vulnerability

Microsoft Windows: CVE-2018-8309: Windows Denial of Service Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Jul 10, 2018
Added
Jul 10, 2018
Modified
Sep 5, 2025

Description

A denial of service vulnerability exists when Windows improperly handles objects in memory, aka "Windows Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Solutions

microsoft-windows-windows_10-1507-kb4338829microsoft-windows-windows_10-1507-kb4345455microsoft-windows-windows_10-1607-kb4338814microsoft-windows-windows_10-1607-kb4345418microsoft-windows-windows_10-1703-kb4338826microsoft-windows-windows_10-1703-kb4345419microsoft-windows-windows_10-1709-kb4338825microsoft-windows-windows_10-1709-kb4345420microsoft-windows-windows_10-1803-kb4338819microsoft-windows-windows_10-1803-kb4345421microsoft-windows-windows_server_2012-kb4338820microsoft-windows-windows_server_2012_r2-kb4338824microsoft-windows-windows_server_2016-1607-kb4338814microsoft-windows-windows_server_2016-1607-kb4345418msft-kb4338820-42ded291-a440-4b4d-9efd-877384896802msft-kb4338820-756f2788-66ec-4732-ab6d-10a889a37d64msft-kb4338823-350c8547-b462-47a7-9150-012b5e59cae5msft-kb4338823-3c0a22dd-84e1-4d8d-bab0-9c1366320bb0msft-kb4338823-aad98b57-eed4-4a0e-a44a-6ad82f339406msft-kb4338823-b304c792-133a-4fa4-8f47-bac9153afd71msft-kb4338823-b62a64f4-5072-4074-ac63-79ae61e0d4b0msft-kb4338823-d5fa704a-bd09-4d9b-a68e-8da1fe2642f7msft-kb4338824-4f051f3f-abd6-4d6d-8fbe-c78051dfe500msft-kb4338824-5d49efb1-0497-4625-9504-474fceca16d8msft-kb4340583-2398d31f-4713-44ad-a1e7-8d4a7418e402msft-kb4340583-b35c825a-5b5e-4167-ac18-e451fcd493eemsft-kb4340583-bdde9703-df49-4f45-bd68-cf6b09f855fa

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.