SB2022080932 - Multiple vulnerabilities in Microsoft Windows Secure Socket Tunneling Protocol (SSTP)
Published: August 9, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Race condition (CVE-ID: CVE-2022-34702)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
2) Race condition (CVE-ID: CVE-2022-35753)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
3) Race condition (CVE-ID: CVE-2022-35752)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
4) Race condition (CVE-ID: CVE-2022-35745)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
5) Race condition (CVE-ID: CVE-2022-34714)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
6) Race condition (CVE-ID: CVE-2022-35794)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
7) Race condition (CVE-ID: CVE-2022-35767)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
8) Race condition (CVE-ID: CVE-2022-35766)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to a race condition in the Windows Secure Socket Tunneling Protocol (SSTP). A remote attacker can exploit the race and execute arbitrary code on the target system.
9) Input validation error (CVE-ID: CVE-2022-34701)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows Secure Socket Tunneling Protocol (SSTP). A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34702
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35753
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35752
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35745
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34714
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35794
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35767
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35766
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34701