Published on: 11 April 2018
Last update on: 30 April 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20180410/security-update-deployment-information
The updates for Microsoft Windows to fix the vulnerability CVE-2018-1038 have been included. There are reports that exploit code targeting the particular vulnerability is now publicly available. Users of 64-bit versions of Windows 7 and Windows Server 2008 R2 are recommended to apply the April Windows patches immediately owing to the escalated risks.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure or security feature bypass.
Patches for affected products are available from the Windows Update/Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038
https://gist.github.com/xpn/bdb99cee8895bab4b1a0671696570d94
https://www.zdnet.com/article/it-must-patch-against-total-meltdown-now-the-source-code-is-on-github/
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/abf77563-8612-e811-a966-000d3a33a34d
https://support.microsoft.com/en-us/help/20180410/security-update-deployment-information
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180007
https://www.hkcert.org/my_url/en/alert/18041101
https://www.us-cert.gov/ncas/current-activity/2018/04/10/Microsoft-Releases-April-2018-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0887
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0890
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0892
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0920
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0950
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0966 (to CVE-2018-0976)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0979 (to CVE-2018-0981)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0987 (to CVE-2018-0991)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0993 (to CVE-2018-0998)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1003 (to CVE-2018-1005)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1007 (to CVE-2018-1016)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1018 (to CVE-2018-1020)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1026 (to CVE-2018-1030)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1032
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1034
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8117