Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/12/2019
05:36 PM
Robert Lemos
Robert Lemos
News
50%
50%

Microsoft, Adobe Both Close More Than 70 Security Issues

With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software.

Software makers Microsoft and Adobe both released large updates for their regularly scheduled Patch Tuesday releases today, with each company closing more than 70 security holes in their products.

Among the issues patched by Microsoft are a privilege escalation vulnerability in Microsoft's Exchange server. The vuln allowed a security researcher to combine two other issues, creating an exploit that allows any mail user to become any other user or take control of the domain. The exploit for the flaw is already considered to be in the wild.

"This bug allows a regular user to escalate privileges to any other user on an Exchange server," said Dustin Childs, communications manager for Trend Micro’s Zero Day Initiative. "They could take over an account to send mail as a part of a phishing campaign, or they could just escalate and take over the server. Taking over an Exchange server would be the more likely scenario."

The nearly 150 security issues fixed by the two companies could hint at another banner year for vulnerability research. In 2018, more than 16,500 vulnerabilities were disclosed, up 13 percent from the previous year, according to the National Vulnerability Database.  

The number of security issues that each company patched is large, but not unprecedented, according to Trend Micro's Childs, who noted that the last few Adobe Reader patches have had a similar number of issues. 

"December and January are historically 'light' patch months for Microsoft, so the volume of patches this month isn’t that surprising," he said.

Microsoft patched 47 issues in January and 39 issues in December.

One of the major issues identified by experts is a flaw in Microsoft's DHCP server, which dynamically assigns network addresses to devices when they join a particular network. Such servers use the Dynamic Host Configuration Protocol (DHCP) to assign addresses from a local network subdomain. In a blog post on the updates, Trend Micro added "[i]f you have a DHCP server on your network, and chances are you do, this patch should be at the top of you[r] list."

"Most enterprises will have their DHCP server isolated from the Internet, so that adds some protection," Trend Micro's Childs said. "As far as I know, there are no workarounds for this bug. Patch quickly."

Such servers are ubiquitous, but often the DHCP server is built into networking hardware such as routers. 

Security firm Tenable had the same advice for users of Microsoft's Exchange server.

"If exploited, the vulnerability would give an attacker Domain Administrator privileges that would allow them to access domain user credentials," Satnam Narang, senior research engineer at Tenable, said in a statement. "Given the severity and publicity of the vulnerability, organizations should patch immediately."

Security firm Ivanti recommended that the patches for Microsoft's operating system, browser, and its Office productivity suite be made a priority, as some of the Windows and Internet Explorer flaws are actively being exploited. The company also warned that Adobe Flash, Acrobat and Reader should all be patched quickly, as all are often targeted by attackers for compromise.

Adobe's update patched 71 issues in Adobe's PDF software, Acrobat and Reader, and another four issues in other software, such as Flash and ColdFusion. While the company said it is not aware of any exploitation of the issues, at least one of the vulnerabilities has a detailed technical analysis posted online.

While the number of vulnerabilities publicly reported through bounty programs is typically under 5 percent, almost a quarter of the security issues patched by Adobe were reported through the Zero Day Initiative, according to data from Adobe's advisory. 

"The worst of the bugs fixed could allow an attacker to execute their own code on a target system," ZDI stated on its blog.

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/1/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20902
PUBLISHED: 2020-10-01
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.
CVE-2019-20903
PUBLISHED: 2020-10-01
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.