Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/8/2020
04:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Microsoft Fixes 129 Vulnerabilities for September's Patch Tuesday

This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.

Microsoft today released patches for 129 CVEs (common vulnerabilities and exposures) as part of its monthly Patch Tuesday rollout. This marks seven consecutive months of 110+ bugs fixed and brings the yearly total close to 1,000.

September's Patch Tuesday addressed vulnerabilities in Microsoft Windows, the Edge browser, ChakraCore, Internet Explorer, SQL Server, Office and Office Services and Web Apps, Microsoft Dynamics, Visual Studio, Exchange Server, ASP.NET, OneDrive, and Azure DevOps. Of the 129 bugs fixed, 23 are classified as critical, 105 are important, and one ae moderate in severity.

Related Content:

Microsoft Patches 120 Vulnerabilities, Two Zero-Days

The Threat from the Internet—and What Your Organization Can Do About It

Gotta Patch 'Em All? Not Necessarily, Experts Say

None of the flaws patched today were publicly known or under active attack; however, there are a few that stand out due to their severity. One of these is Microsoft Exchange memory corruption vulnerability CVE-2020-16875, a critical flaw that could be exploited by sending a malicious email containing exploit code to a vulnerable Exchange server. If successful, an attacker could then install programs; view, edit, or delete data; or create new user accounts.

"We have seen the previously patched Exchange bug CVE-2020-0688 used in the wild, and that requires authentication," writes Dustin Childs of Trend Micro's Zero-Day Initiative in a blog post. "We'll likely see this one in the wild soon. This should be your top priority."

Today brought fixes for seven critical remote code execution vulnerabilities in SharePoint 2010 through 2019. Five of these (CVE-2020-1200, CVE-2020-1210, CVE-2020-1452, CVE-2020-1453, and CVE-2020-1576) exist in how SharePoint fails to check the source markup of an application loaded to the server, and exploitation could let an attacker run malicious code on the server. Given SharePoint is often installed on large business networks, these patches are important.

Microsoft has addressed a couple of critical remote code execution bugs in Windows Codecs Library. Both of these could be exploited by crafting a malicious image file and having any program process the malicious image, explains Chris Hass, director of information security and research at Automox. If successful, they could obtain data to further compromise the system.

"With the number of images being shared constantly on Slack, Zoom, or email, this vulnerability could prove enticing for attackers to leverage," Hass explains. Today's updates addresses CVE-2020-1129 and CVE-2020-1319 by correcting how Codecs Library handles objects in memory. 

Hass also points to CVE-2020-0878, a memory corruption bug in Microsoft browsers, as an issue to patch. The flaw exists in the way Microsoft browsers access objects in memory and affects versions of Microsoft Edge and Internet Explorer. An attacker could host a specially crafted site designed to exploit the flaw and convince a user to view it, or they could take advantage of compromised websites, or submit crafted content to sites that host user-provided content.

However, the vulnerability cannot be exploited by simply viewing the malicious content. An attacker must convince users to take action, whether through an email or instant message, to get them to open an attachment. If the user is logged in with administrative rights, a successful attacker could take control of an affected system.

"Although there have been many memory corruption RCE vulnerabilities disclosed this month, Microsoft currently has around 13% of the total market share when it comes to browsers, possibly presenting enough attack surface to make it worthwhile for attackers to explore," Hass says. 

Businesses should also prioritize CVE-2020-0922, a critical RCE flaw in the Microsoft Common Object Model (COM) that would allow an attacker to execute malicious code on a target device by luring a victim to open a specially crafted file or visit a website hosting malicious JavaScript. Today's patch addresses the vulnerability by correcting how COM handles objects in memory.

This fix is important because COM is the base framework of Microsoft services such as ActiveX, OLE, DirectX, and Windows Shell. If the flaw is left unpatched, it could give an attacker a large target to explore when seeking out vulnerabilities in a network, says Richard Melick, senior technical product manager for Automox.

"Given that the exploit can be taken advantage of through a simple malicious JavaScript or website, potentially delivered through a phishing email, it is necessary to address to minimize a network's attack surface," he explains.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4126
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
CVE-2020-4129
PUBLISHED: 2020-12-01
HCL Domino is susceptible to a lockout policy bypass vulnerability in the LDAP service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the LDAP service. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.
CVE-2020-9115
PUBLISHED: 2020-12-01
ManageOne versions 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, ,6.5.1.1.B050, 8.0.0 and 8.0.1 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the plug-in component. Due to insufficient input validation of ...
CVE-2020-9116
PUBLISHED: 2020-12-01
Huawei FusionCompute versions 6.5.1 and 8.0.0 have a command injection vulnerability. An authenticated, remote attacker can craft specific request to exploit this vulnerability. Due to insufficient verification, this could be exploited to cause the attackers to obtain higher privilege.
CVE-2020-14193
PUBLISHED: 2020-11-30
Affected versions of Automation for Jira - Server allowed remote attackers to read and render files as mustache templates in files inside the WEB-INF/classes & <jira-installation>/jira/bin directories via a template injection vulnerability in Jira smart values using mustache partials. The ...