SB2019081410 - Multiple vulnerabilities in Microsoft Hyper-V
Published: August 14, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2019-0714)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when Microsoft Hyper-V Network Switch on a host server does not properly validate input from a privileged user on a guest operating system.
Successful exploitation of the vulnerability may result denial of service (DoS) attack against the host system.
2) Input validation error (CVE-ID: CVE-2019-0715)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when Microsoft Hyper-V Network Switch on a host server does not properly validate input from a privileged user on a guest operating system.
Successful exploitation of the vulnerability may result denial of service (DoS) attack against the host system.
3) Input validation error (CVE-ID: CVE-2019-0717)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when Microsoft Hyper-V Network Switch on a host server does not properly validate input from a privileged user on a guest operating system.
Successful exploitation of the vulnerability may result denial of service (DoS) attack against the host system.
4) Input validation error (CVE-ID: CVE-2019-0718)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when Microsoft Hyper-V Network Switch on a host server does not properly validate input from a privileged user on a guest operating system.
Successful exploitation of the vulnerability may result denial of service (DoS) attack against the host system.
5) Input validation error (CVE-ID: CVE-2019-0723)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when Microsoft Hyper-V Network Switch on a host server does not properly validate input from a privileged user on a guest operating system.
Successful exploitation of the vulnerability may result denial of service (DoS) attack against the host system.
6) Input validation error (CVE-ID: CVE-2019-0720)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows Hyper-V Network Switch. A remote authenticated attacker of the guest operating system can execute arbitrary code on the host system.
7) Input validation error (CVE-ID: CVE-2019-0965)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows Hyper-V Network Switch. A remote authenticated attacker of the guest operating system can execute arbitrary code on the host system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0714
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0715
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0717
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0718
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0723
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0720
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0965