CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
98.9%
This host is missing a critical security
update according to Microsoft KB4041690
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811927");
script_version("2023-07-25T05:05:58+0000");
script_cve_id("CVE-2017-11762", "CVE-2017-8694", "CVE-2017-8717", "CVE-2017-11763",
"CVE-2017-11765", "CVE-2017-8718", "CVE-2017-8727", "CVE-2017-11815",
"CVE-2017-11771", "CVE-2017-11772", "CVE-2017-11779", "CVE-2017-11780",
"CVE-2017-11781", "CVE-2017-11784", "CVE-2017-11785", "CVE-2017-11790",
"CVE-2017-11793", "CVE-2017-11810", "CVE-2017-11816", "CVE-2017-11817",
"CVE-2017-11818", "CVE-2017-11824", "CVE-2017-11814", "CVE-2017-13080");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
script_tag(name:"creation_date", value:"2017-10-11 08:59:57 +0530 (Wed, 11 Oct 2017)");
script_name("Microsoft Windows Server 2012 Multiple Vulnerabilities (KB4041690)");
script_tag(name:"summary", value:"This host is missing a critical security
update according to Microsoft KB4041690");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- A spoofing vulnerability in the Windows implementation of wireless networking (KRACK)
- An error in USBHUB.SYS randomly causes memory corruption that results in
random system crashes that are extremely difficult to diagnose.
- Security updates to Microsoft Windows Search Component, Windows kernel-mode drivers,
Microsoft Graphics Component, Internet Explorer, Windows kernel, Windows Wireless
Networking, Windows Storage and File systems, Microsoft Windows DNS, Microsoft JET
Database Engine, and the Windows SMB Server.");
script_tag(name:"impact", value:"Successful exploitation will allow an attacker
to run arbitrary code in the security context of the local system to take
complete control of an affected system, gain access to potentially sensitive
information, conduct a denial-of-service condition, bypass certain security
restrictions and gain elevated privileges.");
script_tag(name:"affected", value:"Microsoft Windows Server 2012.");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4041690");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101108");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101100");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101161");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101109");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101111");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101162");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101142");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101114");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101116");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101166");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101110");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101140");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101147");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101149");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101077");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101141");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101081");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101094");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101095");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101101");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101099");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101093");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101136");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101274");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win2012:1) <= 0){
exit(0);
}
sysPath = smb_get_system32root();
if(!sysPath ){
exit(0);
}
fileVer = fetch_file_version(sysPath:sysPath, file_name:"shell32.dll");
if(!fileVer){
exit(0);
}
if(version_is_less(version:fileVer, test_version:"6.2.9200.22281"))
{
report = 'File checked: ' + sysPath + "\shell32.dll" + '\n' +
'File version: ' + fileVer + '\n' +
'Vulnerable range: Less than 6.2.9200.22281\n' ;
security_message(data:report);
exit(0);
}
exit(0);
www.securityfocus.com/bid/101077
www.securityfocus.com/bid/101081
www.securityfocus.com/bid/101093
www.securityfocus.com/bid/101094
www.securityfocus.com/bid/101095
www.securityfocus.com/bid/101099
www.securityfocus.com/bid/101100
www.securityfocus.com/bid/101101
www.securityfocus.com/bid/101108
www.securityfocus.com/bid/101109
www.securityfocus.com/bid/101110
www.securityfocus.com/bid/101111
www.securityfocus.com/bid/101114
www.securityfocus.com/bid/101116
www.securityfocus.com/bid/101136
www.securityfocus.com/bid/101140
www.securityfocus.com/bid/101141
www.securityfocus.com/bid/101142
www.securityfocus.com/bid/101147
www.securityfocus.com/bid/101149
www.securityfocus.com/bid/101161
www.securityfocus.com/bid/101162
www.securityfocus.com/bid/101166
www.securityfocus.com/bid/101274
support.microsoft.com/en-us/help/4041690
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
98.9%