Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-38169 (GCVE-0-2023-38169)
Vulnerability from cvelistv5 – Published: 2023-08-08 17:08 – Updated: 2025-02-27 21:07- CWE-416 - Use After Free
| URL | Tags |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Microsoft | Microsoft OLE DB Driver 19 for SQL Server |
Affected:
19.0.0 , < 19.3.0001.0
(custom)
|
|
| Microsoft | Microsoft OLE DB Driver 18 for SQL Server |
Affected:
18.0.0 , < 18.6.0006.0
(custom)
|
|
| Microsoft | Microsoft ODBC Driver 18 for SQL Server on Linux |
Affected:
18.0.0.0 , < 18.2.1.1
(custom)
|
|
| Microsoft | Microsoft ODBC Driver 17 for SQL Server on MacOS |
Affected:
17.0.0.0 , < 17.10.4.1
(custom)
|
|
| Microsoft | Microsoft SQL Server 2022 (CU 5) |
Affected:
15.0.0 , < 16.0.4053.3
(custom)
|
|
| Microsoft | Microsoft ODBC Driver 17 for SQL Server on Linux |
Affected:
17.0.0.0 , < 17.10.4.1
(custom)
|
|
| Microsoft | Microsoft ODBC Driver 18 for SQL Server on MacOS |
Affected:
18.0.0.0 , < 18.2.1.1
(custom)
|
|
| Microsoft | Microsoft SQL Server 2019 (CU 21) |
Affected:
15.0.0 , < 15.0.4316.3
(custom)
|
|
| Microsoft | Microsoft ODBC Driver 17 for SQL Server on Windows |
Affected:
17.0.0.0 , < 17.10.4.1
(custom)
|
|
| Microsoft | Microsoft ODBC Driver 18 for SQL Server on Windows |
Affected:
18.0.0.0 , < 18.2.2.1
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:30:14.111Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Microsoft OLE DB Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-38169",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-26T21:53:47.232068Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-27T21:07:23.872Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "Microsoft OLE DB Driver 19 for SQL Server",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "19.3.0001.0",
"status": "affected",
"version": "19.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft OLE DB Driver 18 for SQL Server",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "18.6.0006.0",
"status": "affected",
"version": "18.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft ODBC Driver 18 for SQL Server on Linux",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "18.2.1.1",
"status": "affected",
"version": "18.0.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft ODBC Driver 17 for SQL Server on MacOS",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.10.4.1",
"status": "affected",
"version": "17.0.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Microsoft SQL Server 2022 (CU 5)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.0.4053.3",
"status": "affected",
"version": "15.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft ODBC Driver 17 for SQL Server on Linux",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.10.4.1",
"status": "affected",
"version": "17.0.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft ODBC Driver 18 for SQL Server on MacOS",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "18.2.1.1",
"status": "affected",
"version": "18.0.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Microsoft SQL Server 2019 (CU 21)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "15.0.4316.3",
"status": "affected",
"version": "15.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft ODBC Driver 17 for SQL Server on Windows",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.10.4.1",
"status": "affected",
"version": "17.0.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft ODBC Driver 18 for SQL Server on Windows",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "18.2.2.1",
"status": "affected",
"version": "18.0.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_19_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.3.0001.0",
"versionStartIncluding": "19.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.6.0006.0",
"versionStartIncluding": "18.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2.1.1",
"versionStartIncluding": "18.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.10.4.1",
"versionStartIncluding": "17.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "16.0.4053.3",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.10.4.1",
"versionStartIncluding": "17.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2.1.1",
"versionStartIncluding": "18.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "15.0.4316.3",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.10.4.1",
"versionStartIncluding": "17.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2.2.1",
"versionStartIncluding": "18.0.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2023-08-08T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Microsoft SQL OLE DB Remote Code Execution Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416: Use After Free",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-01T01:59:01.894Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Microsoft SQL OLE DB Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
],
"title": "Microsoft SQL OLE DB Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2023-38169",
"datePublished": "2023-08-08T17:08:44.529Z",
"dateReserved": "2023-07-12T23:41:45.863Z",
"dateUpdated": "2025-02-27T21:07:23.872Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-38169",
"date": "2026-05-20",
"epss": "0.00399",
"percentile": "0.60778"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"68D87353-7F7C-4052-99D5-94A40373B0C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:macos:*:*\", \"matchCriteriaId\": \"C6E79003-37F2-43ED-B9A4-B14446F38CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"C4DA5041-801A-4A3E-A13E-9927AD73DB50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"6871F0BA-B074-45B9-A9B8-108FF8FF51C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:macos:*:*\", \"matchCriteriaId\": \"43237AFF-E6F5-4323-84F5-47E5C27D03B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"D144A950-F990-4ADE-9374-596C2022DE9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"7FCFB10B-AF29-4E15-A338-483284D8278B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:macos:*:*\", \"matchCriteriaId\": \"9CAF68C7-18C8-4BB9-BE85-1004162615F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"034331B2-8062-497B-A071-0EDC69E47469\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:macos:*:*\", \"matchCriteriaId\": \"24B7FC47-0B3A-4780-B39E-CC8841E89ADB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"E04AF938-4D86-46F0-8F6F-0EA190FB280E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"5A71190E-1087-47A0-9B56-B7F0420F9123\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:macos:*:*\", \"matchCriteriaId\": \"F2BE108F-279C-4283-9813-D4114AF6F143\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"F11D57D6-6611-4ABE-AC3B-D38149FD0DF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"150A427F-B6E9-44E4-A9FF-DE8F4151C010\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:macos:*:*\", \"matchCriteriaId\": \"AEE78325-9C25-4C5B-8D27-D0622D64A85D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"5A71690B-0158-4C61-9184-F5C5376A74D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A526EF68-6DBA-4F1A-977E-1F4FEEAF2BC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F101DB23-E39D-42B8-AD51-BDF79740FF73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ACA62FD-C417-4ED4-9B79-5710D56E088B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51C9D564-6370-4104-AEFB-03CC7D29C60F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22602E38-0AB8-40BA-AAB0-A2D77E2EDD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"102CD1A2-69DC-41D1-BBFB-6666D22D11DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"846F1C2C-7339-424C-81EF-C670059221CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67256F0F-3CC5-486C-94CD-06FE76E03012\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32E36DA-245F-48D3-80F3-E85C510FC217\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F731D47-67EA-4EB8-81D2-A1F425E524FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AAC07B4-34F5-4287-B294-0E526B925ED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A45F508-0E06-4B32-8719-ED5BDBFB32B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7339F59F-31A7-4D03-B081-5C76C49F357A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*\", \"matchCriteriaId\": \"9144F644-A3D4-440C-8978-257E71204617\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*\", \"matchCriteriaId\": \"6CB7AD22-F27B-4807-88F1-02ED420421D5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Microsoft SQL OLE DB Remote Code Execution Vulnerability\"}]",
"id": "CVE-2023-38169",
"lastModified": "2024-11-21T08:13:00.150",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2023-08-08T18:15:22.267",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-38169\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2023-08-08T18:15:22.267\",\"lastModified\":\"2024-11-21T08:13:00.150\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft SQL OLE DB Remote Code Execution Vulnerability\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"68D87353-7F7C-4052-99D5-94A40373B0C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"C6E79003-37F2-43ED-B9A4-B14446F38CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"C4DA5041-801A-4A3E-A13E-9927AD73DB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"6871F0BA-B074-45B9-A9B8-108FF8FF51C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"43237AFF-E6F5-4323-84F5-47E5C27D03B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"D144A950-F990-4ADE-9374-596C2022DE9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"7FCFB10B-AF29-4E15-A338-483284D8278B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"9CAF68C7-18C8-4BB9-BE85-1004162615F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"034331B2-8062-497B-A071-0EDC69E47469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"24B7FC47-0B3A-4780-B39E-CC8841E89ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"E04AF938-4D86-46F0-8F6F-0EA190FB280E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"5A71190E-1087-47A0-9B56-B7F0420F9123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"F2BE108F-279C-4283-9813-D4114AF6F143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"F11D57D6-6611-4ABE-AC3B-D38149FD0DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"150A427F-B6E9-44E4-A9FF-DE8F4151C010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"AEE78325-9C25-4C5B-8D27-D0622D64A85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"5A71690B-0158-4C61-9184-F5C5376A74D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A526EF68-6DBA-4F1A-977E-1F4FEEAF2BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F101DB23-E39D-42B8-AD51-BDF79740FF73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ACA62FD-C417-4ED4-9B79-5710D56E088B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C9D564-6370-4104-AEFB-03CC7D29C60F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22602E38-0AB8-40BA-AAB0-A2D77E2EDD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102CD1A2-69DC-41D1-BBFB-6666D22D11DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"846F1C2C-7339-424C-81EF-C670059221CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67256F0F-3CC5-486C-94CD-06FE76E03012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32E36DA-245F-48D3-80F3-E85C510FC217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F731D47-67EA-4EB8-81D2-A1F425E524FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AAC07B4-34F5-4287-B294-0E526B925ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A45F508-0E06-4B32-8719-ED5BDBFB32B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7339F59F-31A7-4D03-B081-5C76C49F357A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"9144F644-A3D4-440C-8978-257E71204617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"6CB7AD22-F27B-4807-88F1-02ED420421D5\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Microsoft SQL OLE DB Remote Code Execution Vulnerability\", \"datePublic\": \"2023-08-08T07:00:00.000Z\", \"cpeApplicability\": [{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_19_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"19.0.0\", \"versionEndExcluding\": \"19.3.0001.0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:ole_db_driver_18_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"18.0.0\", \"versionEndExcluding\": \"18.6.0006.0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"18.0.0.0\", \"versionEndExcluding\": \"18.2.1.1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.0.0.0\", \"versionEndExcluding\": \"17.10.4.1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*\", \"versionStartIncluding\": \"15.0.0\", \"versionEndExcluding\": \"16.0.4053.3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.0.0.0\", \"versionEndExcluding\": \"17.10.4.1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"18.0.0.0\", \"versionEndExcluding\": \"18.2.1.1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:x64:*\", \"versionStartIncluding\": \"15.0.0\", \"versionEndExcluding\": \"15.0.4316.3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_17_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.0.0.0\", \"versionEndExcluding\": \"17.10.4.1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:odbc_driver_18_for_sql_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"18.0.0.0\", \"versionEndExcluding\": \"18.2.2.1\"}]}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Microsoft OLE DB Driver 19 for SQL Server\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"19.0.0\", \"lessThan\": \"19.3.0001.0\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft OLE DB Driver 18 for SQL Server\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"18.0.0\", \"lessThan\": \"18.6.0006.0\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft ODBC Driver 18 for SQL Server on Linux\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"18.0.0.0\", \"lessThan\": \"18.2.1.1\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft ODBC Driver 17 for SQL Server on MacOS\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"17.0.0.0\", \"lessThan\": \"17.10.4.1\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft SQL Server 2022 (CU 5)\", \"platforms\": [\"x64-based Systems\"], \"versions\": [{\"version\": \"15.0.0\", \"lessThan\": \"16.0.4053.3\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft ODBC Driver 17 for SQL Server on Linux\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"17.0.0.0\", \"lessThan\": \"17.10.4.1\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft ODBC Driver 18 for SQL Server on MacOS\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"18.0.0.0\", \"lessThan\": \"18.2.1.1\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft SQL Server 2019 (CU 21)\", \"platforms\": [\"x64-based Systems\"], \"versions\": [{\"version\": \"15.0.0\", \"lessThan\": \"15.0.4316.3\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft ODBC Driver 17 for SQL Server on Windows\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"17.0.0.0\", \"lessThan\": \"17.10.4.1\", \"versionType\": \"custom\", \"status\": \"affected\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft ODBC Driver 18 for SQL Server on Windows\", \"platforms\": [\"Unknown\"], \"versions\": [{\"version\": \"18.0.0.0\", \"lessThan\": \"18.2.2.1\", \"versionType\": \"custom\", \"status\": \"affected\"}]}], \"descriptions\": [{\"value\": \"Microsoft SQL OLE DB Remote Code Execution Vulnerability\", \"lang\": \"en-US\"}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"CWE-416: Use After Free\", \"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-416\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-01-01T01:59:01.894Z\"}, \"references\": [{\"name\": \"Microsoft SQL OLE DB Remote Code Execution Vulnerability\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\"}], \"metrics\": [{\"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}], \"cvssV3_1\": {\"version\": \"3.1\", \"baseSeverity\": \"HIGH\", \"baseScore\": 8.8, \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C\"}}]}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T17:30:14.111Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"name\": \"Microsoft OLE DB Remote Code Execution Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-38169\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-26T21:53:47.232068Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-26T20:39:42.457Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2023-38169\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"microsoft\", \"dateReserved\": \"2023-07-12T23:41:45.863Z\", \"datePublished\": \"2023-08-08T17:08:44.529Z\", \"dateUpdated\": \"2025-02-27T21:07:23.872Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0642
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer un déni de service, une élévation de privilèges, un contournement de la fonctionnalité de sécurité, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows Defender Antimalware Platform | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 | ||
| Microsoft | Windows | Microsoft ODBC Driver 18 pour SQL Server sur Windows | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Microsoft ODBC Driver 17 pour SQL Server sur Windows | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Defender Antimalware Platform",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur Windows",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur Windows",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35384"
},
{
"name": "CVE-2023-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36909"
},
{
"name": "CVE-2023-36876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36876"
},
{
"name": "CVE-2023-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36889"
},
{
"name": "CVE-2023-38172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38172"
},
{
"name": "CVE-2023-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36913"
},
{
"name": "CVE-2023-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36911"
},
{
"name": "CVE-2023-35359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35359"
},
{
"name": "CVE-2023-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36903"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38154"
},
{
"name": "CVE-2023-38186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38186"
},
{
"name": "CVE-2023-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38184"
},
{
"name": "CVE-2023-38254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38254"
},
{
"name": "CVE-2023-35383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35383"
},
{
"name": "CVE-2023-35387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35387"
},
{
"name": "CVE-2023-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36912"
},
{
"name": "CVE-2023-35380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35380"
},
{
"name": "CVE-2023-36907",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36907"
},
{
"name": "CVE-2023-35378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35378"
},
{
"name": "CVE-2023-38175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38175"
},
{
"name": "CVE-2023-35376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35376"
},
{
"name": "CVE-2023-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36910"
},
{
"name": "CVE-2023-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36898"
},
{
"name": "CVE-2023-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36914"
},
{
"name": "CVE-2023-35381",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35381"
},
{
"name": "CVE-2023-35385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35385"
},
{
"name": "CVE-2023-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38169"
},
{
"name": "CVE-2023-35377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35377"
},
{
"name": "CVE-2023-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36905"
},
{
"name": "CVE-2023-35386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35386"
},
{
"name": "CVE-2023-35379",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35379"
},
{
"name": "CVE-2023-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36906"
},
{
"name": "CVE-2023-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36882"
},
{
"name": "CVE-2023-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36904"
},
{
"name": "CVE-2023-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36900"
},
{
"name": "CVE-2023-35382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35382"
},
{
"name": "CVE-2023-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36908"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36876 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36876"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35359 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35378 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38186 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35385 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36910 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-20569 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20569"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36882 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35379 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38254 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36913 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35381 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35386 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35376 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36909 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35384 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35377 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36908 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36911 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36903 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38175 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38175"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38172 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38172"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35382 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38169 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35383 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36904 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36912 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36905 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36914 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36914"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35380 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38154 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35387 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35387"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38184 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36907 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36900 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36889 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36906 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36898 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36898"
}
],
"reference": "CERTFR-2023-AVI-0642",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une ex\u00e9cution de code\narbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0645
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un déni de service, une élévation de privilèges, une usurpation d'identité, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft | N/A | Microsoft ODBC Driver 17 pour SQL Server sur Linux | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Teams pour Android | ||
| Microsoft | N/A | Microsoft ODBC Driver 18 pour SQL Server sur Linux | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 5) | ||
| Microsoft | N/A | Microsoft OLE DB Driver 19 pour SQL Server | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Teams pour iOS | ||
| Microsoft | N/A | HEVC Video Extensions | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 21) | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | Office | Microsoft Visual Studio 2010 Tools pour Office Runtime | ||
| Microsoft | N/A | HEVC Video Extension | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central 2023 Release Wave 1 | ||
| Microsoft | N/A | Microsoft ODBC Driver 17 pour SQL Server sur MacOS | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | Microsoft Teams pour Desktop | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | Microsoft OLE DB Driver 18 pour SQL Server | ||
| Microsoft | N/A | Microsoft Teams pour Mac | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 | ||
| Microsoft | N/A | Microsoft ODBC Driver 18 pour SQL Server sur MacOS |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Android",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft OLE DB Driver 19 pour SQL Server",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "HEVC Video Extensions",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 21)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2010 Tools pour Office Runtime",
"product": {
"name": "Office",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "HEVC Video Extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central 2023 Release Wave 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur MacOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Desktop",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft OLE DB Driver 18 pour SQL Server",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur MacOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35390"
},
{
"name": "CVE-2023-35368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35368"
},
{
"name": "CVE-2023-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38167"
},
{
"name": "CVE-2023-35388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35388"
},
{
"name": "CVE-2023-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36891"
},
{
"name": "CVE-2023-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38170"
},
{
"name": "CVE-2023-36892",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36892"
},
{
"name": "CVE-2023-29328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29328"
},
{
"name": "CVE-2023-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21709"
},
{
"name": "CVE-2023-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38180"
},
{
"name": "CVE-2023-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38185"
},
{
"name": "CVE-2023-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38178"
},
{
"name": "CVE-2023-35389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35389"
},
{
"name": "CVE-2023-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38181"
},
{
"name": "CVE-2023-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38169"
},
{
"name": "CVE-2023-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36890"
},
{
"name": "CVE-2023-29330",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29330"
},
{
"name": "CVE-2023-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36897"
},
{
"name": "CVE-2023-35391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35391"
},
{
"name": "CVE-2023-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36894"
},
{
"name": "CVE-2023-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38182"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35388 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35388"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38185 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38185"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29330 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29330"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38180 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38181 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38181"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35390 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36891 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36891"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36890 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36890"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38182 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38182"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35389 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35389"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29328 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29328"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35368 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35368"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36894 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36894"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36892 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36892"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-21709 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21709"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35391 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38169 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38170 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38170"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38167 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38167"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36897 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38178 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178"
}
],
"reference": "CERTFR-2023-AVI-0645",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une \u00e9l\u00e9vation de privil\u00e8ges,\nune usurpation d\u0027identit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0642
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer un déni de service, une élévation de privilèges, un contournement de la fonctionnalité de sécurité, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows Defender Antimalware Platform | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 | ||
| Microsoft | Windows | Microsoft ODBC Driver 18 pour SQL Server sur Windows | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Microsoft ODBC Driver 17 pour SQL Server sur Windows | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Defender Antimalware Platform",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur Windows",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur Windows",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35384"
},
{
"name": "CVE-2023-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36909"
},
{
"name": "CVE-2023-36876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36876"
},
{
"name": "CVE-2023-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36889"
},
{
"name": "CVE-2023-38172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38172"
},
{
"name": "CVE-2023-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36913"
},
{
"name": "CVE-2023-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36911"
},
{
"name": "CVE-2023-35359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35359"
},
{
"name": "CVE-2023-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36903"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38154"
},
{
"name": "CVE-2023-38186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38186"
},
{
"name": "CVE-2023-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38184"
},
{
"name": "CVE-2023-38254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38254"
},
{
"name": "CVE-2023-35383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35383"
},
{
"name": "CVE-2023-35387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35387"
},
{
"name": "CVE-2023-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36912"
},
{
"name": "CVE-2023-35380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35380"
},
{
"name": "CVE-2023-36907",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36907"
},
{
"name": "CVE-2023-35378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35378"
},
{
"name": "CVE-2023-38175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38175"
},
{
"name": "CVE-2023-35376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35376"
},
{
"name": "CVE-2023-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36910"
},
{
"name": "CVE-2023-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36898"
},
{
"name": "CVE-2023-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36914"
},
{
"name": "CVE-2023-35381",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35381"
},
{
"name": "CVE-2023-35385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35385"
},
{
"name": "CVE-2023-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38169"
},
{
"name": "CVE-2023-35377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35377"
},
{
"name": "CVE-2023-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36905"
},
{
"name": "CVE-2023-35386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35386"
},
{
"name": "CVE-2023-35379",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35379"
},
{
"name": "CVE-2023-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36906"
},
{
"name": "CVE-2023-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36882"
},
{
"name": "CVE-2023-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36904"
},
{
"name": "CVE-2023-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36900"
},
{
"name": "CVE-2023-35382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35382"
},
{
"name": "CVE-2023-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36908"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36876 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36876"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35359 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35378 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38186 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35385 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36910 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-20569 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-20569"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36882 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35379 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38254 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36913 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35381 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35386 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35376 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36909 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35384 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35377 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36908 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36911 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36903 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38175 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38175"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38172 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38172"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35382 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38169 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35383 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36904 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36912 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36905 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36914 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36914"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35380 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38154 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35387 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35387"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38184 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36907 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36900 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36889 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36906 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36898 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36898"
}
],
"reference": "CERTFR-2023-AVI-0642",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une ex\u00e9cution de code\narbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0645
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un déni de service, une élévation de privilèges, une usurpation d'identité, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft | N/A | Microsoft ODBC Driver 17 pour SQL Server sur Linux | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Teams pour Android | ||
| Microsoft | N/A | Microsoft ODBC Driver 18 pour SQL Server sur Linux | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 5) | ||
| Microsoft | N/A | Microsoft OLE DB Driver 19 pour SQL Server | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Teams pour iOS | ||
| Microsoft | N/A | HEVC Video Extensions | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 21) | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | Office | Microsoft Visual Studio 2010 Tools pour Office Runtime | ||
| Microsoft | N/A | HEVC Video Extension | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central 2023 Release Wave 1 | ||
| Microsoft | N/A | Microsoft ODBC Driver 17 pour SQL Server sur MacOS | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | Microsoft Teams pour Desktop | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | Microsoft OLE DB Driver 18 pour SQL Server | ||
| Microsoft | N/A | Microsoft Teams pour Mac | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 | ||
| Microsoft | N/A | Microsoft ODBC Driver 18 pour SQL Server sur MacOS |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Android",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft OLE DB Driver 19 pour SQL Server",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "HEVC Video Extensions",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 21)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2010 Tools pour Office Runtime",
"product": {
"name": "Office",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "HEVC Video Extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central 2023 Release Wave 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur MacOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Desktop",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft OLE DB Driver 18 pour SQL Server",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur MacOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-35390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35390"
},
{
"name": "CVE-2023-35368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35368"
},
{
"name": "CVE-2023-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38167"
},
{
"name": "CVE-2023-35388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35388"
},
{
"name": "CVE-2023-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36891"
},
{
"name": "CVE-2023-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38170"
},
{
"name": "CVE-2023-36892",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36892"
},
{
"name": "CVE-2023-29328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29328"
},
{
"name": "CVE-2023-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21709"
},
{
"name": "CVE-2023-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38180"
},
{
"name": "CVE-2023-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38185"
},
{
"name": "CVE-2023-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38178"
},
{
"name": "CVE-2023-35389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35389"
},
{
"name": "CVE-2023-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38181"
},
{
"name": "CVE-2023-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38169"
},
{
"name": "CVE-2023-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36890"
},
{
"name": "CVE-2023-29330",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29330"
},
{
"name": "CVE-2023-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36897"
},
{
"name": "CVE-2023-35391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35391"
},
{
"name": "CVE-2023-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36894"
},
{
"name": "CVE-2023-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38182"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35388 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35388"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38185 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38185"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29330 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29330"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38180 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38181 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38181"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35390 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36891 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36891"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36890 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36890"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38182 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38182"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35389 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35389"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-29328 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29328"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35368 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35368"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36894 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36894"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36892 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36892"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-21709 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21709"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35391 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38169 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38170 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38170"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38167 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38167"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36897 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38178 du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178"
}
],
"reference": "CERTFR-2023-AVI-0645",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une \u00e9l\u00e9vation de privil\u00e8ges,\nune usurpation d\u0027identit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 08 ao\u00fbt 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
BDU:2023-04613
Vulnerability from fstec - Published: 08.08.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO566",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO566 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 OLE DB \u0434\u043b\u044f SQL Server",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "17 (Microsoft ODBC Driver for SQL Server), 18 (Microsoft ODBC Driver for SQL Server), 2019 (CU 21) (Microsoft SQL Server), 2022 (CU 5) (Microsoft SQL Server), 19 (Microsoft ODBC Driver for SQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "11.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.08.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-04613",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-38169",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Microsoft ODBC Driver for SQL Server, Microsoft SQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432 ODBC \u0438 OLE DB \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432 ODBC \u0438 OLE DB \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169\nhttps://vuldb.com/zh/?id.236516\nhttps://www.cybersecurity-help.cz/vdb/SB2023080869",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
FKIE_CVE-2023-38169
Vulnerability from fkie_nvd - Published: 2023-08-08 18:15 - Updated: 2024-11-21 08:13| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | odbc_driver_for_sql_server | 17.0.1.1 | |
| microsoft | odbc_driver_for_sql_server | 17.0.1.1 | |
| microsoft | odbc_driver_for_sql_server | 17.0.1.1 | |
| microsoft | odbc_driver_for_sql_server | 17.10.3.1 | |
| microsoft | odbc_driver_for_sql_server | 17.10.3.1 | |
| microsoft | odbc_driver_for_sql_server | 17.10.3.1 | |
| microsoft | odbc_driver_for_sql_server | 17.10.4.1 | |
| microsoft | odbc_driver_for_sql_server | 17.10.4.1 | |
| microsoft | odbc_driver_for_sql_server | 18.0.1.1 | |
| microsoft | odbc_driver_for_sql_server | 18.0.1.1 | |
| microsoft | odbc_driver_for_sql_server | 18.0.1.1 | |
| microsoft | odbc_driver_for_sql_server | 18.1.2.1 | |
| microsoft | odbc_driver_for_sql_server | 18.1.2.1 | |
| microsoft | odbc_driver_for_sql_server | 18.1.2.1 | |
| microsoft | odbc_driver_for_sql_server | 18.2.1.1 | |
| microsoft | odbc_driver_for_sql_server | 18.2.1.1 | |
| microsoft | odbc_driver_for_sql_server | 18.2.1.1 | |
| microsoft | ole_db_driver_for_sql_server | 18.0.2 | |
| microsoft | ole_db_driver_for_sql_server | 18.1.0 | |
| microsoft | ole_db_driver_for_sql_server | 18.2.1 | |
| microsoft | ole_db_driver_for_sql_server | 18.2.2 | |
| microsoft | ole_db_driver_for_sql_server | 18.2.3 | |
| microsoft | ole_db_driver_for_sql_server | 18.3.0 | |
| microsoft | ole_db_driver_for_sql_server | 18.4.0 | |
| microsoft | ole_db_driver_for_sql_server | 18.5.0 | |
| microsoft | ole_db_driver_for_sql_server | 18.6.0 | |
| microsoft | ole_db_driver_for_sql_server | 19.0.0 | |
| microsoft | ole_db_driver_for_sql_server | 19.1.0 | |
| microsoft | ole_db_driver_for_sql_server | 19.2.0 | |
| microsoft | ole_db_driver_for_sql_server | 19.3.0 | |
| microsoft | sql_server | 2019 | |
| microsoft | sql_server | 2022 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:linux:*:*",
"matchCriteriaId": "68D87353-7F7C-4052-99D5-94A40373B0C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:macos:*:*",
"matchCriteriaId": "C6E79003-37F2-43ED-B9A4-B14446F38CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "C4DA5041-801A-4A3E-A13E-9927AD73DB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:linux:*:*",
"matchCriteriaId": "6871F0BA-B074-45B9-A9B8-108FF8FF51C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:macos:*:*",
"matchCriteriaId": "43237AFF-E6F5-4323-84F5-47E5C27D03B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "D144A950-F990-4ADE-9374-596C2022DE9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:linux:*:*",
"matchCriteriaId": "7FCFB10B-AF29-4E15-A338-483284D8278B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:macos:*:*",
"matchCriteriaId": "9CAF68C7-18C8-4BB9-BE85-1004162615F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:linux:*:*",
"matchCriteriaId": "034331B2-8062-497B-A071-0EDC69E47469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:macos:*:*",
"matchCriteriaId": "24B7FC47-0B3A-4780-B39E-CC8841E89ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "E04AF938-4D86-46F0-8F6F-0EA190FB280E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:linux:*:*",
"matchCriteriaId": "5A71190E-1087-47A0-9B56-B7F0420F9123",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:macos:*:*",
"matchCriteriaId": "F2BE108F-279C-4283-9813-D4114AF6F143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "F11D57D6-6611-4ABE-AC3B-D38149FD0DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:linux:*:*",
"matchCriteriaId": "150A427F-B6E9-44E4-A9FF-DE8F4151C010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:macos:*:*",
"matchCriteriaId": "AEE78325-9C25-4C5B-8D27-D0622D64A85D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "5A71690B-0158-4C61-9184-F5C5376A74D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A526EF68-6DBA-4F1A-977E-1F4FEEAF2BC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F101DB23-E39D-42B8-AD51-BDF79740FF73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACA62FD-C417-4ED4-9B79-5710D56E088B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "51C9D564-6370-4104-AEFB-03CC7D29C60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22602E38-0AB8-40BA-AAB0-A2D77E2EDD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "102CD1A2-69DC-41D1-BBFB-6666D22D11DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "846F1C2C-7339-424C-81EF-C670059221CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67256F0F-3CC5-486C-94CD-06FE76E03012",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D32E36DA-245F-48D3-80F3-E85C510FC217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F731D47-67EA-4EB8-81D2-A1F425E524FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0AAC07B4-34F5-4287-B294-0E526B925ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A45F508-0E06-4B32-8719-ED5BDBFB32B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7339F59F-31A7-4D03-B081-5C76C49F357A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*",
"matchCriteriaId": "9144F644-A3D4-440C-8978-257E71204617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*",
"matchCriteriaId": "6CB7AD22-F27B-4807-88F1-02ED420421D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft SQL OLE DB Remote Code Execution Vulnerability"
}
],
"id": "CVE-2023-38169",
"lastModified": "2024-11-21T08:13:00.150",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2023-08-08T18:15:22.267",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-V2FP-MJM4-PJ44
Vulnerability from github – Published: 2023-08-08 18:30 – Updated: 2023-11-07 00:30Microsoft OLE DB Remote Code Execution Vulnerability
{
"affected": [],
"aliases": [
"CVE-2023-38169"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-08-08T18:15:22Z",
"severity": "HIGH"
},
"details": "Microsoft OLE DB Remote Code Execution Vulnerability",
"id": "GHSA-v2fp-mjm4-pj44",
"modified": "2023-11-07T00:30:31Z",
"published": "2023-08-08T18:30:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38169"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-38169
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-38169",
"id": "GSD-2023-38169"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-38169"
],
"details": "Microsoft SQL OLE DB Remote Code Execution Vulnerability",
"id": "GSD-2023-38169",
"modified": "2023-12-13T01:20:35.619146Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2023-38169",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft OLE DB Driver 19 for SQL Server",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "19.0.0",
"version_value": "19.3.0001.0"
}
]
}
},
{
"product_name": "Microsoft OLE DB Driver 18 for SQL Server",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "18.0.0",
"version_value": "18.6.0006.0"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 18 for SQL Server on Linux",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "18.0.0.0",
"version_value": "18.2.1.1"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 17 for SQL Server on MacOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.0.0.0",
"version_value": "17.10.4.1"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2022 (CU 5)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "15.0.0",
"version_value": "16.0.4053.3"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 17 for SQL Server on Linux",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.0.0.0",
"version_value": "17.10.4.1"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 18 for SQL Server on MacOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "18.0.0.0",
"version_value": "18.2.1.1"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019 (CU 21)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "15.0.0",
"version_value": "15.0.4316.3"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 17 for SQL Server on Windows",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.0.0.0",
"version_value": "17.10.4.1"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 18 for SQL Server on Windows",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "18.0.0.0",
"version_value": "18.2.2.1"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL OLE DB Remote Code Execution Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169",
"refsource": "MISC",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:macos:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:macos:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:macos:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.4.1:*:*:*:*:macos:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:macos:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:macos:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:18.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.10.3.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.1.2.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:17.0.1.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.2.1.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:18.0.1.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2023-38169"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Microsoft SQL OLE DB Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
]
}
},
"impact": {},
"lastModifiedDate": "2023-11-06T23:15Z",
"publishedDate": "2023-08-08T18:15Z"
}
}
}
ICSA-24-102-08
Vulnerability from csaf_cisa - Published: 2023-04-11 00:00 - Updated: 2025-09-09 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
OpenPCS 7 V9.1
Siemens / OpenPCS 7 V9.1
|
vers:all/* |
Mitigation
No Fix Planned
|
|
|
SIMATIC NET PC Software V14
Siemens / SIMATIC NET PC Software V14
|
vers:all/* |
Mitigation
No Fix Planned
|
|
|
SIMATIC NET PC Software V15
Siemens / SIMATIC NET PC Software V15
|
vers:all/* |
Mitigation
No Fix Planned
|
|
|
SIMATIC NET PC Software V16
Siemens / SIMATIC NET PC Software V16
|
<V16_Update_8 |
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC NET PC Software V17
Siemens / SIMATIC NET PC Software V17
|
<V17_SP1_Update_1 |
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC NET PC Software V18
Siemens / SIMATIC NET PC Software V18
|
<V18_Update_1 |
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC Process Historian 2020 OPC UA Server
Siemens / SIMATIC Process Historian 2020 OPC UA Server
|
vers:all/* |
Mitigation
No Fix Planned
|
|
|
SIMATIC Process Historian 2022 OPC UA Server
Siemens / SIMATIC Process Historian 2022 OPC UA Server
|
<V2022_SP1 |
Mitigation
Vendor Fix
|
|
|
SIMATIC WinCC
Siemens / SIMATIC WinCC
|
vers:intdot/<8.0 |
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC WinCC Runtime Professional
Siemens / SIMATIC WinCC Runtime Professional
|
<V18_Update_2 |
Mitigation
Vendor Fix
|
|
|
SIMATIC WinCC Unified PC Runtime V18
Siemens / SIMATIC WinCC Unified PC Runtime V18
|
<V18.0_SP1_Update_1 |
Mitigation
Vendor Fix
fix
|
|
|
TeleControl Server Basic V3
Siemens / TeleControl Server Basic V3
|
vers:intdot/<3.1.2 |
Mitigation
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://cert-portal.siemens.com/productcert/csaf/… | self |
| https://cert-portal.siemens.com/productcert/html/… | self |
| https://raw.githubusercontent.com/cisagov/CSAF/de… | self |
| https://www.cisa.gov/news-events/ics-advisories/i… | self |
| https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-… | external |
| https://www.cisa.gov/resources-tools/resources/ic… | external |
| https://www.cisa.gov/topics/industrial-control-systems | external |
| https://us-cert.cisa.gov/sites/default/files/reco… | external |
| https://www.cisa.gov/sites/default/files/publicat… | external |
| https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B | external |
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A vulnerability was identified in OPC Foundation Local Discovery Server which also affects Siemens products that could allow an attacker to escalate privileges under certain circumstances.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-691715 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Energy, Transportation Systems, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-691715.json"
},
{
"category": "self",
"summary": "SSA-691715: Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-691715.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-102-08 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-102-08.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-24-102-08 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-08"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens OPC Foundation Local Discovery Server Affecting Siemens Products",
"tracking": {
"current_release_date": "2025-09-09T00:00:00.000000Z",
"generator": {
"date": "2025-09-11T15:38:01.188682Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-102-08",
"initial_release_date": "2023-04-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-04-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-06-13T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added fix for SIMATIC NET PC Software V17, clarified no fix planned for SIMATIC Process Historian 2020 OPC UA Server, SIMATIC NET PC Software V14 and V15"
},
{
"date": "2023-08-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for SIMATIC WinCC Runtime Professional"
},
{
"date": "2023-11-14T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix for SIMATIC Process Historian 2022 OPC UA Server"
},
{
"date": "2024-04-09T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added fix for TeleControl Server Basic V3"
},
{
"date": "2024-05-14T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SIMATIC NET PC Software V18"
},
{
"date": "2024-09-10T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added fix for SIMATIC NET PC Software V16, clarified no fix planned for OpenPCS 7 V9.1"
},
{
"date": "2025-09-09T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Corrected fix version for SIMATIC NET PC Software V17"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "OpenPCS 7 V9.1",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "OpenPCS 7 V9.1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC NET PC Software V14",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V14"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC NET PC Software V15",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V15"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV16_Update_8",
"product": {
"name": "SIMATIC NET PC Software V16",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V16"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV17_SP1_Update_1",
"product": {
"name": "SIMATIC NET PC Software V17",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV18_Update_1",
"product": {
"name": "SIMATIC NET PC Software V18",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SIMATIC NET PC Software V18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC Process Historian 2020 OPC UA Server",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SIMATIC Process Historian 2020 OPC UA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV2022_SP1",
"product": {
"name": "SIMATIC Process Historian 2022 OPC UA Server",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SIMATIC Process Historian 2022 OPC UA Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c8.0",
"product": {
"name": "SIMATIC WinCC",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV18_Update_2",
"product": {
"name": "SIMATIC WinCC Runtime Professional",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC Runtime Professional"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV18.0_SP1_Update_1",
"product": {
"name": "SIMATIC WinCC Unified PC Runtime V18",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC Unified PC Runtime V18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1.2",
"product": {
"name": "TeleControl Server Basic V3",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "TeleControl Server Basic V3"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-44725",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "OPC Foundation Local Discovery Server (LDS) in affected products uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Update the underlying OPC Foundation Unified Architecture Local Discovery Server (UA-LDS) to [V1.04.405](https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/) or later if possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0007"
]
},
{
"category": "vendor_fix",
"details": "Update to V16 Update 8 or later version",
"product_ids": [
"CSAFPID-0004"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109974091/"
},
{
"category": "vendor_fix",
"details": "Update to V17 SP1 Update 1 or later version",
"product_ids": [
"CSAFPID-0005"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109820674/"
},
{
"category": "vendor_fix",
"details": "Update to V18 Update 1 or later version",
"product_ids": [
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109826242/"
},
{
"category": "vendor_fix",
"details": "Update to V18 Update 2 or later version",
"product_ids": [
"CSAFPID-0010"
]
},
{
"category": "vendor_fix",
"details": "Update to V18.0 SP1 Update 1 or later version",
"product_ids": [
"CSAFPID-0011"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109807123/"
},
{
"category": "vendor_fix",
"details": "Update to V3.1.2 or later version",
"product_ids": [
"CSAFPID-0012"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109955177/"
},
{
"category": "vendor_fix",
"details": "Update to V8.0 or later version",
"product_ids": [
"CSAFPID-0009"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109816599/"
},
{
"category": "vendor_fix",
"details": "In the context of SIMATIC PCS neo, update to SIMATIC PCS neo V4.1 or later version",
"product_ids": [
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012"
]
}
],
"title": "CVE-2022-44725"
}
]
}
MSRC_CVE-2023-38169
Vulnerability from csaf_microsoft - Published: 2023-08-08 07:00 - Updated: 2023-08-08 07:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft OLE DB Driver 19 for SQL Server 19.3.0001.0
Microsoft OLE DB Driver 19 for SQL Server
|
19.3.0001.0 | ||
|
Microsoft OLE DB Driver 18 for SQL Server 18.6.0006.0
Microsoft OLE DB Driver 18 for SQL Server
|
18.6.0006.0 | ||
|
Microsoft SQL Server 2019 for x64-based Systems (CU 21) 15.0.4316.3
Microsoft SQL Server 2019 for x64-based Systems (CU 21)
|
15.0.4316.3 | ||
|
Microsoft SQL Server 2022 for x64-based Systems (CU 5) 16.0.4053.3
Microsoft SQL Server 2022 for x64-based Systems (CU 5)
|
16.0.4053.3 | ||
|
Microsoft ODBC Driver 17 for SQL Server on Windows 17.10.4.1
Microsoft ODBC Driver 17 for SQL Server on Windows
|
17.10.4.1 | ||
|
Microsoft ODBC Driver 17 for SQL Server on Linux 17.10.4.1
Microsoft ODBC Driver 17 for SQL Server on Linux
|
17.10.4.1 | ||
|
Microsoft ODBC Driver 17 for SQL Server on MacOS 17.10.4.1
Microsoft ODBC Driver 17 for SQL Server on MacOS
|
17.10.4.1 | ||
|
Microsoft ODBC Driver 18 for SQL Server on Windows 18.2.2.1
Microsoft ODBC Driver 18 for SQL Server on Windows
|
18.2.2.1 | ||
|
Microsoft ODBC Driver 18 for SQL Server on Linux 18.2.1.1
Microsoft ODBC Driver 18 for SQL Server on Linux
|
18.2.1.1 | ||
|
Microsoft ODBC Driver 18 for SQL Server on MacOS 18.2.1.1
Microsoft ODBC Driver 18 for SQL Server on MacOS
|
18.2.1.1 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft ODBC Driver 18 for SQL Server on MacOS <18.2.1.1
Microsoft ODBC Driver 18 for SQL Server on MacOS
|
<18.2.1.1 |
Vendor Fix
fix
|
|
|
Microsoft ODBC Driver 18 for SQL Server on Linux <18.2.1.1
Microsoft ODBC Driver 18 for SQL Server on Linux
|
<18.2.1.1 |
Vendor Fix
fix
|
|
|
Microsoft ODBC Driver 18 for SQL Server on Windows <18.2.2.1
Microsoft ODBC Driver 18 for SQL Server on Windows
|
<18.2.2.1 |
Vendor Fix
fix
|
|
|
Microsoft ODBC Driver 17 for SQL Server on MacOS <17.10.4.1
Microsoft ODBC Driver 17 for SQL Server on MacOS
|
<17.10.4.1 |
Vendor Fix
fix
|
|
|
Microsoft ODBC Driver 17 for SQL Server on Linux <17.10.4.1
Microsoft ODBC Driver 17 for SQL Server on Linux
|
<17.10.4.1 |
Vendor Fix
fix
|
|
|
Microsoft ODBC Driver 17 for SQL Server on Windows <17.10.4.1
Microsoft ODBC Driver 17 for SQL Server on Windows
|
<17.10.4.1 |
Vendor Fix
fix
|
|
|
Microsoft SQL Server 2022 for x64-based Systems (CU 5) <16.0.4053.3
Microsoft SQL Server 2022 for x64-based Systems (CU 5)
|
<16.0.4053.3 |
Vendor Fix
fix
|
|
|
Microsoft SQL Server 2019 for x64-based Systems (CU 21) <15.0.4316.3
Microsoft SQL Server 2019 for x64-based Systems (CU 21)
|
<15.0.4316.3 |
Vendor Fix
fix
|
|
|
Microsoft OLE DB Driver 18 for SQL Server <18.6.0006.0
Microsoft OLE DB Driver 18 for SQL Server
|
<18.6.0006.0 |
Vendor Fix
fix
|
|
|
Microsoft OLE DB Driver 19 for SQL Server <19.3.0001.0
Microsoft OLE DB Driver 19 for SQL Server
|
<19.3.0001.0 |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
| https://msrc.microsoft.com/csaf/2023/msrc_cve-202… | self |
| https://www.microsoft.com/en-us/msrc/exploitabili… | external |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
{
"document": {
"acknowledgments": [
{
"names": [
"bee13oy with \u003ca href=\"https://www.cyberkl.com/\"\u003eCyber Kunlun Lab\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38169 Microsoft SQL OLE DB Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"category": "self",
"summary": "CVE-2023-38169 Microsoft SQL OLE DB Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/2023/msrc_cve-2023-38169.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Microsoft SQL OLE DB Remote Code Execution Vulnerability",
"tracking": {
"current_release_date": "2023-08-08T07:00:00.000Z",
"generator": {
"date": "2025-01-01T01:58:31.427Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-38169",
"initial_release_date": "2023-08-08T07:00:00.000Z",
"revision_history": [
{
"date": "2023-08-08T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published. This CVE was addressed by SQL related updates that were released in June 2023, but the CVE was inadvertently omitted from the June 2023 Security Updates. This is an informational change only. Customers who have already installed the June 2023 update do not need to take any further action."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.3.0001.0",
"product": {
"name": "Microsoft OLE DB Driver 19 for SQL Server \u003c19.3.0001.0",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "19.3.0001.0",
"product": {
"name": "Microsoft OLE DB Driver 19 for SQL Server 19.3.0001.0",
"product_id": "12180"
}
}
],
"category": "product_name",
"name": "Microsoft OLE DB Driver 19 for SQL Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.6.0006.0",
"product": {
"name": "Microsoft OLE DB Driver 18 for SQL Server \u003c18.6.0006.0",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "18.6.0006.0",
"product": {
"name": "Microsoft OLE DB Driver 18 for SQL Server 18.6.0006.0",
"product_id": "12181"
}
}
],
"category": "product_name",
"name": "Microsoft OLE DB Driver 18 for SQL Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.2.1.1",
"product": {
"name": "Microsoft ODBC Driver 18 for SQL Server on Linux \u003c18.2.1.1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "18.2.1.1",
"product": {
"name": "Microsoft ODBC Driver 18 for SQL Server on Linux 18.2.1.1",
"product_id": "12197"
}
}
],
"category": "product_name",
"name": "Microsoft ODBC Driver 18 for SQL Server on Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.10.4.1",
"product": {
"name": "Microsoft ODBC Driver 17 for SQL Server on MacOS \u003c17.10.4.1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "17.10.4.1",
"product": {
"name": "Microsoft ODBC Driver 17 for SQL Server on MacOS 17.10.4.1",
"product_id": "12195"
}
}
],
"category": "product_name",
"name": "Microsoft ODBC Driver 17 for SQL Server on MacOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.4053.3",
"product": {
"name": "Microsoft SQL Server 2022 for x64-based Systems (CU 5) \u003c16.0.4053.3",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "16.0.4053.3",
"product": {
"name": "Microsoft SQL Server 2022 for x64-based Systems (CU 5) 16.0.4053.3",
"product_id": "12185"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2022 for x64-based Systems (CU 5)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.10.4.1",
"product": {
"name": "Microsoft ODBC Driver 17 for SQL Server on Linux \u003c17.10.4.1",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "17.10.4.1",
"product": {
"name": "Microsoft ODBC Driver 17 for SQL Server on Linux 17.10.4.1",
"product_id": "12194"
}
}
],
"category": "product_name",
"name": "Microsoft ODBC Driver 17 for SQL Server on Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.2.1.1",
"product": {
"name": "Microsoft ODBC Driver 18 for SQL Server on MacOS \u003c18.2.1.1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "18.2.1.1",
"product": {
"name": "Microsoft ODBC Driver 18 for SQL Server on MacOS 18.2.1.1",
"product_id": "12198"
}
}
],
"category": "product_name",
"name": "Microsoft ODBC Driver 18 for SQL Server on MacOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.0.4316.3",
"product": {
"name": "Microsoft SQL Server 2019 for x64-based Systems (CU 21) \u003c15.0.4316.3",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "15.0.4316.3",
"product": {
"name": "Microsoft SQL Server 2019 for x64-based Systems (CU 21) 15.0.4316.3",
"product_id": "12184"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2019 for x64-based Systems (CU 21)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.10.4.1",
"product": {
"name": "Microsoft ODBC Driver 17 for SQL Server on Windows \u003c17.10.4.1",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "17.10.4.1",
"product": {
"name": "Microsoft ODBC Driver 17 for SQL Server on Windows 17.10.4.1",
"product_id": "12193"
}
}
],
"category": "product_name",
"name": "Microsoft ODBC Driver 17 for SQL Server on Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.2.2.1",
"product": {
"name": "Microsoft ODBC Driver 18 for SQL Server on Windows \u003c18.2.2.1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "18.2.2.1",
"product": {
"name": "Microsoft ODBC Driver 18 for SQL Server on Windows 18.2.2.1",
"product_id": "12196"
}
}
],
"category": "product_name",
"name": "Microsoft ODBC Driver 18 for SQL Server on Windows"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38169",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "Yes, customers who have installed Microsoft SQL Server 2022 for x64-based Systems (GDR) or Microsoft SQL Server 2019 for x64-based Systems (GDR) are vulnerable. Microsoft recommends updating to the latest cumulative update to be protected from this vulnerability.",
"title": "If I normally install GDR versions and have not installed the June Cumulative Update, am I affected by the vulnerability?"
},
{
"category": "faq",
"text": "An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.",
"title": "How could an attacker exploit this vulnerability?"
}
],
"product_status": {
"fixed": [
"12180",
"12181",
"12184",
"12185",
"12193",
"12194",
"12195",
"12196",
"12197",
"12198"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38169 Microsoft SQL OLE DB Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
},
{
"category": "self",
"summary": "CVE-2023-38169 Microsoft SQL OLE DB Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "19.3.0001.0:Security Update:https://learn.microsoft.com/sql/connect/oledb/release-notes-for-oledb-driver-for-sql-server#1931",
"product_ids": [
"10"
],
"url": "https://learn.microsoft.com/sql/connect/oledb/release-notes-for-oledb-driver-for-sql-server#1931"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "18.6.0006.0:Security Update:https://learn.microsoft.com/sql/connect/oledb/release-notes-for-oledb-driver-for-sql-server#1866",
"product_ids": [
"9"
],
"url": "https://learn.microsoft.com/sql/connect/oledb/release-notes-for-oledb-driver-for-sql-server#1866"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "18.2.1.1:Security Update:https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#1822",
"product_ids": [
"2"
],
"url": "https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#1822"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "17.10.4.1:Security Update:https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#17104",
"product_ids": [
"4"
],
"url": "https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#17104"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "16.0.4053.3:Security Update:https://support.microsoft.com/help/5026806",
"product_ids": [
"7"
],
"url": "https://support.microsoft.com/help/5026806"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "17.10.4.1:Security Update:https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#17104",
"product_ids": [
"5"
],
"url": "https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#17104"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "18.2.1.1:Security Update:https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#1822",
"product_ids": [
"1"
],
"url": "https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#1822"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "15.0.4316.3:Security Update:https://support.microsoft.com/help/5025808",
"product_ids": [
"8"
],
"url": "https://support.microsoft.com/help/5025808"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "17.10.4.1:Security Update:https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#17104",
"product_ids": [
"6"
],
"url": "https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#17104"
},
{
"category": "vendor_fix",
"date": "2023-08-08T07:00:00.000Z",
"details": "18.2.2.1:Security Update:https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#1822",
"product_ids": [
"3"
],
"url": "https://learn.microsoft.com/sql/connect/odbc/windows/release-notes-odbc-sql-server-windows#1822"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "TEMPORARY_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 7.7,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10"
]
}
],
"threats": [
{
"category": "impact",
"details": "Remote Code Execution"
},
{
"category": "exploit_status",
"details": "Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Microsoft SQL OLE DB Remote Code Execution Vulnerability"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.