Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2019-1057: MS XML Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2019-1057: MS XML Remote Code Execution Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
08/13/2019
Created
08/14/2019
Added
08/13/2019
Modified
09/24/2024

Description

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka 'MS XML Remote Code Execution Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4512497
  • microsoft-windows-windows_10-1607-kb4512517
  • microsoft-windows-windows_10-1703-kb4512507
  • microsoft-windows-windows_10-1709-kb4512516
  • microsoft-windows-windows_10-1803-kb4512501
  • microsoft-windows-windows_10-1809-kb4511553
  • microsoft-windows-windows_10-1903-kb4512508
  • microsoft-windows-windows_server_2012-kb4512482
  • microsoft-windows-windows_server_2012_r2-kb4512489
  • microsoft-windows-windows_server_2016-1607-kb4512517
  • microsoft-windows-windows_server_2019-1809-kb4511553
  • msft-kb4512482-5ed85e60-5ce7-4c4c-94aa-f19944914692
  • msft-kb4512482-68a99d81-d48f-4437-9515-ea4a427f4014
  • msft-kb4512486-16bba1d9-7035-4243-b78b-cea3df5096b6
  • msft-kb4512486-2d01b298-6879-4d30-8a68-e872592d343e
  • msft-kb4512486-437934f0-2915-4e74-b1cc-04921ce3aef1
  • msft-kb4512486-cb62a71d-be6d-491e-9e4d-046e3dff67e9
  • msft-kb4512486-d6348d13-661b-4391-b03d-77cbf3143cd2
  • msft-kb4512486-fc466b63-7e33-42b7-8bfe-72335a76bb07
  • msft-kb4512489-90af280c-d27d-450d-a8de-81ca67856fc0
  • msft-kb4512489-bfc44f53-1c17-46df-9be6-9009a1a38c70
  • msft-kb4512491-08cff48b-50a6-45e0-80f9-1e9c166f5ebd
  • msft-kb4512491-ba106612-9217-4c05-84e3-bf93da04241b
  • msft-kb4512491-d0f0c55e-5ea3-418c-a858-82f582466388
  • msft-kb4512508-35cff443-e9f5-4d0a-a8fc-7fe8a39ab515

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;