Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/10/2019
05:15 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Two Zero-Days Fixed in Microsoft Patch Rollout

September's Patch Tuesday addressed 80 vulnerabilities, two of which have already been exploited in the wild.

This month's Patch Tuesday arrived with fixes for 80 vulnerabilities, 17 of which are categorized as Critical and two of which had been exploited in the wild before Microsoft issued patches. Three of the bugs patched today were already known at the time fixes were released.

Updates delivered today cover apps and services including Microsoft Windows, Microsoft Edge, Internet Explorer, Office and Microsoft Office Services and Web Apps, ChakraCore, Visual Studio, Skype for Business, Microsoft Lync, .NET Framework, Exchange Server, Yammer, and Team Foundation Server. Of the bugs patched, 62 were ranked Important, one is Moderate, and three were publicly known.

The two zero-days are elevation of privilege vulnerabilities. CVE-2019-1215 is a local privilege escalation bug in the Winsock2 Integrated File System Layer. The flaw exists in the way Winsock handles objects in memory. A locally authenticated attacker could exploit this by running a specially crafted application; if successful, they could execute code with elevated privileges.

CVE-2019-1214 is a flaw that exists when the Windows Common Log File System (CLFS) improperly handles objects in memory. This could be exploited by an attacker who logs on to the system and runs a specially crafted application. If successful, they could run processes in an elevated context. Both zero-days patched today affect all supported versions of Windows.

"Elevation of privilege vulnerabilities are utilized by attackers post-compromise, once they've managed to gain access to a system in order to execute code on their target systems with elevated privileges," says Satnam Narang, senior research engineer at Tenable, of how someone could abuse this access.

Four critical vulnerabilities in Remote Desktop Client were patched this month: CVE-2019-1290, CVE-2019-1291, CVE-2019-0787, and CVE-2019-0788. The former two affect all supported versions of Windows; the latter two affect only non-Server editions of the operating system. Remote Desktop Client patches are a Patch Tuesday pattern of the past few months: May brought the wormable BlueKeep vulnerability, for example, and August brought DejaBlue. Experts say the latest flaws aren't as urgent.

Unlike BlueKeep and DejaBlue, in which attackers target vulnerable remote desktop servers, the recently patched vulnerabilities require attackers to convince users to connect to a malicious remote desktop server, or to compromise vulnerable servers and host malicious code then wait for users to connect.

"A user would have to somehow be convinced to connect to such a server, either via social engineering or by using something like a DNS poisoning attack," says Greg Wiseman, senior security researcher for Rapid7, of these client-side vulnerabilities. Microsoft did not confirm if any of the RDP vulnerabilities patched today were wormable, as those from earlier months are.

The three publicly known bugs include CVE-2019-1235, an elevation of privilege vulnerability in Windows Text Service Framework, and CVE-2019-1253, another elevation of privilege flaw that exists when the Windows AppX Deployment Server improperly handles junctions. CVE-2019-1294 is a Windows Secure Boot Security Feature Bypass bug affecting Windows 10 and Server 2019; it exists when Windows Secure Boot improperly restricts access to debugging. An attacker with physical access to a target could exploit this to disclose protected kernel memory.

CVE-2019-1235 is an additional patch for vulnerabilities in Windows CTF, part of the Windows Text Services Framework. The bug was discovered by Google Project Zero's Tavis Ormandy, who in August published research on flaws that had existed for nearly twenty years. The unsecured CTF protocol could let attackers with access to a target machine take control over any app or the operating system. Microsoft issued an initial patch in August with CVE-2019-1162.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Phishers' Latest Tricks for Reeling in New Victims"

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10560
PUBLISHED: 2020-03-30
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the S...
CVE-2020-5527
PUBLISHED: 2020-03-30
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource co...
CVE-2020-5551
PUBLISHED: 2020-03-30
Toyota 2017 Model Year DCU (Display Control Unit) allows an unauthenticated attacker within Bluetooth range to cause a denial of service attack and/or execute an arbitrary command. The affected DCUs are installed in Lexus (LC, LS, NX, RC, RC F), TOYOTA CAMRY, and TOYOTA SIENNA manufactured in the re...
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.