Home

Sep 16, 2019

Microsoft September Patch Tuesday Addresses Two Actively Exploited Zero-Day Bugs


This Tuesday, Microsoft has rolled-out its scheduled monthly updates for 80 different bugs. Notably, the September Patch Tuesday update bundle from Microsoft brings fixes for two zero-day bugs under active exploit.

Patches For Actively Exploited Zero-Day Vulnerabilities The most noteworthy fixes in Microsoft September Patch Tuesday bundle includes ones for two zero-day bugs under active exploit. These two zero-days precisely are privilege escalation bugs. While both of these attained important severity rating, they became a problem owing to their active exploitation in the wild. The first of these is an EoP in the Windows Common Log File System Driver (CVE-2019-1214). The bug existed due to improper object handling in the memory by Windows CLFS. Upon an exploit, the flaw could let an attacker execute processes with elevated user privileges. Regarding the exploit condition, Microsoft stated in their advisory,

To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control of the affected system.

Whereas, the other EoP existed in the ws2ifsl.sys (Winsock) owing to improper object handling in memory. Regarding this Windows vulnerability (CVE-2019-1215), Microsoft explained in the advisory,

An attacker who successfully exploited the vulnerability could execute code with elevated privileges. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

Other Microsoft September Patch Tuesday Updates Apart from the two zero-days, Microsoft has also patched 79 other bugs with this update bundle. These include 17 critical vulnerabilities that could allow remote code execution upon an exploit. Of these, 4 existed in the Remote Desktop Client, 5 in the Chakra Scripting Engine, 2 in VBScript, 3 in Microsoft SharePoint, and 1 RCE bug each in Scripting Engine, .LNK file processing, and Azure DevOps Server (ADO) and Team Foundation Server (TFS). Microsoft also fixed 60 other important severity bugs in various products. These bugs, upon exploit, could result in information disclosure, spoofing, the elevation of privileges, or even remote code execution. In addition, Microsoft also patched a moderate severity spoofing vulnerability (CVE-2019-1259), in Microsoft SharePoint. In August, Microsoft addressed 93 vulnerabilities with its Patch Tuesday bundle, more than the ones addressed this month. However, the previous month’s patches did not include any actively exploited bugs. Make sure to update your systems at the earliest to stay protected from potential attacks.

Category: Microsoft
Posted by: Admin
authorarticle: Master3395
Microsoft-January-Patch-Tuesday-800x445.jpg
video: 
youtube: 
sources: latesthackingnews.com
keywords: ChakraCore, cross-site scripting, denial of service, escalate windows privilege, flaw, information disclosure, microsoft, microsoft exploit, Microsoft Office, Microsoft patch, Microsoft Patch Tuesday, Microsoft Patch Tuesday Update, microsoft vulnerabilit

Comments:

comments powered by Disqus

Return
Discord

Page 1 of 480  >  >>

Microsoft offers workaround to mitigate the IE Scripting Engine Memory Corruption Vulnerability

ie_11_logo.jpg

Jan 19, 2020 | Category: Microsoft | Comments

Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer.

read more…

Steam on the way to Chromebooks, but is there any point?

chrome_os_steam_hero_more_like.png

Jan 18, 2020 | Category: General | Comments

Google works with Valve.

read more…

Emotet Malware Targeted United Nations Via Phishing Attack

Cloudmark_Takes_Aim_at_Spear_Phishing_with_‘Trident’_Security_Solution_1132x670_800x445.jpg

Jan 17, 2020 | Category: General | Comments

As reported, a phishing attack targeted United Nations with Emotet malware. The dedicated email phishing campaign targeted 600 UN email addresses.

read more…

Page 1 of 480  >  >>