SB2021011243 - Multiple vulnerabilities in Microsoft Remote Procedure Call Runtime
Published: January 12, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2021-1700)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1702)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Procedure Call Runtime, which leads to security restrictions bypass and privilege escalation.
3) Input validation error (CVE-ID: CVE-2021-1673)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
4) Input validation error (CVE-ID: CVE-2021-1671)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
5) Input validation error (CVE-ID: CVE-2021-1667)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
6) Input validation error (CVE-ID: CVE-2021-1660)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
7) Input validation error (CVE-ID: CVE-2021-1658)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
8) Input validation error (CVE-ID: CVE-2021-1666)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
9) Input validation error (CVE-ID: CVE-2021-1701)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
10) Input validation error (CVE-ID: CVE-2021-1664)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1700
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1702
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1673
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1671
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1667
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1660
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1658
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1666
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1701
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1664