CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.4%
This host is missing a critical security
update according to Microsoft KB4074588
# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.812915");
script_version("2023-11-03T16:10:08+0000");
script_cve_id("CVE-2018-0742", "CVE-2018-0756", "CVE-2018-0757", "CVE-2018-0763",
"CVE-2018-0809", "CVE-2018-0820", "CVE-2018-0821", "CVE-2018-0822",
"CVE-2018-0823", "CVE-2018-0825", "CVE-2018-0826", "CVE-2018-0827",
"CVE-2018-0829", "CVE-2018-0830", "CVE-2018-0831", "CVE-2018-0832",
"CVE-2018-0834", "CVE-2018-0835", "CVE-2018-0836", "CVE-2018-0837",
"CVE-2018-0838", "CVE-2018-0840", "CVE-2018-0842", "CVE-2018-0843",
"CVE-2018-0844", "CVE-2018-0846", "CVE-2018-0847", "CVE-2018-0856",
"CVE-2018-0857", "CVE-2018-0859", "CVE-2018-0860", "CVE-2018-0866");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-11-03 16:10:08 +0000 (Fri, 03 Nov 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-08-24 17:37:00 +0000 (Mon, 24 Aug 2020)");
script_tag(name:"creation_date", value:"2018-02-14 13:19:41 +0530 (Wed, 14 Feb 2018)");
script_name("Microsoft Windows Multiple Vulnerabilities (KB4074588)");
script_tag(name:"summary", value:"This host is missing a critical security
update according to Microsoft KB4074588");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- Multiple errors in the way the scripting engine handles objects in
memory in Microsoft browsers.
- An error when the Windows kernel fails to properly handle objects in memory.
- An error when the Windows kernel fails to properly initialize a memory address.
- An error when the Windows Common Log File System (CLFS) driver improperly
handles objects in memory.
- An error when VBScript improperly discloses the contents of its memory, which
could provide an attacker with information to further compromise the user
computer or data.
- An error when Storage Services improperly handles objects in memory.
- An error in Windows Scripting Host which could allow an attacker to bypass
Device Guard.
- An error in StructuredQuery when the software fails to properly handle objects
in memory.
- An error when NTFS improperly handles objects.
- An error when Named Pipe File System improperly handles objects.
- An error when AppContainer improperly implements constrained impersonation.
- An error as Microsoft has deprecated the Document Signing functionality in XPS
Viewer.
- An error in the Windows kernel that could allow an attacker to retrieve
information that could lead to a Kernel Address Space Layout Randomization
(ASLR) bypass.");
script_tag(name:"impact", value:"Successful exploitation will allow an attacker
to gain the same user rights as the current user, run arbitrary code in kernel
mode, obtain information to further compromise the user, run processes in an
elevated context, circumvent a User Mode Code Integrity (UMCI) policy on the
machine, spoof content, perform phishing attacks, or otherwise manipulate
content of a document.");
script_tag(name:"affected", value:"- Microsoft Windows 10 Version 1709 for 32-bit Systems
- Microsoft Windows 10 Version 1709 for 64-based Systems");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4074588");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone AG");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win10:1, win10x64:1) <= 0){
exit(0);
}
sysPath = smb_get_system32root();
if(!sysPath ){
exit(0);
}
edgeVer = fetch_file_version(sysPath:sysPath, file_name:"edgehtml.dll");
if(!edgeVer){
exit(0);
}
if(version_in_range(version:edgeVer, test_version:"11.0.16299.0", test_version2:"11.0.16299.247"))
{
report = report_fixed_ver(file_checked:sysPath + "\edgehtml.dll",
file_version:edgeVer, vulnerable_range:"11.0.16299.0 - 11.0.16299.247");
security_message(data:report);
exit(0);
}
exit(0);
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
99.4%