869
www.securityfocus.com/bid/98870
www.securityfocus.com/bid/98878
www.securityfocus.com/bid/98884
www.securityfocus.com/bid/98885
www.securityfocus.com/bid/98887
www.securityfocus.com/bid/98895
www.securityfocus.com/bid/98899
www.securityfocus.com/bid/98900
www.securityfocus.com/bid/98901
www.securityfocus.com/bid/98902
www.securityfocus.com/bid/98903
www.securityfocus.com/bid/98914
www.securityfocus.com/bid/98918
www.securityfocus.com/bid/98920
www.securityfocus.com/bid/98922
www.securityfocus.com/bid/98923
www.securityfocus.com/bid/98926
www.securityfocus.com/bid/98929
www.securityfocus.com/bid/98932
www.securityfocus.com/bid/98933
www.securityfocus.com/bid/98940
www.securityfocus.com/bid/98949
www.securityfocus.com/bid/98953
support.microsoft.com/en-us/help/4022724
www.cisa.gov/known-exploited-vulnerabilities-catalog
Known Exploited Vulnerability (KEV) catalog
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
100.0%