SB2023071163 - Multiple vulnerabilities in Microsoft Remote Procedure Call Runtime
Published: July 11, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 14 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2023-33166)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
2) Input validation error (CVE-ID: CVE-2023-35300)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
3) Input validation error (CVE-ID: CVE-2023-33164)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
4) Input validation error (CVE-ID: CVE-2023-35319)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
5) Input validation error (CVE-ID: CVE-2023-35318)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
6) Out-of-bounds read (CVE-ID: CVE-2023-35316)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the Remote Procedure Call Runtime. A remote user can trigger an out-of-bounds read error and read contents of memory on the system.
7) Input validation error (CVE-ID: CVE-2023-35314)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
8) Input validation error (CVE-ID: CVE-2023-32035)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
9) Input validation error (CVE-ID: CVE-2023-32034)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
10) Input validation error (CVE-ID: CVE-2023-33173)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
11) Input validation error (CVE-ID: CVE-2023-33172)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
12) Input validation error (CVE-ID: CVE-2023-33169)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
13) Input validation error (CVE-ID: CVE-2023-33168)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
14) Input validation error (CVE-ID: CVE-2023-33167)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Remote Procedure Call Runtime. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33166
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35300
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33164
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35319
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35318
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35316
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35314
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-32035
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-32034
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33173
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33172
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33169
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33168
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-33167