Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/8/2019
05:25 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Microsoft Issues 9 Critical Security Patches

None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.

Today is the second Tuesday of the month, and Microsoft is right on schedule with 59 security fixes, nine of which are considered Critical in severity.

None of the vulnerablities were previously known or exploited, and 49 are ranked Important and one as Moderate. 

The latest release affects Windows, Internet Explorer, Edge, ChakraCore, Microsoft Office and Office Services and Web Apps, Microsoft Dynamics 365, SQL Server Management Studio, Windows Update Assistant, and Open Source Software. It's a smaller-volume roundup compared with many Patch Tuesdays of late: September's fixed 80 bugs and August's patched 93, including a wormable remote code execution (RCE) flaw. In July, Microsoft addressed 77 vulnerabilities.

October continued the trend of patching remote desktop vulnerabilities, which have been common the past four months. CVE-2019-1333 is an RCE flaw that exists in the Remote Desktop Client when a user connects with a malicious server. An attacker who successfully exploited the bug could view, change, or delete data; install programs; or create new accounts with user rights.

To exploit CVE-2019-1333, an attacker would need to control a server and convince a target to connect using a social engineering scam, DNS poisoning, or a man-in-the-middle attack. They could also compromise a legitimate server, host malicious code on it, and wait for someone to connect to it. Today's patch corrects how Remote Desktop Client handles connection requests.

While this RCE vulnerability is only being disclosed today and attackers haven't yet taken advantage of it, Microsoft warns exploitation is more likely for this one. The patch should be applied "immediately," says Richard Melick, senior technical product manager at Automox, even though this bug isn't as severe as the remote desktop flaws disclosed back in August.

"Lateral access through a network only requires one compromised machine and with this capability in the hands of an attacker, their actions would be masked longer due to the escalated access," Melick says of the implications of this vulnerability in the wrong hands. Even so, the requirement for attackers to convince a target to connect makes this tough to exploit.

Important-ranked patch CVE-2019-1326 is a Remote Desktop Protocol denial-of-service bug that exists when an attacker connects to the target system using RDP and sends specially crafted requests. If successful, they could cause the RDP service on a target system to stop responding.

Microsoft also re-released CVE-2019-1367, which was first deployed on Sept. 23 as an out-of-band patch to address a scripting engine memory corruption vulnerability in Internet Explorer that was under active attack. The bug could let an attacker execute arbitrary code at the same privilege level as a legitimate user and in doing so, install programs, view and change data, and create new accounts with full user rights while the legitimate user is logged in as an admin.

The update to this patch released today addresses a known printing issue some users might have experienced after installing any of the Security Updates, IE Cumulative Updates, or Monthly Rollups released on Sept. 23 or Oct. 3 for Internet Explorer 9, 10, or 11, or Windows.

For those who use the Azure App Service, another RCE vulnerability worth noting is CVE-2019-1372. This exists when Azure App Service/Antares on the Azure Stack fails to check the length of a buffer before copying the memory to it. An attacker who successfully exploited this could allow an unprivileged function run by the user to execute code in the context of NT Authority system and escape the sandbox. The patch ensures Azure App Services sanitizes user inputs.

"If you have the Azure App Service deployed to your Azure Stack, this patch should be prioritized," says Qualys director of product management Jimmy Graham.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Can the Girl Scouts Save the Moon from Cyberattack?"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I feel safe, but I can't understand a word he's saying."
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10374
PUBLISHED: 2020-03-30
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
CVE-2020-11104
PUBLISHED: 2020-03-30
An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if...
CVE-2020-11105
PUBLISHED: 2020-03-30
An issue was discovered in USC iLab cereal through 1.3.0. It employs caching of std::shared_ptr values, using the raw pointer address as a unique identifier. This becomes problematic if an std::shared_ptr variable goes out of scope and is freed, and a new std::shared_ptr is allocated at the same add...
CVE-2020-11106
PUBLISHED: 2020-03-30
An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a pa...
CVE-2020-5284
PUBLISHED: 2020-03-30
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your applicati...