Zero-Day 2018- Úvod Graf Katalog Zranitelností OWASP Webové útoky (103) Vulnerebility Web Vul. Top 50 in years CVE Defination ATT&CK Matrix for Enterprise
2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009
Microsoft Patch Tuesday – December 2018
This month the vendor has patched 39 vulnerabilities, 9 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the December 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft .NET Framework
Microsoft Dynamics NAV
Microsoft Exchange Server
Microsoft Windows
Microsoft Visual Studio
Windows Azure Pack
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8583) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8617) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8618) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8629) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8631) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8624) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Internet Explorer Remote Code Execution Vulnerability (CVE-2018-8619) MS Rating: Important
A
remote code execution vulnerability exists when the Internet Explorer VBScript
execution policy does not properly restrict VBScript under specific conditions.
An attacker who exploited the vulnerability could run arbitrary code with
medium-integrity level privileges (the permissions of the current user).
Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2018-8625) MS Rating: Important
A
remote code execution vulnerability exists in the way that the VBScript engine
handles objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8643) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Cumulative Security Update for Microsoft Office
Microsoft SharePoint Information Disclosure Vulnerability (CVE-2018-8580) MS Rating: Important
An
information disclosure vulnerability exists where certain modes of the search
function. An attacker can exploit this issue to conduct cross-site search
attacks and obtain Personally Identifiable Information (PII).
Microsoft Outlook Remote Code Execution Vulnerability (CVE-2018-8587) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Outlook software when it
fails to properly handle objects in memory. An attacker who successfully
exploited the vulnerability could use a specially crafted file to perform
actions in the security context of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8597) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Information Disclosure Vulnerability (CVE-2018-8598) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Excel improperly
discloses the contents of its memory. An attacker who exploited the
vulnerability could use the information to compromise the user’s computer or
data.
Microsoft Excel Information Disclosure Vulnerability (CVE-2018-8627) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Excel software reads
out of bound memory due to an uninitialized variable, which could disclose the
contents of memory. An attacker who successfully exploited the vulnerability
could view out of bound memory.
Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2018-8628) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft PowerPoint software when
the software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Server Privilege Escalation Vulnerability (CVE-2018-8635) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted authentication request to an affected
SharePoint server. An attacker who successfully exploited this vulnerability
could execute malicious code on a vulnerable server in the context of the
SharePoint application pool account.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8636) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Office SharePoint XSS Vulnerability (CVE-2018-8650) MS Rating: Important
A
cross-site-scripting vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8477) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user system.
Windows Kernel Privilege Escalation Vulnerability (CVE-2018-8611) MS Rating: Important
A
privilege escalation vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker who successfully exploited this
vulnerability could run arbitrary code in kernel mode.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8621) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user system.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8622) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user system.
Win32k Information Disclosure Vulnerability (CVE-2018-8637) MS Rating: Important
An
information disclosure vulnerability exists in Windows kernel that could allow
an attacker to retrieve information that could lead to a Kernel Address Space
Layout Randomization (KASLR) bypass. An attacker who successfully exploited this
vulnerability could retrieve the memory address of a kernel object.
Win32k Privilege Escalation Vulnerability (CVE-2018-8639) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Win32k Privilege Escalation Vulnerability (CVE-2018-8641) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Windows kernel-mode
driver fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Cumulative Security Update for Microsoft Windows
Windows DNS Server Heap Overflow Vulnerability (CVE-2018-8626) MS Rating: Critical
A
remote code execution vulnerability exists in Windows Domain Name System (DNS)
servers when they fail to properly handle requests. An attacker who successfully
exploited the vulnerability could run arbitrary code in the context of the Local
System Account.
Microsoft Text-To-Speech Remote Code Execution Vulnerability (CVE-2018-8634) MS Rating: Critical
A
remote code execution vulnerability exists in Windows where Microsoft
text-to-speech fails to properly handle objects in the memory. An attacker who
successfully exploited this vulnerability could take control of the affected
system.
Remote Procedure Call runtime Information Disclosure Vulnerability (CVE-2018-8514) MS Rating: Important
An
information disclosure vulnerability exists when Remote Procedure Call runtime
improperly initializes objects in memory. To exploit this vulnerability, an
authenticated attacker could run a specially crafted application.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8595) MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker who successfully
exploited the vulnerability could obtain information to further compromise the
user system.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8596) MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker who successfully
exploited the vulnerability could obtain information to further compromise the
user system.
Diagnostics Hub Standard Collector Service Privilege Escalation Vulnerability (CVE-2018-8599) MS Rating: Important
A
privilege escalation vulnerability exists when the Diagnostics Hub Standard
Collector Service improperly impersonates certain file operations. An attacker
who successfully exploited this vulnerability could gain elevated privileges.
Connected User Experiences and Telemetry Service Denial of Service Vulnerability (CVE-2018-8612) MS Rating: Important
A
Denial Of Service vulnerability exists when Connected User Experiences and
Telemetry Service fails to validate certain function values. An attacker who
successfully exploited this vulnerability could deny dependent security feature
functionality.
DirectX Information Disclosure Vulnerability (CVE-2018-8638) MS Rating: Important
An
information disclosure vulnerability exists when DirectX improperly handles
objects in memory. An attacker who successfully exploited this vulnerability
could obtain information to further compromise the user system.
Windows Denial of Service Vulnerability (CVE-2018-8649) MS Rating: Important
A
denial of service vulnerability exists when Windows improperly handles objects
in memory.. An attacker who successfully exploited the vulnerability could cause
a target system to stop responding.
Security Update for Microsoft .NET Framework
.NET Framework Remote Code Injection Vulnerability (CVE-2018-8540) MS Rating: Critical
A
remote code execution vulnerability exists when the Microsoft . NET Framework
fails to validate input properly. An attacker who successfully exploited this
vulnerability could take control of an affected system.
.NET Framework Denial Of Service Vulnerability (CVE-2018-8517) MS Rating: Important
A
denial of service vulnerability exists when .NET Framework improperly handles
special web requests. An attacker who successfully exploited this vulnerability
could cause a denial of service against an .NET Framework web application.
Security Update for Microsoft Exchange Server
Microsoft Exchange Server Tampering Vulnerability (CVE-2018-8604) MS Rating: Important
A
tampering vulnerability exists when Microsoft Exchange Server fails to properly
handle profile data. An attacker who successfully exploited this vulnerability
could modify a targeted user's profile data.
Security Update for Microsoft Windows Azure Pack
Windows Azure Pack Cross Site Scripting Vulnerability (CVE-2018-8652) MS Rating: Important
A
cross-site Scripting vulnerability exists when Windows Azure Pack does not
properly sanitize user-provided input.
Security Update for Microsoft Dynamics NAV
Microsoft Dynamics NAV Cross Site Scripting Vulnerability (CVE-2018-8651) MS Rating: Important
A cross site scripting vulnerability exists when Microsoft Dynamics NAV does not properly sanitize a specially crafted web request to an affected Dynamics NAV server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics NAV server.
Microsoft Patch Tuesday – November 2018
This month the vendor has patched 62 vulnerabilities, 13 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the November 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft .NET Core
Microsoft Windows
Microsoft Skype
Azure App Service
Team Foundation Server
Dynamics 365 (on-premises)
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8541) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8542) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8543) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8551) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8555) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8556) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8557) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8588) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. An attacker can exploit this
issue to execute arbitrary code in the context of the current user. Successful
exploitation of this vulnerability would allow an attacker to gain the same user
rights as the current user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8570) MS Rating: Important
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. An attacker can exploit this issue to execute
arbitrary code in the context of the current user. Successful exploitation of
this vulnerability would allow an attacker to gain the same user rights as the
current user.
Microsoft Edge Privilege Escalation Vulnerability (CVE-2018-8567) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft Edge does not properly
enforce cross-domain policies. An attacker can exploit this issue to access
information from one domain and inject it into another domain.
Microsoft Edge Spoofing Vulnerability (CVE-2018-8564) MS Rating: Important
A
spoofing vulnerability exists when Microsoft Edge improperly handles specific
HTML content. An attacker can exploit this issue to trick a user into believing
that the user was on a legitimate website. The specially crafted website could
either spoof content or serve as a pivot to chain an attack with other
vulnerabilities in web services.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8545) MS Rating: Important
An
information disclosure vulnerability exists in the way that Microsoft Edge
handles cross-origin requests. An attacker can exploit this issue to determine
the origin of all webpages in the affected browser.
Windows Scripting Engine Memory Corruption Vulnerability (CVE-2018-8552) MS Rating: Important
An
information disclosure vulnerability exists when VBScript improperly discloses
the contents of its memory. An attacker can exploit this issue to further
compromise the user’s computer or data. To exploit the vulnerability, an
attacker must know the memory address of where the object was created.
Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2018-8544) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the VBScript engine
handles objects in memory. An attacker can exploit this issue to execute
arbitrary code in the context of the current user. Successful exploitation of
this vulnerability would allow an attacker to gain the same user rights as the
current user.
Cumulative Security Update for Microsoft Office
Microsoft Outlook Remote Code Execution Vulnerability (CVE-2018-8522) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Outlook software when it
fails to properly handle objects in memory. An attacker can exploit this issue
to use a specially crafted file to perform actions in the security context of
the current user. Successful exploitation of this vulnerability would allow an
attacker to gain the same user rights as the current user. To exploit the
vulnerability, a user must open a specially crafted file with an affected
version of Microsoft Outlook software.
Microsoft Outlook Remote Code Execution Vulnerability (CVE-2018-8576) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Outlook software when it
fails to properly handle objects in memory. An attacker can exploit this issue
to use a specially crafted file to perform actions in the security context of
the current user. Successful exploitation of this vulnerability would allow an
attacker to gain the same user rights as the current user. To exploit the
vulnerability, a user must open a specially crafted file with an affected
version of Microsoft Outlook software.
Microsoft Outlook Remote Code Execution Vulnerability (CVE-2018-8524) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Outlook software when it
fails to properly handle objects in memory. An attacker can exploit this issue
to use a specially crafted file to perform actions in the security context of
the current user. Successful exploitation of this vulnerability would allow an
attacker to gain the same user rights as the current user. To exploit the
vulnerability, a user must open a specially crafted file with an affected
version of Microsoft Outlook software.
Microsoft Outlook Remote Code Execution Vulnerability (CVE-2018-8582) MS Rating: Important
A
remote code execution vulnerability exists in the way that Microsoft Outlook
parses specially modified rule export files. An attacker can exploit this issue
to take control of an affected system.
Microsoft Outlook Information Disclosure Vulnerability (CVE-2018-8558) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Outlook fails to
respect 'Default link type' settings configured through the SharePoint Online
Admin Center. An attacker can exploit this issue to share anonymously-accessible
links to other users via email where these links are intended to be accessed
only by specific users.
Microsoft Outlook Information Disclosure Vulnerability (CVE-2018-8579) MS Rating: Important
An
information disclosure vulnerability exists when attaching files to Outlook
messages. An attacker can exploit this issue to share attached files such that
they are accessible by anonymous users where they should be restricted to
specific users. To exploit this vulnerability, an attacker would have to attach
a file as a link to an email.
Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2018-8581) MS Rating: Important
A
privilege escalation vulnerability exists in Microsoft Exchange Server. An
attacker can exploit this issue to perform script/content injection attacks and
attempt to impersonate any other user of the Exchange server. To exploit the
vulnerability, an attacker would need to execute a man-in-the-middle attack to
forward an authentication request to a Microsoft Exchange Server, thereby
allowing impersonation of another Exchange user.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8568) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker can exploit the issue by sending a specially
crafted request to an affected SharePoint server. Successful exploitation of
this vulnerability would allow an attacker to perform cross-site scripting
attacks on affected systems and run script in the security context of the
current user.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8572) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker can exploit the issue by sending a specially
crafted request to an affected SharePoint server. Successful exploitation of
this vulnerability would allow an attacker to perform cross-site scripting
attacks on affected systems and run script in the security context of the
current user.
Microsoft SharePoint Information Disclosure Vulnerability (CVE-2018-8578) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft SharePoint Server
improperly discloses its folder structure when rendering specific web pages. An
attacker can exploit this issue to view the folder path of scripts loaded on the
page. To take advantage of the vulnerability, an attacker would require access
to the specific SharePoint page affected by this vulnerability.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8574) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker can exploit the
issue to run arbitrary code in the context of the current user. Successful
exploitation of the vulnerability requires that a user open a specially crafted
file with an affected version of Microsoft Excel.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8577) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker can exploit the
issue to run arbitrary code in the context of the current user. Successful
exploitation of the vulnerability requires that a user open a specially crafted
file with an affected version of Microsoft Excel.
Microsoft Word Remote Code Execution Vulnerability (CVE-2018-8539) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Word software when the
software fails to properly handle objects in memory. An attacker can exploit the
issue to run arbitrary code in the context of the current user. Successful
exploitation of the vulnerability requires that a user open a specially crafted
file with an affected version of Microsoft Word software.
Microsoft Word Remote Code Execution Vulnerability (CVE-2018-8573) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Word software when the
software fails to properly handle objects in memory. An attacker can exploit the
issue to run arbitrary code in the context of the current user. Successful
exploitation of the vulnerability requires that a user open a specially crafted
file with an affected version of Microsoft Word software.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8408) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
initializes objects in memory. An authenticated attacker can exploit the issue
to run a specially crafted application. Successful exploitation of the
vulnerability could allow an attacker to obtain information to further
compromise the user's system.
Win32k Privilege Escalation Vulnerability (CVE-2018-8562) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker can exploit this issue
to run arbitrary code in kernel mode. To exploit this vulnerability, an attacker
would first have to log on to the system. An attacker could then run a specially
crafted application that could exploit the vulnerability and take control of an
affected system.
Win32k Information Disclosure Vulnerability (CVE-2018-8565) MS Rating: Important
An
information disclosure vulnerability exists when the win32k component improperly
provides kernel information. An attacker can exploit this issue to obtain
information to further compromise the user's system. To exploit this
vulnerability, an attacker would have to log on to an affected system and run a
specially crafted application.
Windows Win32k Privilege Escalation Vulnerability (CVE-2018-8589) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker can exploit this issue
to run arbitrary code in kernel mode. To exploit this vulnerability, an attacker
would first have to log on to the system. An attacker could then run a specially
crafted application that could exploit the vulnerability and take control of an
affected system.
Windows Deployment Services TFTP Server Remote Code Execution Vulnerability (CVE-2018-8476) MS Rating: Critical
A
remote code execution vulnerability exists in the way that Windows Deployment
Services TFTP Server handles objects in memory. An attacker can exploit this
issue to execute arbitrary code with elevated permissions on a target system. To
exploit the vulnerability, an attacker could create a specially crafted request,
causing Windows to execute arbitrary code with elevated permissions.
Cumulative Security Update for Microsoft Windows
Microsoft Graphics Components Remote Code Execution Vulnerability (CVE-2018-8553) MS Rating: Critical
A
remote code execution vulnerability exists in the way that Microsoft Graphics
Components handle objects in memory. An attacker can exploit this issue to
execute arbitrary code on a target system. To exploit the vulnerability, a user
would have to open a specially crafted file.
DirectX Information Disclosure Vulnerability (CVE-2018-8563) MS Rating: Critical
An
information disclosure vulnerability exists when DirectX improperly handles
objects in memory. An authenticated attacker can exploit this issue by running a
specially crafted application to obtain information to further compromise the
user's system.
DirectX Privilege Escalation Vulnerability (CVE-2018-8485) MS Rating: Important
A
privilege escalation vulnerability exists when DirectX improperly handles
objects in memory. An attacker can exploit this issue to run arbitrary code in
kernel mode. To exploit this vulnerability, an attacker would first have to log
on to the system. An attacker could then run a specially crafted application
that could exploit the vulnerability and take control of an affected system.
DirectX Privilege Escalation Vulnerability (CVE-2018-8554) MS Rating: Important
A
privilege escalation vulnerability exists when DirectX improperly handles
objects in memory. An attacker can exploit this issue to run arbitrary code in
kernel mode. To exploit this vulnerability, an attacker would first have to log
on to the system. An attacker could then run a specially crafted application
that could exploit the vulnerability and take control of an affected system.
DirectX Privilege Escalation Vulnerability (CVE-2018-8561) MS Rating: Important
A
privilege escalation vulnerability exists when DirectX improperly handles
objects in memory. An attacker can exploit this issue to run arbitrary code in
kernel mode. To exploit this vulnerability, an attacker would first have to log
on to the system. An attacker could then run a specially crafted application
that could exploit the vulnerability and take control of an affected system.
PowerShell Remote Code Execution Vulnerability (CVE-2018-8256) MS Rating: Important
A
remote code execution vulnerability exists when PowerShell improperly handles
specially crafted files. An attacker can exploit this issue to execute malicious
code on a vulnerable system. To exploit the vulnerability, an attacker must send
a specially crafted file to a vulnerable system.
Microsoft Powershell Tampering Vulnerability (CVE-2018-8415) MS Rating: Important
A
tampering vulnerability exists in PowerShell that could allow an attacker to
execute unlogged code. To exploit this vulnerability, an attacker would need to
log on to the affected system and run a specially crafted application.
MSRPC Information Disclosure Vulnerability (CVE-2018-8407) MS Rating: Important
An
information disclosure vulnerability exists when 'Kernel Remote Procedure Call
Provider' driver improperly initializes objects in memory. An attacker can
exploit this issue by running a specially crafted application. Successful
exploitation of this vulnerability would allow an attacker to obtain information
to further compromise the user's system.
Microsoft JScript Security Feature Bypass Vulnerability (CVE-2018-8417) MS Rating: Important
A
security bypass vulnerability exists in Microsoft JScript that could allow an
attacker to bypass Device Guard. To exploit the vulnerability, an attacker would
first have to access the local machine, and run a specially crafted application
to create arbitrary COM objects.
Windows Search Remote Code Execution Vulnerability (CVE-2018-8450) MS Rating: Important
A
remote code execution vulnerability exists when Windows Search handles objects
in memory. An attacker can exploit this issue by sending specially crafted
messages to the Windows Search service to take control of the affected system.
An attacker with access to a target computer could exploit this vulnerability to
elevate privileges and take control of the computer.
Windows Audio Service Information Disclosure Vulnerability (CVE-2018-8454) MS Rating: Important
An
information disclosure vulnerability exists when Windows Audio Service fails to
properly handle objects in memory. An attacker can exploit this issue by running
a specially crafted application in user mode to potentially disclose memory
contents of a elevated process.
Microsoft RemoteFX Virtual GPU miniport driver Privilege Escalation Vulnerability (CVE-2018-8471) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Microsoft RemoteFX
Virtual GPU miniport driver handles objects in memory. A locally authenticated
attacker can exploit this issue by running a specially crafted application to
execute code with elevated permissions.
Active Directory Federation Services XSS Vulnerability (CVE-2018-8547) MS Rating: Important
A
cross-site-scripting (XSS) vulnerability exists when an open source
customization for Microsoft Active Directory Federation Services (AD FS) does
not properly sanitize a specially crafted web request to an affected AD FS
server. An authenticated attacker can exploit this issue by sending a specially
crafted request to an affected AD FS server. Successful exploitation of this
vulnerability would allow an attacker to then perform cross-site scripting
attacks on affected systems and run scripts in the security context of the
current user. This would allow an attacker to read content that the attacker is
not authorized to read, use the victim's identity to take actions on the AD FS
site on behalf of the user, such as change permissions and delete content, and
inject malicious content in the browser of the user.
Windows Security Feature Bypass Vulnerability (CVE-2018-8549) MS Rating: Important
A
security bypass exists when Windows incorrectly validates kernel driver
signatures. An attacker can exploit this issue to bypass security features and
load improperly signed drivers into the kernel.
Windows COM Privilege Escalation Vulnerability (CVE-2018-8550) MS Rating: Important
An
elevation of privilege exists in Windows COM Aggregate Marshaler. An attacker
can exploit this issue by running a specially crafted application to run
arbitrary code with elevated privileges.
BitLocker Security Feature Bypass Vulnerability (CVE-2018-8566) MS Rating: Important
A
security bypass vulnerability exists when Windows improperly suspends BitLocker
Device Encryption. An attacker with physical access to a powered off system ccan
exploit this issue to gain access to encrypted data. To exploit the
vulnerability, an attacker must gain physical access to the target system prior
to the next system reboot.
Microsoft Project Remote Code Execution Vulnerability (CVE-2018-8575) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Project software when it
fails to properly handle objects in memory. An attacker can exploit this issue
using a specially crafted file to perform actions in the security context of the
current user. To exploit the vulnerability, a user must open a specially crafted
file with an affected version of Microsoft Project software.
Windows ALPC Privilege Escalation Vulnerability (CVE-2018-8584) MS Rating: Important
A
privilege escalation vulnerability exists when Windows improperly handles calls
to Advanced Local Procedure Call (ALPC). An attacker can exploit this issue by
running a specially crafted application to execute arbitrary code in the
security context of the local system and take control over an affected system.
To exploit this vulnerability, an attacker would first have to log on to the
system.
Windows Privilege Escalation Vulnerability (CVE-2018-8592) MS Rating: Important
A
privilege escalation vulnerability exists in the setup path and you could be
affected if a user installed certain builds of the OS from media for Windows 10,
version 1809 and an attacker had physical (console) access to the machine.
Cumulative Security Update for Dynamics 365 (on-premises)
Microsoft Dynamics 365 (on-premises) version 8 Remote Code Execution Vulnerability (CVE-2018-8609) MS Rating: Critical
A
remote code execution vulnerability exists in the way that Microsoft Graphics
Components handle objects in memory. An attacker can exploit this issue to
execute arbitrary code on a target system. To exploit the vulnerability, a user
would have to open a specially crafted file.
Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability (CVE-2018-8605) MS Rating: Important
A
cross site scripting vulnerability exists when Microsoft Dynamics 365
(on-premises) version 8 does not properly sanitize a specially crafted web
request to an affected Dynamics server. An authenticated attacker can exploit
this issue by sending a specially crafted request to an affected Dynamics
server.
Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability (CVE-2018-8606) MS Rating: Important
A
cross site scripting vulnerability exists when Microsoft Dynamics 365
(on-premises) version 8 does not properly sanitize a specially crafted web
request to an affected Dynamics server. An authenticated attacker can exploit
this issue by sending a specially crafted request to an affected Dynamics
server.
Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability (CVE-2018-8607) MS Rating: Important
A
cross site scripting vulnerability exists when Microsoft Dynamics 365
(on-premises) version 8 does not properly sanitize a specially crafted web
request to an affected Dynamics server. An authenticated attacker can exploit
this issue by sending a specially crafted request to an affected Dynamics
server.
Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability (CVE-2018-8608) MS Rating: Important
A
cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises)
version 8 does not properly sanitize a specially crafted web request to an
affected Dynamics server. An authenticated attacker can exploit this issue by
sending a specially crafted request to an affected Dynamics server.
Security Update for Azure App Service
Azure App Service Cross-site Scripting Vulnerability (CVE-2018-8600) MS Rating: Important
A
cross-site scripting vulnerability exists when Azure App Services on Azure Stack
does not properly sanitize user provided input. An authenticated attacker can
exploit this issue by sending a specially crafted payload to the App Service,
which will get executed in the context of the user every time a user visits the
compromised page.
Security Update for Team Foundation Server
Team Foundation Server Cross-site Scripting Vulnerability (CVE-2018-8602) MS Rating: Important
A
cross-site Scripting vulnerability exists when Team Foundation Server does not
properly sanitize user provided input. An authenticated attacker can exploit
this issue by sending a specially crafted payload to the Team Foundation Server,
which will get executed in the context of the user every time a user visits the
compromised page.
Team Foundation Server Remote Code Execution Vulnerability (CVE-2018-8529) MS Rating: Important
A
remote code execution vulnerability exists when Team Foundation Server (TFS)
does not enable basic authorization on the communication between the TFS and
Search services. An attacker can exploit this issue to run certain commands on
the Search service.
Security Update for Microsoft .NET Core
.NET Core Tampering Vulnerability (CVE-2018-8416) MS Rating: Moderate
A
tampering vulnerability exists when .NET Core improperly handles specially
crafted files. An attacker can exploit this issue by sending a specially crafted
file to a vulnerable system to write arbitrary files and directories to certain
locations on a vulnerable system.
Security Update for Microsoft Skype for Business
Microsoft Skype for Business Denial of Service Vulnerability (CVE-2018-8546) MS Rating: Low
A denial of service vulnerability exists in Skype for Business. An attacker can exploit this issue to cause Skype for Business to stop responding. Successful exploitation of this vulnerability requires that a user sends a number of emojis in the affected version of Skype for Business.
Microsoft Patch Tuesday – October 2018
This month the vendor has patched 49 vulnerabilities, 12 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the October 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
Microsoft Azure
Microsoft Windows
Microsoft SQL Server Management Studio
ChakraCore
Microsoft Windows Hyper-V
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8473) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8491) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8500) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8505) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8509) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8510) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8511) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8513) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8460) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Microsoft Edge Security Bypass Vulnerability (CVE-2018-8512) MS Rating: Important
A
security bypass vulnerability exists in Microsoft Edge when the Edge Content
Security Policy (CSP) fails to properly validate certain specially crafted
documents. An attacker who exploited the bypass could trick a user into loading
a page containing malicious content. Attackers can exploit this issue by
enticing an unsuspecting user to view a specially crafted web page.
Microsoft Edge Security Bypass Vulnerability (CVE-2018-8530) MS Rating: Important
A
security bypass vulnerability exists when Microsoft Edge improperly handles
requests of different origins. The vulnerability allows Microsoft Edge to bypass
Same-Origin Policy (SOP) restrictions, and to allow requests that should
otherwise be ignored. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8503) MS Rating: Low
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Cumulative Security Update for Microsoft Office
Microsoft Exchange Remote Code Execution Vulnerability (CVE-2018-8265) MS Rating: Important
A
remote code execution vulnerability exists in the way Microsoft Exchange
software parses specially crafted email messages. An attacker who successfully
exploited the vulnerability could run arbitrary code in the context of the
system user.
Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2018-8448) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft Exchange Outlook Web
Access (OWA) fails to properly handle web requests. An attacker who successfully
exploited this vulnerability could perform script/content injection attacks and
attempt to trick the user into disclosing sensitive information.
Microsoft SharePoint Privilee Escalation Vulnerability (CVE-2018-8480) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8488) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8498) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft PowerPoint Security Bypass Vulnerability (CVE-2018-8501) MS Rating: Important
A
security bypass vulnerability exists in Microsoft PowerPoint software when the
software fails to properly handle objects in Protected View. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Security Bypass Vulnerability (CVE-2018-8502) MS Rating: Important
A
security bypass vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in Protected View. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Word Remote Code Execution Vulnerability (CVE-2018-8504) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Word software when the
software fails to properly handle objects in Protected View. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8518) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Cumulative Security Update for Microsoft Azure
Azure IoT Device Client SDK Memory Corruption Vulnerability (CVE-2018-8531) MS Rating: Important
A
remote code execution vulnerability exists in the way that Azure IoT Hub Device
Client SDK using MQTT protocol accesses objects in memory. The vulnerability
could corrupt memory in a way that could allow an attacker to execute arbitrary
code in the context of the current user.
Cumulative Security Update for Microsoft Windows Kernel
Win32k Privilege Escalation Vulnerability (CVE-2018-8453) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Windows Kernel Privilege Escalation Vulnerability (CVE-2018-8497) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8330) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Cumulative Security Update for Microsoft Windows
MS XML Remote Code Execution Vulnerability (CVE-2018-8494) MS Rating: Critical
A
remote code execution vulnerability exists when the Microsoft XML Core Services
MSXML parser processes user input. An attacker who successfully exploited the
vulnerability could run malicious code remotely to take control of the user's
system.
MFC Insecure Library Loading Vulnerability (CVE-2010-3190) MS Rating: Moderate
A
remote code execution vulnerability exists in the way that certain applications
built using Microsoft Foundation Classes (MFC) handle the loading of DLL files.
An attacker who successfully exploited this vulnerability could take complete
control of an affected system.
Windows DNS Security Bypass Vulnerability (CVE-2018-8320) MS Rating: Important
A
security bypass vulnerability exists in DNS Global Blocklist feature. An
attacker who successfully exploited this vulnerability could redirect traffic to
malicious DNS endpoints.
Linux On Windows Privilege Escalation Vulnerability (CVE-2018-8329) MS Rating: Important
A
privilege escalation vulnerability exists in Windows Subsystem for Linux when it
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could execute arbitrary code and take control of an
affected system.
Microsoft Filter Manager Privilege Escalation Vulnerability (CVE-2018-8333) MS Rating: Important
A
privilege escalation vulnerability exists in Filter Manager when it improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could execute elevated code and take control of an affected
system.
NTFS Privilege Escalation Vulnerability (CVE-2018-8411) MS Rating: Important
A
privilege escalation vulnerability exists when NTFS improperly checks access. An
attacker who successfully exploited this vulnerability could run processes in an
elevated context.
Windows Theme API Remote Code Execution Vulnerability (CVE-2018-8413) MS Rating: Important
A
remote code execution vulnerability exists when "Windows Theme API" does not
properly decompress files. An attacker who successfully exploited the
vulnerability could run arbitrary code in the context of the current user.
Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2018-8423) MS Rating: Important
A
remote code execution vulnerability exists in the Microsoft JET Database Engine.
An attacker who successfully exploited this vulnerability could take control of
an affected system.
Microsoft Graphics Components Information Disclosure Vulnerability (CVE-2018-8427) MS Rating: Important
An
information disclosure vulnerability exists in the way that Microsoft Graphics
Components handle objects in memory. An attacker who successfully exploited the
vulnerability could obtain information that could be useful for further
exploitation.
Microsoft Graphics Components Remote Code Execution Vulnerability (CVE-2018-8432) MS Rating: Important
A
remote code execution vulnerability exists in the way that Microsoft Graphics
Components handle objects in memory. An attacker who successfully exploited the
vulnerability could execute arbitrary code on a target system.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8472) MS Rating: Important
An
information disclosure vulnerability exists in the way that the Windows Graphics
Device Interface (GDI) handles objects in memory, allowing an attacker to
retrieve information from a targeted system. By itself, the information
disclosure does not allow arbitrary code execution; however, it could allow
arbitrary code to be run if the attacker uses it in combination with another
vulnerability.
Windows Media Player Information Disclosure Vulnerability (CVE-2018-8481) MS Rating: Important
An
information disclosure vulnerability exists when Windows Media Player improperly
discloses file information. Successful exploitation of the vulnerability could
allow an attacker to determine the presence of files on disk.
Windows Media Player Information Disclosure Vulnerability (CVE-2018-8482) MS Rating: Important
An
information disclosure vulnerability exists when Windows Media Player improperly
discloses file information. Successful exploitation of the vulnerability could
allow an attacker to determine the presence of files on disk.
DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2018-8484) MS Rating: Important
A
privilege escalation vulnerability exists when the DirectX Graphics Kernel
(DXGKRNL) driver improperly handles objects in memory. An attacker who
successfully exploited this vulnerability could run processes in an elevated
context.
DirectX Information Disclosure Vulnerability (CVE-2018-8486) MS Rating: Important
An
information disclosure vulnerability exists when DirectX improperly handles
objects in memory. An attacker who successfully exploited this vulnerability
could obtain information to further compromise the user's system.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8492) MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Windows TCP/IP Information Disclosure Vulnerability (CVE-2018-8493) MS Rating: Important
An
information disclosure vulnerability exists when the Windows TCP/IP stack
improperly handles fragmented IP packets. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user's
system.
Windows Shell Remote Code Execution Vulnerability (CVE-2018-8495) MS Rating: Important
A
remote code execution vulnerability exists when Windows Shell improperly handles
URIs. An attacker who successfully exploited the vulnerability could gain the
same user rights as the current user.
Microsoft Windows Codecs Library Information Disclosure Vulnerability (CVE-2018-8506)MS Rating: Important
An
Information Disclosure vulnerability exists in the way that Microsoft Windows
Codecs Library handles objects in memory. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user's
system.
Cumulative Security Update for Microsoft SQL Server Management Studio
SQL Server Management Studio Information Disclosure (CVE-2018-8527) MS Rating: Important
An
information disclosure vulnerability exists in Microsoft SQL Server Management
Studio (SSMS) when parsing a malicious XEL file containing a reference to an
external entity. An attacker who successfully exploited this vulnerability could
read arbitrary files via an XML external entity declaration.
SQL Server Management Studio Information Disclosure (CVE-2018-8532) MS Rating: Important
An
information disclosure vulnerability exists in Microsoft SQL Server Management
Studio (SSMS) when parsing a malicious XMLA file containing a reference to an
external entity. An attacker who successfully exploited this vulnerability could
read arbitrary files via an XML external entity declaration.
SQL Server Management Studio Information Disclosure (CVE-2018-8533) MS Rating: Moderate
An
information disclosure vulnerability exists in Microsoft SQL Server Management
Studio (SSMS) when parsing malicious XML content containing a reference to an
external entity. An attacker who successfully exploited this vulnerability could
read arbitrary files via an XML external entity declaration.
Cumulative Security Update for Microsoft Windows Hyper-V
Windows Hyper-V Remote Code Execution Vulnerability (CVE-2018-8489) MS Rating: Critical
A
remote code execution vulnerability exists when Windows Hyper-V on a host server
fails to properly validate input from an authenticated user on a guest operating
system. An attacker who successfully exploited this issue by running specially
crafted application on a guest operating system that could cause the Hyper-V
host operating system to execute arbitrary code.
Windows Hyper-V Remote Code Execution Vulnerability (CVE-2018-8490) MS Rating: Critical
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. An attacker who successfully exploited this issue by running specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.
Microsoft Patch Tuesday – September 2018
This month the vendor has patched 61 vulnerabilities, 17 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the September 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
.NET Framework
Microsoft Windows
Device Guard Code
Hyper-V
JET Database Engine
Azure IoT SDK
Lync for Mac
ChakraCore
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8367) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8391) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8447) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8456) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8457) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8459) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8461) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Microsoft Edge PDF Remote Code Execution Vulnerability (CVE-2018-8464) MS Rating: Critical
An
remote code execution vulnerability exists when Microsoft Edge PDF Reader
improperly handles objects in memory. The vulnerability could corrupt memory in
such a way that enables an attacker to execute arbitrary code in the context of
the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8465) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8466) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8467) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Microsoft Browsers Information Disclosure Vulnerability (CVE-2018-8315) MS Rating: Important
An
information disclosure vulnerability exists when the browser scripting engine
improperly handle object types. An attacker who has successfully exploited this
vulnerability might be able to read privileged data across trust boundaries.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8354) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8366) MS Rating: Important
An
information disclosure vulnerability exists when the Microsoft Edge Fetch API
incorrectly handles a filtered response type. An attacker could use the
vulnerability to read the URL of a cross-origin request. Websites that that do
not securely populate the URL with confidential information could allow
information to be disclosed to an attacker.
Microsoft Edge Spoofing Vulnerability (CVE-2018-8425) MS Rating: Important
A
spoofing vulnerability exists when Microsoft Edge improperly handles specific
HTML content. An attacker who successfully exploited this vulnerability could
trick a user into believing that the user was on a legitimate website. The
specially crafted website could either spoof content or serve as a pivot to
chain an attack with other vulnerabilities in web services.
Microsoft Browser Information Disclosure Vulnerability (CVE-2018-8452) MS Rating: Important
An
information disclosure vulnerability exists when the scripting engine does not
properly handle objects in memory in Microsoft browsers. An attacker who
successfully exploited the vulnerability could obtain information to further
compromise the user's system.
Microsoft Edge Elevation of Privilege Vulnerability (CVE-2018-8463) MS Rating: Important
An
elevation of privilege vulnerability exists in Microsoft Edge that could allow
an attacker to escape from the AppContainer sandbox in the browser. An attacker
who successfully exploited this vulnerability could gain elevated privileges and
break out of the Edge AppContainer sandbox.
Microsoft Edge Elevation of Privilege Vulnerability (CVE-2018-8469) MS Rating: Important
An
elevation of privilege vulnerability exists in Microsoft Edge that could allow
an attacker to escape from the AppContainer sandbox in the browser. An attacker
who successfully exploited this vulnerability could gain elevated privileges and
break out of the Edge AppContainer sandbox.
Internet Explorer Elevation of Privilege Vulnerability (CVE-2018-8470) MS Rating: Important
A
Security Seature Bypass vulnerability exists in Internet Explorer due to how
scripts are handled that allows a universal cross-site scripting (UXSS)
condition. An attacker could use the UXSS vulnerability to access any session
belonging to web pages currently opened (or cached) by the browser at the time
the attack is triggered.
Cumulative Security Update for Microsoft Office
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8331) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Office SharePoint XSS Vulnerability (CVE-2018-8426) MS Rating: Important
A
cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-8428) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted request to an affected SharePoint server.
Word PDF Remote Code Execution Vulnerability (CVE-2018-8430) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Word 2013 and Microsoft
Word 2016 if a user opens a specially crafted PDF file. An attacker who
successfully exploited the vulnerability could cause arbitrary code to execute
in the context of the current user. To exploit the vulnerability, an attacker
must entice the user to open a specially crafted PDF file.
Microsoft Excel Information Disclosure Vulnerability (CVE-2018-8429) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Excel improperly
discloses the contents of its memory. An attacker who exploited the
vulnerability could access information previously deleted from the active
worksheet. To exploit the vulnerability, an attacker could craft a special
document file and then convince the user to open it.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-8431) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted request to an affected SharePoint server.
Cumulative Security Update for Microsoft .NET Framework
.NET Framework Remote Code Execution Vulnerability (CVE-2018-8421) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft .NET Framework
processes untrusted input. An attacker can exploit this vulnerability using the
.NET framework to take control of an affected system.
ASP.NET Core Denial of Service (CVE-2018-8409) MS Rating: Important
A
denial of service vulnerability exists when ASP.NET Core improperly handles web
requests. An attacker can exploit this vulnerability to cause a denial of
service against a ASP.NET Core web application. The vulnerability can be
exploited remotely, without authentication.
OData Denial of Service Vulnerability (CVE-2018-8269) MS Rating: Important
A
denial of service vulnerability exists when OData Library improperly handles web
requests. An attacker who successfully exploited this vulnerability could cause
a denial of service against an OData web application. A remote unauthenticated
attacker could exploit this vulnerability by issuing specially crafted requests
to the OData application.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8336) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
An authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8419) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel fails to
properly initialize a memory address. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user's
system. To exploit this vulnerability, an attacker would have to log on to an
affected system and run a specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8442) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
An authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8443) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
An authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8445) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
An authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8446) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
An authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows Kernel Elevation of Privilege Vulnerability (CVE-2018-8455) MS Rating: Important
An
elevation of privilege vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions. To exploit the
vulnerability, a locally authenticated attacker could run a specially crafted
application.
Cumulative Security Update for Microsoft Microsoft Windows Hyper-V
Windows Hyper-V Remote Code Execution Vulnerability (CVE-2018-0965) MS Rating: Critical
A
remote code execution vulnerability exists when Windows Hyper-V on a host server
fails to properly validate input from an authenticated user on a guest operating
system. To exploit the vulnerability, an attacker could run a specially crafted
application on a guest operating system that could cause the Hyper-V host
operating system to execute arbitrary code. An attacker who successfully
exploited the vulnerability could execute arbitrary code on the host operating
system.
Windows Hyper-V Remote Code Execution Vulnerability (CVE-2018-8439) MS Rating: Critical
A
remote code execution vulnerability exists when Windows Hyper-V on a host server
fails to properly validate input from an authenticated user on a guest operating
system. To exploit the vulnerability, an attacker could run a specially crafted
application on a guest operating system that could cause the Hyper-V host
operating system to execute arbitrary code. An attacker who successfully
exploited the vulnerability could execute arbitrary code on the host operating
system.
Windows Hyper-V Denial of Service Vulnerability (CVE-2018-8436) MS Rating: Important
A
denial of service vulnerability exists when Microsoft Hyper-V Network Switch on
a host server fails to properly validate input from a privileged user on a guest
operating system. An attacker who successfully exploited the vulnerability could
cause the host server to crash. To exploit the vulnerability, an attacker who
already has a privileged account on a guest operating system, running as a
virtual machine, could run a specially crafted application that causes a host
machine to crash.
Windows Hyper-V Denial of Service Vulnerability (CVE-2018-8437) MS Rating: Important
A
denial of service vulnerability exists when Microsoft Hyper-V Network Switch on
a host server fails to properly validate input from a privileged user on a guest
operating system. An attacker who successfully exploited the vulnerability could
cause the host server to crash. To exploit the vulnerability, an attacker who
already has a privileged account on a guest operating system, running as a
virtual machine, could run a specially crafted application that causes a host
machine to crash.
Windows Hyper-V Information Disclosure Vulnerability (CVE-2018-8434) MS Rating: Important
An
information disclosure vulnerability exists when Windows Hyper-V on a host
operating system fails to properly validate input from an authenticated user on
a guest operating system. To exploit the vulnerability, an attacker on a guest
operating system could run a specially crafted application that could cause the
Hyper-V host operating system to disclose memory information. An attacker who
successfully exploited the vulnerability could gain access to information on the
Hyper-V host operating system.
Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2018-8435) MS Rating: Important
A
security feature bypass vulnerability exists when Windows Hyper-V BIOS loader
fails to provide a high-entropy source. To exploit this vulnerability, an
attacker would need to reboot a guest virtual machine numerous times until the
vulnerability is triggered.
Windows Hyper-V Denial of Service Vulnerability (CVE-2018-8438) MS Rating: Important
A
denial of service vulnerability exists when Windows improperly handles objects
in memory. An attacker who successfully exploited the vulnerability could cause
a target system to stop responding. To exploit this vulnerability, an attacker
would have to log on to an affected system and run a specially crafted
application.
Cumulative Security Update for Microsoft JET Database Engine
Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2018-8392) MS Rating: Important
A
buffer overflow vulnerability exists in the Microsoft JET Database Engine that
could allow remote code execution on an affected system. An attacker who
successfully exploited this vulnerability could take control of an affected
system.
Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2018-8393) MS Rating: Important
A
buffer overflow vulnerability exists in the Microsoft JET Database Engine that
could allow remote code execution on an affected system. An attacker who
successfully exploited this vulnerability could take control of an affected
system.
Cumulative Security Update for Microsoft Windows
Win32k Graphics Remote Code Execution Vulnerability (CVE-2018-8332) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited this vulnerability could take control of the affected
system.
MS XML Remote Code Execution Vulnerability (CVE-2018-8420) MS Rating: Critical
A
remote code execution vulnerability exists when the Microsoft XML Core Services
MSXML parser processes user input. An attacker who successfully exploited the
vulnerability could run malicious code remotely to take control of the user's
system. To exploit the vulnerability, an attacker could host a specially crafted
website designed to invoke MSXML through a web browser.
Windows Remote Code Execution Vulnerability (CVE-2018-8475) MS Rating: Critical
A
remote code execution vulnerability exists when Windows image file loading
functionality does not properly handle malformed image files. An attacker who
successfully exploited the vulnerability could execute arbitrary code. To
exploit the vulnerability, an attacker would have to convince a user to load a
malformed image file from either a webpage or an email message.
Windows SMB Denial of Service Vulnerability (CVE-2018-8335) MS Rating: Important
A
denial of service vulnerability exists in the Microsoft Server Block Message
(SMB) when an attacker sends specially crafted requests to the server. An
attacker who exploited this vulnerability could cause the affected system to
crash. To attempt to exploit this issue, an attacker would need to send
specially crafted SMB requests to the target system.
Windows SMB Information Disclosure Vulnerability (CVE-2018-8444) MS Rating: Important
An
information disclosure vulnerability exists in the way that the Microsoft Server
Message Block 2.0 (SMBv2) server handles certain requests. An attacker who
successfully exploited this vulnerability could craft a special packet, which
could lead to information disclosure from the server. To exploit the
vulnerability, in most situations, an unauthenticated attacker could send a
specially crafted packet to a targeted SMBv2 server.
Windows Information Disclosure Vulnerability (CVE-2018-8271) MS Rating: Important
An
information disclosure vulnerability exists in Windows when the Windows
bowser.sys kernel-mode driver fails to properly handle objects in memory. An
attacker who successfully exploited the vulnerability could potentially disclose
contents of System memory. To exploit this vulnerability, an attacker would have
to log on to the system first and then run a specially crafted application in
user mode.
Windows Subsystem for Linux Security Feature Bypass Vulnerability (CVE-2018-8337) MS Rating: Important
A
security feature bypass vulnerability exists when Windows Subsystem for Linux
improperly handles case sensitivity. An attacker who successfully exploited this
vulnerability could replace or delete abitrary files as a low privilege user. An
attacker could exploit this vulnerability by running a specially crafted
application.
Windows Registry Elevation of Privilege Vulnerability (CVE-2018-8410) MS Rating: Important
An
elevation of privilege vulnerability exists when the Windows Kernel API
improperly handles registry objects in memory. An attacker who successfully
exploited the vulnerability could gain elevated privileges on a targeted system.
A locally authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8424) MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker who successfully
exploited the vulnerability could obtain information to further compromise the
user's system. There are multiple ways an attacker could exploit the
vulnerability, such as by convincing a user to open a specially crafted
document, or by convincing a user to visit an untrusted webpage.
Microsoft Graphics Component Information Disclosure Vulnerability (CVE-2018-8433) MS Rating: Important
An
information disclosure vulnerability exists when the Windows Graphics component
improperly handles objects in memory. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user's
system. An authenticated attacker could exploit this vulnerability by running a
specially crafted application.
Windows ALPC Elevation of Privilege Vulnerability (CVE-2018-8440) MS Rating: Important
An
elevation of privilege vulnerability exists when Windows improperly handles
calls to Advanced Local Procedure Call (ALPC). An attacker who successfully
exploited this vulnerability could run arbitrary code in the security context of
the local system.
Windows Subsystem for Linux Elevation of Privilege Vulnerability (CVE-2018-8441) MS Rating: Important
An
elevation of privilege vulnerability exists due to an integer overflow in
Windows Subsystem for Linux. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions. To exploit the
vulnerability, a locally authenticated attacker could run a specially crafted
application.
Device Guard Security Feature Bypass Vulnerability (CVE-2018-8449) MS Rating: Important
A
security feature bypass exists when Device Guard incorrectly validates an
untrusted file. An attacker who successfully exploited this vulnerability could
make an unsigned file appear to be signed. Because Device Guard relies on the
signature to determine the file is non-malicious, Device Guard could then allow
a malicious file to execute.
DirectX Graphics Kernel Elevation of Privilege Vulnerability (CVE-2018-8462) MS Rating: Important
An
elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL)
driver improperly handles objects in memory. An attacker who successfully
exploited this vulnerability could run processes in an elevated context.
Windows Elevation of Privilege Vulnerability (CVE-2018-8468) MS Rating: Important
An
elevation of privilege vulnerability exists when Windows, allowing a sandbox
escape. An attacker who successfully exploited the vulnerability could use the
sandbox escape to elevate privileges on an affected system.
Security Update for Microsoft Azure IoT SDK
Azure IoT SDK Spoofing Vulnerability (CVE-2018-8479) MS Rating: Important
A
spoofing vulnerability exists for the Azure IoT Device Provisioning for the C
SDK library using the HTTP protocol on Windows platform. An attacker who
successfully exploited this vulnerability could impersonate a server used during
the provisioning process. To exploit this vulnerability, an attacker would need
to perform a man-in-the-middle (MitM) attack on the network that provisioning
was taking place.
Security Update for Lync for Mac
Lync for Mac 2011 Security Feature Bypass Vulnerability (CVE-2018-8474) MS Rating: Important
A security bypass vulnerability exists when Lync for Mac 2011 fails to properly sanitize specially crafted messages. An attacker who successfully exploited this vulnerability could cause a targeted Lync for Mac 2011 user's system to browse to an attacker-specified website or automatically download file types on the operating system's safe file type list.
Microsoft Patch Tuesday – August 2018
This month the vendor has patched 60 vulnerabilities, 20 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the August 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
.NET Framework
Microsoft Windows
Device Guard Code
ChakraCore
Microsoft Exchange Server
Microsoft SQL Server
Visual Studio
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8266) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8371) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8372) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8373) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8355) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-8359) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8380) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8381) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8384) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8385) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8387) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8390) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Microsoft Browser Memory Corruption Vulnerability (CVE-2018-8403) MS Rating: Critical
A
remote code execution vulnerability exists in the way that Microsoft browsers
access objects in memory. The vulnerability could corrupt memory in a way that
could allow an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8377) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Internet Explorer Remote Code Execution Vulnerability (CVE-2018-8316) MS Rating: Important
A
remote code execution vulnerability exists when Internet Explorer improperly
validates hyperlinks before loading executable libraries. An attacker who
successfully exploited this vulnerability could take control of an affected
system. Attackers can exploit this issue by enticing an unsuspecting user to
view a specially crafted web page.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8351) MS Rating: Important
An
information disclosure vulnerability exists when the Microsoft Edge Fetch API
incorrectly handles a filtered response type. An attacker could use the
vulnerability to read the URL of a cross-origin request. Attackers can exploit
this issue by enticing an unsuspecting user to view a specially crafted web
page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8353) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Internet Explorer Privilege Escalation Vulnerability (CVE-2018-8357) MS Rating: Important
A
privilege escalation vulnerability exists in Microsoft browsers allowing sandbox
escape. An attacker who successfully exploited the vulnerability could use the
sandbox escape to elevate privileges on an affected system. Attackers can
exploit this issue by enticing an unsuspecting user to view a specially crafted
web page.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8358) MS Rating: Important
A
security bypass vulnerability exists when Microsoft browsers improperly handle
redirect requests. The vulnerability allows Microsoft browsers to bypass CORS
redirect restrictions, and to follow redirect requests that should otherwise be
ignored. Attackers can exploit this issue by enticing an unsuspecting user to
view a specially crafted web page.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8370) MS Rating: Important
An
information disclosure vulnerability exists when WebAudio Library improperly
handles audio requests. An attacker who has successfully exploited this
vulnerability might be able to read privileged data across trust boundaries.
Attackers can exploit this issue by enticing an unsuspecting user to view a
specially crafted web page.
Microsoft Edge Spoofing Vulnerability (CVE-2018-8383) MS Rating: Important
A
spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP
content. An attacker who successfully exploited this vulnerability could trick a
user by redirecting the user to a specially crafted website. Attackers can
exploit this issue by enticing an unsuspecting user to view a specially crafted
web page.
Microsoft Edge Privilege Escalation Vulnerability (CVE-2018-8388) MS Rating: Low
A
spoofing vulnerability exists when Microsoft Edge improperly handles specific
HTML content. An attacker who successfully exploited this vulnerability could
trick a user into believing that the user was on a legitimate website. Attackers
can exploit this issue by enticing an unsuspecting user to view a specially
crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8389) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Cumulative Security Update for Microsoft Office
Microsoft Exchange Memory Corruption Vulnerability (CVE-2018-8302) MS Rating: Critical
A
remote code execution vulnerability exists in Microsoft Exchange software when
the software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the System user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8375) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2018-8376) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft PowerPoint software when
the software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Office Information Disclosure Vulnerability (CVE-2018-8378) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Office software reads
out of bound memory due to an uninitialized variable, which could disclose the
contents of memory. An attacker who successfully exploited the vulnerability
could view out of bound memory.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8379) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Information Disclosure Vulnerability (CVE-2018-8382) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Excel improperly
discloses the contents of its memory. An attacker who exploited the
vulnerability could use the information to compromise the user's computer or
data.
Microsoft Exchange Server Tampering Vulnerability (CVE-2018-8374) MS Rating: Moderate
A
tampering vulnerability exists when Microsoft Exchange Server fails to properly
handle profile data. An attacker who successfully exploited this vulnerability
could modify a targeted user's profile data.
Cumulative Security Update for Microsoft .NET Framework
.NET Framework Information Disclosure Vulnerability (CVE-2018-8360) MS Rating: Important
An
information disclosure vulnerability exists in Microsoft .NET Framework that
could allow an attacker to access information in multi-tenant environments. This
issue may cause when .NET Framework is used in high-load/high-density network
connections where content from one stream can blend into another stream.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Privilege Escalation Vulnerability (CVE-2018-8347) MS Rating: Important
A
privilege escalation vulnerability exists in Microsoft Windows when the Windows
kernel fails to properly handle parsing of certain symbolic links. An attacker
who successfully exploited this vulnerability could potentially access
privileged registry keys and thereby elevate permissions.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8348) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Win32k Privilege Escalation Vulnerability (CVE-2018-8399) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Win32k Privilege Escalation Vulnerability (CVE-2018-8404) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Cumulative Security Update for Microsoft Windows
Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2018-8273) MS Rating: Critical
A
buffer overflow vulnerability exists in the Microsoft SQL Server that could
allow remote code execution on an affected system. An attacker who successfully
exploited this vulnerability could execute code in the context of the SQL Server
Database Engine service account.
Microsoft Graphics Remote Code Execution Vulnerability (CVE-2018-8344) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited the vulnerability could take control of the affected
system.
LNK Remote Code Execution Vulnerability (CVE-2018-8345) MS Rating: Critical
A
remote code execution vulnerability exists in Microsoft Windows that could allow
remote code execution if a '.LNK' file is processed. An attacker who
successfully exploited this vulnerability could gain the same user rights as the
local user.
Windows PDF Remote Code Execution Vulnerability (CVE-2018-8350) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Windows PDF Library
improperly handles objects in memory. The vulnerability could corrupt memory in
a way that enables an attacker to execute arbitrary code in the context of the
current user.
GDI+ Remote Code Execution Vulnerability (CVE-2018-8397) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Windows Graphics
Device Interface (GDI) handles objects in the memory. An attacker who
successfully exploited this vulnerability could take control of the affected
system.
Diagnostic Hub Standard Collector Privilege Escalation Vulnerability (CVE-2018-0952) MS Rating: Important
A
privilege escalation vulnerability exists when Diagnostics Hub Standard
Collector allows file creation in arbitrary locations. To exploit the
vulnerability, an attacker would first have to log on to the system.
Cortana Privilege Escalation Vulnerability (CVE-2018-8253) MS Rating: Important
A
privilege escalation vulnerability exists when Cortana allows arbitrary website
browsing on the lockscreen. An attacker who successfully exploited the
vulnerability could steal browser stored passwords or log on to websites as
another user.
Windows Installer Privilege Escalation Vulnerability (CVE-2018-8339) MS Rating: Important
A
privilege escalation vulnerability exists in the Windows Installer when the
Windows Installer fails to properly sanitize input leading to an insecure
library loading behavior. A locally authenticated attacker could run arbitrary
code with elevated system privileges.
ADFS Security Bypass Vulnerability (CVE-2018-8340) MS Rating: Important
A
security bypass vulnerability exists when Active Directory Federation Services
(AD FS) improperly handles multi-factor authentication requests. To exploit this
vulnerability, an attacker could send a specially crafted authentication
request.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8341) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Windows NDIS Privilege Escalation Vulnerability (CVE-2018-8342) MS Rating: Important
A
privilege escalation vulnerability exists in the Network Driver Interface
Specification (NDIS) when 'ndis.sys' fails to check the length of a buffer prior
to copying memory to it.
Windows NDIS Privilege Escalation Vulnerability (CVE-2018-8343) MS Rating: Important
A
privilege escalation vulnerability exists in the Network Driver Interface
Specification (NDIS) when 'ndis.sys' fails to check the length of a buffer prior
to copying memory to it.
LNK Remote Code Execution Vulnerability (CVE-2018-8346) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Windows that could allow
remote code execution if a '.LNK' file is processed. An attacker who
successfully exploited this vulnerability could gain the same user rights as the
local user.
Microsoft COM for Windows Remote Code Execution Vulnerability (CVE-2018-8349) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft COM for Windows when it
fails to properly handle serialized objects. An attacker who successfully
exploited the vulnerability could use a specially crafted file or script to
perform actions.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8394) MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker who successfully
exploited the vulnerability could obtain information to further compromise the
user's system.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8396) MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker who successfully
exploited the vulnerability could obtain information to further compromise the
user's system.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8398) MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker who successfully
exploited the vulnerability could obtain information to further compromise the
user's system.
DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2018-8400) MS Rating: Important
A
privilege escalation vulnerability exists when the DirectX Graphics Kernel
(DXGKRNL) driver improperly handles objects in memory. An attacker who
successfully exploited this vulnerability could run processes in an elevated
context.
DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2018-8401) MS Rating: Important
A
privilege escalation vulnerability exists when the DirectX Graphics Kernel (DXGKRNL)
driver improperly handles objects in memory. An attacker who successfully
exploited this vulnerability could run processes in an elevated context.
DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2018-8405) MS Rating: Important
A
privilege escalation vulnerability exists when the DirectX Graphics Kernel (DXGKRNL)
driver improperly handles objects in memory. An attacker who successfully
exploited this vulnerability could run processes in an elevated context.
DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2018-8406) MS Rating: Important
A
privilege escalation vulnerability exists when the DirectX Graphics Kernel (DXGKRNL)
driver improperly handles objects in memory. An attacker who successfully
exploited this vulnerability could run processes in an elevated context.
Microsoft (MAU) Office Privilege Escalation Vulnerability (CVE-2018-8412) MS Rating: Important
A
privilege escalation vulnerability exists when the Microsoft AutoUpdate (MAU)
application for Mac improperly validates updates before executing them. An
attacker who successfully exploited the vulnerability who already has the
ability to execute code on a system could elevate privileges.
Windows Shell Remote Code Execution Vulnerability (CVE-2018-8414) MS Rating: Important
A
remote code execution vulnerability exists when the Windows Shell does not
properly validate file paths. An attacker who successfully exploited this
vulnerability could run arbitrary code in the context of the current user.
Cumulative Security Update for Microsoft Device Guard Code
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8200) MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8204) MS Rating: Important
A security bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the local machine.
Microsoft Patch Tuesday – July 2018
This month the vendor has patched 53 vulnerabilities, 17 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the July 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
Microsoft .NET
Microsoft Windows
ChakraCore
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8242) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8275) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8279) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8280) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that enables an attacker to execute arbitrary code
in the context of the current user. Attackers can exploit this issue by enticing
an unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8283) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8286) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that enables an attacker to execute arbitrary code
in the context of the current user. Attackers can exploit this issue by enticing
an unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8288) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8290) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that enables an attacker to execute arbitrary code
in the context of the current user. Attackers can exploit this issue by enticing
an unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8291) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8294) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that enables an attacker to execute arbitrary code
in the context of the current user. Attackers can exploit this issue by enticing
an unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8296) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8298) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8262) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8274) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8301) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8324) MS Rating: Critical
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8287) MS Rating: Important
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that enables an attacker to execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Internet Explorer Security Bypass Vulnerability (CVE-2018-0949) MS Rating: Important
A
security bypass vulnerability exists when Microsoft Internet Explorer improperly
handles requests involving UNC resources. An attacker who successfully exploited
the vulnerability could force the browser to load data that would otherwise be
restricted.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8289) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8297) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8125) MS Rating: Important
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that enables an attacker to execute arbitrary code
in the context of the current user. Attackers can exploit this issue by enticing
an unsuspecting user to view a specially crafted web page.
Scripting Engine Security Bypass Vulnerability (CVE-2018-8276) MS Rating: Important
A
security bypass vulnerability exists in the Microsoft Chakra scripting engine
that allows Control Flow Guard (CFG) to be bypassed. By itself, the CFG bypass
vulnerability does not allow arbitrary code execution.
Microsoft Edge Spoofing Vulnerability (CVE-2018-8278) MS Rating: Important
A
spoofing vulnerability exists when Microsoft Edge improperly handles specific
HTML content. An attacker who successfully exploited this vulnerability could
trick a user into believing that the user was on a legitimate website.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8325) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Cumulative Security Update for Microsoft Office
Microsoft Office Remote Code Execution Vulnerability (CVE-2018-8281) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8299) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2018-8300) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft SharePoint when the
software fails to check the source markup of an application package. An attacker
who successfully exploited the vulnerability could run arbitrary code in the
context of the SharePoint application pool and the SharePoint server farm
account.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8323) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft Access Remote Code Execution Use After Free Vulnerability (CVE-2018-8312) MS Rating: Important
A
remote code execution vulnerability exists when Microsoft Access fails to
properly handle objects in memory. An attacker who successfully exploited the
vulnerability could take control of the affected system.
Microsoft Office Tampering Vulnerability (CVE-2018-8310) MS Rating: Low
A
tampering vulnerability exists when Microsoft Outlook does not properly handle
specific attachment types when rendering HTML emails. An attacker could exploit
the vulnerability by sending a specially crafted email and attachment to a
victim, or by hosting a malicious.
Cumulative Security Update for Microsoft .NET
ASP.NET Core Security Bypass Vulnerability (CVE-2018-8171) MS Rating: Important
A
security bypass vulnerability exists in ASP. NET Core when the number of
incorrect login attempts is not validated. An attacker who successfully
exploited this vulnerability could try an infinite number of authentication
attempts.
.NET Framework Privilege Escalation Vulnerability (CVE-2018-8202) MS Rating: Important
A
Privilege Escalation vulnerability exists in . NET Framework which could allow
an attacker to elevate their privilege level. To exploit the vulnerability, an
attacker would first have to access the local machine, and then run a malicious
program.
.NET Framework Remote Code Execution Vulnerability (CVE-2018-8260) MS Rating: Important
A
Remote Code Execution vulnerability exists in . NET software when the software
fails to check the source markup of a file. An attacker who successfully
exploited the vulnerability could run arbitrary code in the context of the
current user. Exploitation of the vulnerability requires that a user open a
specially crafted file with an affected version of .NET. In an email attack
scenario, an attacker could exploit the vulnerability by sending the specially
crafted file to the user and convincing the user to open the file.
.NET Framework Remote Code Injection Vulnerability (CVE-2018-8284) MS Rating: Important
A
remote code execution vulnerability exists when the Microsoft . NET Framework
fails to validate input properly. An attacker who successfully exploited this
vulnerability could take control of an affected system. To exploit the
vulnerability, an attacker would need to pass specific input to an application
utilizing susceptible .Net methods.
.NET Framework Security Bypass Vulnerability (CVE-2018-8356) MS Rating: Important
A
security bypass vulnerability exists when Microsoft . NET Framework components
do not correctly validate certificates. An attacker could present expired
certificates when challenged.
Cumulative Security Update for Microsoft Windows Kernel
Win32k Privilege Escalation Vulnerability (CVE-2018-8282) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Windows
kernel-mode driver fails to properly handle objects in memory. An attacker who
successfully exploited this vulnerability could run arbitrary code in kernel
mode.
Windows Privilege Escalation Vulnerability (CVE-2018-8313) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel API
enforces permissions. An attacker who successfully exploited the vulnerability
could impersonate processes, interject cross-process communication, or interrupt
system functionality.
Windows Kernel Privilege Escalation Vulnerability (CVE-2018-8308) MS Rating: Important
A
privilege escalation vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker who successfully exploited this
vulnerability could run arbitrary code in kernel mode.
Cumulative Security Update for Microsoft Windows
PowerShell Editor Services Remote Code Execution Vulnerability (CVE-2018-8327) MS Rating: Critical
A
remote code execution vulnerability exists in PowerShell Editor Services. An
attacker who successfully exploited this vulnerability could execute malicious
code on a vulnerable system.
Visual Studio Remote Code Execution Vulnerability (CVE-2018-8172) MS Rating: Important
A
remote code execution vulnerability exists in Visual Studio software when the
software fails to check the source markup of a file for an unbuilt project. An
attacker who successfully exploited the vulnerability could run arbitrary code
in the context of the current user.
Skype for Business and Lync Security Bypass Vulnerability (CVE-2018-8238) MS Rating: Important
A
security bypass vulnerability exists when Skype for Business or Lync do not
properly parse UNC path links shared via messages. An attacker who successfully
exploited the vulnerability could execute arbitrary commands in the context of
the logged-in user.
Remote Code Execution Vulnerability in Skype For Business and Lync (CVE-2018-8311) MS Rating: Important
A
remote code execution vulnerability exists when Skype for Business and Microsoft
Lync clients fail to properly sanitize specially crafted content. The
vulnerability could corrupt memory in a way that could allow an attacker to
execute arbitrary code in the context of the current user.
Windows FTP Server Denial of Service Vulnerability (CVE-2018-8206) MS Rating: Important
A
denial of service vulnerability exists when Windows improperly handles File
Transfer Protocol (FTP) connections. An attacker who successfully exploited the
vulnerability could cause a target system to stop responding.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8222) MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Microsoft Macro Assembler Tampering Vulnerability (CVE-2018-8232) MS Rating: Moderate
A
Tampering vulnerability exists when Microsoft Macro Assembler improperly
validates code. An attacker could introduce code into an application, which
modifies data in an unintended manner.
Windows DNSAPI Denial of Service Vulnerability (CVE-2018-8304) MS Rating: Important
A
denial of service vulnerability exists in Windows Domain Name System (DNS)
DNSAPI. dll when it fails to properly handle DNS responses.
Windows Mail Client Information Disclosure Vulnerability (CVE-2018-8305) MS
Rating: Important
An
information disclosure vulnerability exists in Windows Mail Client when a
message is opened. This vulnerability could potentially result in the disclosure
of sensitive information to a malicious site.
Microsoft Wireless Display Adapter Command Injection Vulnerability (CVE-2018-8306) MS Rating: Important
A
command injection vulnerability exists in the Microsoft Wireless Display Adapter
(MWDA) when the Microsoft Wireless Display Adapter does not properly manage user
input. For this vulnerability to be exploited, the attacker must be
authenticated (logged on) to the target display.
WordPad Security Bypass Vulnerability (CVE-2018-8307) MS Rating: Important
A
security bypass vulnerability exists when Microsoft WordPad improperly handles
embedded OLE objects. An attacker who successfully exploited the vulnerability
could bypass content blocking.
Windows Denial of Service Vulnerability (CVE-2018-8309) MS Rating: Important
A
denial of service vulnerability exists when Windows improperly handles objects
in memory. An attacker who successfully exploited the vulnerability could cause
a target system to stop responding.
Windows Privilege Escalation Vulnerability (CVE-2018-8314) MS Rating: Important
A
privilege escalation vulnerability exists when Windows fails a check, allowing a
sandbox escape. An attacker who successfully exploited the vulnerability could
use the sandbox escape to elevate privileges on an affected system.
MSR JavaScript Cryptography Library Security Bypass Vulnerability (CVE-2018-8319) MS Rating: Important
A
security bypass vulnerability exists in MSR JavaScript Cryptography Library that
is caused by incorrect arithmetic computations. An attacker could craft a
signature, without the need of the corresponding key, and mimic the entity
associated with the public/private key pair.
Open Source Customization for Active Directory Federation Services XSS Vulnerability (CVE-2018-8326) MS Rating: Important
A cross-site-scripting (XSS) vulnerability exists when an open source customization for Microsoft Active Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected AD FS server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected AD FS server.
Microsoft Patch Tuesday – June 2018
This month the vendor has patched 50 vulnerabilities, 11 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the June 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
Microsoft Hyper-V
Microsoft Windows
Device Guard Code
ChakraCore
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8236)MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8243)MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-8249)MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8267)MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8110)MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8111)MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that enables an attacker to execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8229)MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. Attackers can exploit this
issue by enticing an unsuspecting user to view a specially crafted web page.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0871)MS Rating: Important
An
information disclosure vulnerability exists when Edge improperly marks files. An
attacker who successfully exploited this vulnerability could exfiltrate file
contents from disk. Attackers can exploit this issue by enticing an unsuspecting
user to view a specially crafted web page.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-0978)MS Rating: Important
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user. Attackers can exploit this issue by enticing an unsuspecting user to view
a specially crafted web page.
Internet Explorer Security Feature Bypass Vulnerability (CVE-2018-8113)MS Rating: Important
A
security bypass vulnerability exists in Internet Explorer that allows for
bypassing Mark of the Web Tagging (MOTW). Failing to set the MOTW means that a
large number of Microsoft security technologies are bypassed. Attackers can
exploit this issue by enticing an unsuspecting user to view a specially crafted
web page.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8227)MS Rating: Important
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user. Attackers can exploit this issue by enticing an
unsuspecting user to view a specially crafted web page.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-8234)MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker can exploit this issue to obtain
sensitive information to further compromise the user’s system. Attackers can
exploit this issue by enticing an unsuspecting user to view a specially crafted
web page.
Microsoft Edge Security Bypass Vulnerability (CVE-2018-8235)MS Rating: Important
A
security bypass vulnerability exists when Microsoft Edge improperly handles
requests of different origins. An attacker can exploit this issue to bypass
Same-Origin Policy (SOP) restrictions, and to allow requests that should
otherwise be ignored.
Cumulative Security Update for Microsoft Office
Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2018-8244)MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft Outlook does not
validate attachment headers properly. An attacker who successfully exploited the
vulnerability could send an email with hidden attachments that would be opened
or executed once a victim clicks a link within the email.
Microsoft Office Elevation of Privilege Vulnerability (CVE-2018-8245)MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft Publisher fails to
utilize features that lock down the Local Machine zone when instantiating OLE
objects. An attacker who successfully exploited the vulnerability could force
arbitrary code to be executed in the Local Machine zone.
Microsoft Excel Information Disclosure Vulnerability (CVE-2018-8246)MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Excel improperly
discloses the contents of its memory. An attacker who exploited the
vulnerability could use the information to compromise the user’s computer or
data.
Microsoft Office Elevation of Privilege Vulnerability (CVE-2018-8247)MS Rating: Important
A
privilege escalation vulnerability exists when Office Web Apps Server 2013 and
Office Online Server fail to properly handle web requests. An attacker who
successfully exploited this vulnerability could perform script/content injection
attacks and attempt to trick the user into disclosing sensitive information.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8248)MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-8252)MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-8254)MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Cumulative Security Update for Microsoft Hyper-V
Windows Hyper-V Denial of Service Vulnerability (CVE-2018-8218)MS Rating: Important
A
denial of service vulnerability exists when Microsoft Hyper-V Network Switch on
a host server fails to properly validate input from a privileged user on a guest
operating system. An attacker who successfully exploited the vulnerability could
cause the host server to crash.
Hypervisor Code Integrity Elevation of Privilege Vulnerability (CVE-2018-8219)MS Rating: Important
A
privilege escalation vulnerability exists when Windows Hyper-V instruction
emulation fails to properly enforce privilege levels. An attacker who
successfully exploited this vulnerability could gain elevated privileges on a
target guest operating system.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8121)MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
initializes objects in memory. An attacker can exploit this issue by running a
specially crafted application. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8207)MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user’s system.
Windows Kernel Elevation of Privilege Vulnerability (CVE-2018-8224)MS Rating: Important
A
privilege escalation vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker who successfully exploited this
vulnerability could run arbitrary code in kernel mode.
Win32k Elevation of Privilege Vulnerability (CVE-2018-8233)MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Cumulative Security Update for Microsoft Windows
Media Foundation Memory Corruption Vulnerability (CVE-2018-8251)MS Rating: Critical
A
memory corruption vulnerability exists when Windows Media Foundation improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could install programs; view, change, or delete data; or create
new accounts with full user rights.
Windows Remote Code Execution Vulnerability (CVE-2018-8213)MS Rating: Critical
A
remote code execution vulnerability exists when Windows improperly handles
objects in memory. An attacker who successfully exploited these vulnerabilities
could take control of an affected system.
Windows DNSAPI Remote Code Execution Vulnerability (CVE-2018-8225)MS Rating: Critical
A
remote code execution vulnerability exists in Windows Domain Name System (DNS)
DNSAPI. dll when it fails to properly handle DNS responses.
HTTP Protocol Stack Remote Code Execution Vulnerability (CVE-2018-8231)MS Rating: Critical
A
remote code execution vulnerability exists when HTTP Protocol Stack (Http.sys)
improperly handles objects in memory. An attacker who successfully exploited
this vulnerability could execute arbitrary code and take control of the affected
system.
Windows Elevation of Privilege Vulnerability (CVE-2018-0982)MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel API
enforces permissions. An attacker who successfully exploited the vulnerability
could impersonate processes, interject cross-process communication, or interrupt
system functionality.
NTFS Elevation of Privilege Vulnerability (CVE-2018-1036)MS Rating: Important
A
privilege escalation vulnerability exists when NTFS improperly checks access. An
attacker who successfully exploited this vulnerability could run processes in an
elevated context.
Windows Code Integrity Module Denial of Service Vulnerability (CVE-2018-1040)MS Rating: Important
A
denial of service vulnerability exists in the way that the Windows Code
Integrity Module performs hashing. An attacker who successfully exploited the
vulnerability could cause a system to stop responding.
Cortana Elevation of Privilege Vulnerability (CVE-2018-8140)MS Rating: Important
A
privilege escalation vulnerability exists when Cortana retrieves data from user
input services without consideration for status. An attacker who successfully
exploited the vulnerability could execute commands with elevated permissions.
HIDParser Elevation of Privilege Vulnerability (CVE-2018-8169)MS Rating: Important
A
privilege escalation vulnerability exists when the (Human Interface Device) HID
Parser Library driver improperly handles objects in memory. An attacker who
successfully exploited this vulnerability could run processes in an elevated
context.
WEBDAV Denial of Service Vulnerability (CVE-2018-8175)MS Rating: Important
An
denial of service vulnerability exists when Windows NT WEBDAV Minirdr attempts
to query a WEBDAV directory. An attacker who successfully exploited the
vulnerability could cause a denial of service.
Windows Denial of Service Vulnerability (CVE-2018-8205)MS Rating: Important
A
denial of service vulnerability exists when Windows improperly handles objects
in memory. An attacker who successfully exploited the vulnerability could cause
a target system to stop responding.
Windows Desktop Bridge Elevation of Privilege Vulnerability (CVE-2018-8208)MS Rating: Important
A
privilege escalation vulnerability exists in Windows when Desktop Bridge does
not properly manage the virtual registry. An attacker who successfully exploited
this vulnerability could run arbitrary code in kernel mode.
Windows Wireless Network Profile Information Disclosure Vulnerability (CVE-2018-8209)MS Rating: Important
An
information disclosure vulnerability exists when Windows allows a normal user to
access the Wireless LAN profile of an administrative user. An authenticated
attacker who successfully exploited the vulnerability could access the Wireless
LAN profile of an administrative user, including passwords for wireless
networks.
Windows Remote Code Execution Vulnerability (CVE-2018-8210)MS Rating: Important
A
remote code execution vulnerability exists when Windows improperly handles
objects in memory. An attacker who successfully exploited these vulnerabilities
could take control of an affected system.
HTTP.sys Denial of Service Vulnerability (CVE-2018-8226)MS Rating: Important
A
denial of service vulnerability exists in the HTTP 2.0 protocol stack (HTTP.sys)
when HTTP.sys improperly parses specially crafted HTTP 2.0 requests. An attacker
who successfully exploited the vulnerability could create a denial of service
condition, causing the target system to become unresponsive.
Windows GDI Information Disclosure Vulnerability (CVE-2018-8239)MS Rating: Important
An
information disclosure vulnerability exists when the Windows GDI component
improperly discloses the contents of its memory. An attacker can exploit this
issue to obtain sensitive information to further compromise the user’s system.
Windows Desktop Bridge Elevation of Privilege Vulnerability (CVE-2018-8214)MS Rating: Important
A
privilege escalation vulnerability exists in Windows when Desktop Bridge does
not properly manage the virtual registry. An attacker who successfully exploited
this vulnerability could run arbitrary code in kernel mode.
Cumulative Security Update for Microsoft Device Guard Code
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8211)MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8212)MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8215)MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8216)MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8217)MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8221)MS Rating: Important
A
security bypass vulnerability exists in Device Guard that could allow an
attacker to inject malicious code into a Windows PowerShell session. An attacker
who successfully exploited this vulnerability could inject code into a trusted
PowerShell process to bypass the Device Guard Code Integrity policy on the local
machine.
Device Guard Code Integrity Policy Security Bypass Vulnerability (CVE-2018-8201)MS Rating: Important
A security bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the local machine.
Microsoft Patch Tuesday – May 2018
This month the vendor has patched 67 vulnerabilities, 21 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the May 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
Exchange Server
.NET Framework
Microsoft Hyper-V
Microsoft Windows
ChakraCore
Azure IoT SDK
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Microsoft Browser Memory Corruption Vulnerability (CVE-2018-8178) MS Rating: Critical
A
remote code execution vulnerability exists in the way that Microsoft browsers
access objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8179) MS Rating: Critical
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2018-8174) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the VBScript engine
handles objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8128) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8130) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8133) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8137) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0943) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0945) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0946) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0951) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0953) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0954) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0955) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8177) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-1022) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8114) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8122) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-8139) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-1021) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Microsoft Browser Information Disclosure Vulnerability (CVE-2018-1025) MS Rating: Important
An
information disclosure vulnerability exists when affected Microsoft browsers
improperly handle objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Microsoft Edge Security Bypass Vulnerability (CVE-2018-8112) MS Rating: Important
A
security bypass vulnerability exists when Microsoft Edge improperly handles
requests of different origins. The vulnerability allows Microsoft Edge to bypass
Same-Origin Policy (SOP) restrictions, and to allow requests that should
otherwise be ignored.
Microsoft Edge Memory Corruption Vulnerability (CVE-2018-8123) MS Rating: Important
A
remote code execution vulnerability exists when Microsoft Edge improperly
accesses objects in memory. This vulnerability may corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Internet Explorer security bypass Vulnerability (CVE-2018-8126) MS Rating: Important
A
security bypass vulnerability exists when Internet Explorer fails to validate
User Mode Code Integrity (UMCI) policies. The vulnerability could allow an
attacker to bypass Device Guard UMCI policies.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-8145) MS Rating: Important
An
information disclosure vulnerability exists when Chakra improperly discloses the
contents of its memory, which could provide an attacker with information to
further compromise the user's computer or data.
Cumulative Security Update for Microsoft Office
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8147) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8148) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8149) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft Outlook security bypass Vulnerability (CVE-2018-8150) MS Rating: Important
A
security bypass vulnerability exists when the Microsoft Outlook attachment block
filter does not properly handle attachments. An attacker who successfully
exploited the vulnerability could execute arbitrary commands.
Microsoft Exchange Memory Corruption Vulnerability (CVE-2018-8151) MS Rating: Moderate
An
information disclosure vulnerability exists when Microsoft Exchange improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the remote system.
Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2018-8152) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft Exchange Outlook Web
Access (OWA) fails to properly handle web requests.
Microsoft Exchange Spoofing Vulnerability (CVE-2018-8153) MS Rating: Low
A
spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web
Access (OWA) fails to properly handle web requests. An attacker who successfully
exploited the vulnerability could perform script or content injection attacks,
and attempt to trick the user into disclosing sensitive information.
Microsoft Exchange Memory Corruption Vulnerability (CVE-2018-8154) MS Rating: Low
A
remote code execution vulnerability exists in Microsoft Exchange software when
the software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the System user.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8155) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8156) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft Office Remote Code Execution Vulnerability (CVE-2018-8157) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Office Remote Code Execution Vulnerability (CVE-2018-8158) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Exchange Privilege Escalation Vulnerability (CVE-2018-8159) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft Exchange Outlook Web
Access (OWA) fails to properly handle web requests.
Microsoft Outlook Information Disclosure Vulnerability (CVE-2018-8160) MS Rating: Important
An
information disclosure vulnerability exists in Outlook when a message is opened.
This vulnerability could potentially result in the disclosure of sensitive
information to a malicious site.
Microsoft Office Remote Code Execution Vulnerability (CVE-2018-8161) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-8162) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Information Disclosure Vulnerability (CVE-2018-8163) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Excel improperly
discloses the contents of its memory. An attacker who exploited the
vulnerability could use the information to compromise the user's computer or
data.
Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2018-8168) MS Rating: Low
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Cumulative Security Update for Microsoft .NET Framework
.NET and .NET Core Denial Of Service Vulnerability (CVE-2018-0765) MS Rating: Important
A
denial of service vulnerability exists when .NET and .NET Core improperly
process XML documents.
Cumulative Security Update for Microsoft Hyper-V
Hyper-V Remote Code Execution Vulnerability (CVE-2018-0959) MS Rating: Critical
A
remote code execution vulnerability exists when Windows Hyper-V on a host server
fails to properly validate input from an authenticated user on a guest operating
system.
Hyper-V vSMB Remote Code Execution Vulnerability (CVE-2018-0961) MS Rating: Critical
A
remote code execution vulnerability exists when Windows Hyper-V on a host server
fails to properly validate vSMB packet data. An attacker who successfully
exploited these vulnerabilities could execute arbitrary code on a target
operating system.
Cumulative Security Update for Microsoft Windows Kernel
Win32k Privilege Escalation Vulnerability (CVE-2018-8124) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8141) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-8127) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Windows Kernel Privilege Escalation Vulnerability (CVE-2018-8897) MS Rating: Important
A
privilege escalation vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker who successfully exploited this
vulnerability could run arbitrary code in kernel mode.
Win32k Privilege Escalation Vulnerability (CVE-2018-8164) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Win32k Privilege Escalation Vulnerability (CVE-2018-8166) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Cumulative Security Update for Microsoft Windows
Microsoft COM for Windows Remote Code Execution Vulnerability (CVE-2018-0824) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft COM for Windows when it
fails to properly handle serialized objects. An attacker who successfully
exploited the vulnerability could use a specially crafted file or script to
perform actions.
Windows Security Bypass Vulnerability (CVE-2018-0854) MS Rating: Important
A
security bypass vulnerability exists in Windows Scripting Host which could allow
an attacker to bypass Device Guard. An attacker who successfully exploited this
vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the
machine.
Windows Security Bypass Vulnerability (CVE-2018-0958) MS Rating: Important
A
security bypass vulnerability exists in Windows which could allow an attacker to
bypass Device Guard. An attacker who successfully exploited this vulnerability
could circumvent a User Mode Code Integrity (UMCI) policy on the machine.
Windows Security Bypass Vulnerability (CVE-2018-1039) MS Rating: Important
A
security bypass vulnerability exists in . Net Framework which could allow an
attacker to bypass Device Guard.
Win32k Privilege Escalation Vulnerability (CVE-2018-8120) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Win32k component
fails to properly handle objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Windows Security Bypass Vulnerability (CVE-2018-8129) MS Rating: Important
A
security bypass vulnerability exists in Windows which could allow an attacker to
bypass Device Guard. An attacker who successfully exploited this vulnerability
could circumvent a User Mode Code Integrity (UMCI) policy on the machine.
Windows Security Bypass Vulnerability (CVE-2018-8132) MS Rating: Important
A
security bypass vulnerability exists in Windows which could allow an attacker to
bypass Device Guard. An attacker who successfully exploited this vulnerability
could circumvent a User Mode Code Integrity (UMCI) policy on the machine.
Windows Privilege Escalation Vulnerability (CVE-2018-8134) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel API
enforces permissions. An attacker who successfully exploited the vulnerability
could impersonate processes, interject cross-process communication, or interrupt
system functionality.
Windows Remote Code Execution Vulnerability (CVE-2018-8136) MS Rating: Low
A
remote code execution vulnerability exists in the way that Windows handles
objects in memory. An attacker who successfully exploited the vulnerability
could execute arbitrary code with elevated permissions on a target system.
DirectX Graphics Kernel Privilege Escalation Vulnerability (CVE-2018-8165) MS Rating: Important
A
privilege escalation vulnerability exists when the DirectX Graphics Kernel(DXGKRNL)
driver improperly handles objects in memory.
Windows Common Log File System Driver Privilege Escalation Vulnerability (CVE-2018-8167) MS Rating: Important
A
privilege escalation vulnerability exists when the Windows Common Log File
System (CLFS) driver improperly handles objects in memory.
Windows Image Privilege Escalation Vulnerability (CVE-2018-8170) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows kernel
image handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Microsoft InfoPath Remote Code Execution Vulnerability (CVE-2018-8173) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft InfoPath when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Windows Security Bypass Vulnerability (CVE-2018-8142) MS Rating: Important
A
security bypass exists when Windows incorrectly validates kernel driver
signatures. An attacker who successfully exploited this vulnerability could
bypass security features and load improperly signed drivers into the kernel.
Cumulative Security Update for Microsoft Azure IoT SDK
Azure IoT SDK Spoofing Vulnerability (CVE-2018-8119) MS Rating: Important
A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol. An attacker who successfully exploited this vulnerability could impersonate a server used duing the provisioning process.
Microsoft Patch Tuesday – April 2018
This month the vendor has patched 66 vulnerabilities, 22 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the April 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
Microsoft Visual Studio
Microsoft Hyper-V
Microsoft EOT Font Engine
Microsoft Windows
ChakraCore
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Internet Explorer Memory Corruption Vulnerability (CVE-2018-0870) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-1018) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-1020) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-0991) MS Rating: Critical
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-0988) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0996) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-1000) MS Rating: Critical
An
information disclosure vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could provide an attacker with information
to further compromise the user's computer or data.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-0981) MS Rating: Critical
An
information disclosure vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could provide an attacker with information
to further compromise the user's computer or data.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0979) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0980) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0993) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0994) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0995) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-1019) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Microsoft Browser Memory Corruption Vulnerability (CVE-2018-1023) MS Rating: Critical
A
remote code execution vulnerability exists in the way that Microsoft browsers
access objects in memory. The vulnerability could corrupt memory in a way that
could allow an attacker to execute arbitrary code in the context of the current
user.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-0997) MS Rating: Important
A
remote code execution vulnerability exists when Internet Explorer improperly
accesses objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0998) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge PDF Reader
improperly handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0892) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker who successfully exploited the
vulnerability could obtain information to further compromise the user's system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-1001) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-0987) MS Rating: Important
An
information disclosure vulnerability exists when the scripting engine does not
properly handle objects in memory in Internet Explorer. An attacker who
successfully exploited the vulnerability could obtain information to further
compromise the user's system.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-0989) MS Rating: Important
An
information disclosure vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could provide an attacker with information
to further compromise the user's computer or data.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0990) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. The vulnerability could
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Cumulative Security Update for Microsoft EOT Font Engine
Windows EOT Font Engine Remote Code Execution (CVE-2018-1010) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited the vulnerability could take control of the affected
system.
Windows EOT Font Engine Remote Code Execution (CVE-2018-1012) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited the vulnerability could take control of the affected
system.
Windows EOT Font Engine Remote Code Execution (CVE-2018-1013) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited the vulnerability could take control of the affected
system.
Windows EOT Font Engine Remote Code Execution (CVE-2018-1015) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited the vulnerability could take control of the affected
system.
Windows EOT Font Engine Remote Code Execution (CVE-2018-1016) MS Rating: Critical
A
remote code execution vulnerability exists when the Windows font library
improperly handles specially crafted embedded fonts. An attacker who
successfully exploited the vulnerability could take control of the affected
system.
Cumulative Security Update for Microsoft Office
Microsoft Office Graphics Remote Code Execution Vulnerability (CVE-2018-1028) MS Rating: Important
A
remote code execution vulnerability exists when the Office graphics improperly
handles specially crafted embedded fonts. An attacker who successfully exploited
this vulnerability could take control of the affected system.
Microsoft Office Graphics Information Disclosure Vulnerability (CVE-2018-1007) MS Rating: Important
An
information disclosure vulnerability exists when an Office Graphics component
improperly handles objects in memory. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user's
system.
Microsoft Outlook Information Disclosure Vulnerability (CVE-2018-0950) MS Rating: Important
An
information disclosure vulnerability exists when Office renders Rich Text Format
(RTF) email messages containing OLE objects when a message is opened or
previewed. This vulnerability could potentially result in the disclosure of
sensitive information to a malicious site.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-0920) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-1011) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-1026) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-1027) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-1029) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-1030) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-1032) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-1034) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-1005) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-1014) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An authenticated attacker could exploit the vulnerability by
sending a specially crafted URL to a user of an affected SharePoint server.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0887) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel fails to
properly initialize a memory address. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user's
system.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0968) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0969) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0970) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0971) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0972) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0973) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0974) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0975) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0960) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user's system.
Windows Kernel Elevation of Privilege (CVE-2018-0963) MS Rating: Important
An
elevation of privilege vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Cumulative Security Update for Microsoft Visual Studio
Microsoft Visual Studio Information Disclosure Vulnerability (CVE-2018-1037) MS Rating: Important
An
information disclosure vulnerability exists when Visual Studio improperly
discloses the contents of its memory. An attacker who exploited the
vulnerability could view uninitialized memory from the computer used to compile
a program database file.
Cumulative Security Update for Microsoft Hyper-V
Hyper-V Information Disclosure (CVE-2018-0957) MS Rating: Important
An
information disclosure vulnerability exists when Windows Hyper-V on a host
operating system fails to properly validate input from an authenticated user on
a guest operating system. To exploit the vulnerability, an attacker on a guest
operating system could run a specially crafted application that could cause the
Hyper-V host operating system to disclose memory information.
Hyper-V Information Disclosure (CVE-2018-0964) MS Rating: Important
An
information disclosure vulnerability exists when Windows Hyper-V on a host
operating system fails to properly validate input from an authenticated user on
a guest operating system. To exploit the vulnerability, an attacker on a guest
operating system could run a specially crafted application that could cause the
Hyper-V host operating system to disclose memory information.
Cumulative Security Update for Microsoft Windows
Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2018-1004) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the VBScript engine
handles objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current
user.
Active Directory Security Feature Bypass Vulnerability (CVE-2018-0890) MS Rating: Important
A
security feature bypass vulnerability exists when Active Directory incorrectly
applies Network Isolation settings. To exploit this vulnerability, an attacker
could run a specially crafted application.
HTTP.sys Denial of Service Vulnerability (CVE-2018-0956) MS Rating: Important
A
denial of service vulnerability exists in the HTTP 2.0 protocol stack (HTTP.sys)
when HTTP.sys improperly parses specially crafted HTTP 2.0 requests. An attacker
who successfully exploited the vulnerability could create a denial of service
condition, causing the target system to become unresponsive.
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability (CVE-2018-0976) MS Rating: Important
A
denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an
attacker connects to the target system using RDP and sends specially crafted
requests. An attacker who successfully exploited this vulnerability could cause
the RDP service on the target system to stop responding.
Windows SNMP Service Denial of Service Vulnerability (CVE-2018-0967) MS Rating: Important
A
denial of service vulnerability exists in the way that Windows SNMP Service
handles malformed SNMP traps. An attacker who successfully exploited the
vulnerability could cause a target system to stop responding.
Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability (CVE-2018-1009) MS Rating: Important
An
elevation of privilege vulnerability exists when Windows improperly handles
objects in memory and incorrectly maps kernel memory. In a local attack scenario,
an attacker could exploit this vulnerability by running a specially crafted
application to take control over the affected system.
Microsoft JET Database Engine Remote Code Execution Vulnerability (CVE-2018-1003) MS Rating: Important
A
buffer overflow vulnerability exists in the Microsoft JET Database Engine that
could allow remote code execution on an affected system. An attacker who
successfully exploited this vulnerability could take control of an affected
system.
OpenType Font Driver Elevation of Privilege Vulnerability (CVE-2018-1008) MS Rating: Important
An
elevation of privilege vulnerability exists in Windows Adobe Type Manager Font
Driver (ATMFD. dll) when it fails to properly handle objects in memory.
Device Guard Security Feature Bypass Vulnerability (CVE-2018-0966) MS Rating: Important
A
security feature bypass exists when Device Guard incorrectly validates an
untrusted file. An attacker who successfully exploited this vulnerability could
make an unsigned file appear to be signed.
Microsoft Wireless Keyboard 850 Security Feature Bypass Vulnerability (CVE-2018-8117) MS Rating: Important
A
security feature bypass vulnerability exists in the Microsoft Wireless Keyboard
850 which could allow an attacker to reuse an AES encryption key to send
keystrokes to other keyboard devices or to read keystrokes sent by other
keyboards for the affected devices. An attacker would first have to extract the
AES encryption key from the affected keyboard device.
Microsoft Graphics Component Denial of Service Vulnerability (CVE-2018-8116) MS Rating: Moderate
A denial of service vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.
Microsoft Patch Tuesday – March 2018
This month the vendor has patched 74 vulnerabilities, 15 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the March 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
ASP.NET Core
Microsoft Exchange Server
.NET Core
PowerShell Core
Microsoft Hyper-V
Microsoft Windows
ChakraCore
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0872) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0874) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0876) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0930) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0931) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Internet Explorer Information Disclosure Vulnerability (CVE-2018-0932) MS Rating: Critical
An
information disclosure vulnerability exists when affected Microsoft browsers
improperly handle objects in memory. An attacker can exploit this issue to
obtain sensitive information to further compromise the user's system.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0933) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0934) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0889) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0893) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0925) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0936) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0937) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0939) MS Rating: Critical
An
information disclosure vulnerability exists when the scripting engine does not
properly handle objects in memory in Microsoft Edge. An attacker can exploit
this issue to obtain sensitive information to further compromise the user's
system.
Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2018-0873) MS Rating: Important
A
remote code execution vulnerability exists in the way that the Chakra scripting
engine handles objects in memory in Microsoft Edge. This vulnerability may
corrupt memory in such a way that an attacker could execute arbitrary code in
the context of the current user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0879) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker can exploit this issue to obtain
sensitive information to further compromise the user's system.
Microsoft Browser Information Disclosure Vulnerability (CVE-2018-0891) MS Rating: Important
An
information disclosure vulnerability exists when affected Microsoft browsers
improperly handle objects in memory. An attacker can exploit this issue to
obtain sensitive information to further compromise the user's system.
Microsoft Browser Information Disclosure Vulnerability (CVE-2018-0927) MS Rating: Important
An
information disclosure vulnerability exists when affected Microsoft browsers
improperly handle objects in memory. An attacker can exploit this issue to
obtain sensitive information to further compromise the user's system.
Internet Explorer Information Disclosure Vulnerability (CVE-2018-0929) MS Rating: Important
An
information disclosure vulnerability exists when Internet Explorer improperly
handles objects in memory. An attacker can exploit this issue to obtain
sensitive information to further compromise the user's system.
Internet Explorer Memory Corruption Vulnerability (CVE-2018-0935) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Internet Explorer Elevation of Privilege Vulnerability (CVE-2018-0942) MS Rating: Important
A
privilege escalation vulnerability exists when Internet Explorer fails a check,
allowing sandbox escape. An attacker who successfully exploited the
vulnerability could use the sandbox escape to elevate privileges on an affected
system.
Cumulative Security Update for Microsoft Office
Microsoft Sharepoint Elevation of Privilege Vulnerability (CVE-2018-0947) MS Rating: Critical
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly verify tenant permissions. An authenticated attacker could exploit
the vulnerability by sending a specially crafted request to an affected
SharePoint server. affected SharePoint server.
Microsoft Access Remote Code Execution Vulnerability (CVE-2018-0903) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Access software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Office Excel Security Bypass (CVE-2018-0907) MS Rating: Important
A
security bypass vulnerability exists in Microsoft Office software by not
enforcing macro settings on an Excel document. The Security Bypass by itself
does not allow arbitrary code execution.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0909) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0910) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0911) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0912) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0913) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0914) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0915) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0916) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0917) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft Office Information Disclosure Vulnerability (CVE-2018-0919) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Office software reads
out of bound memory due to an uninitialized variable, which could disclose the
contents of memory. An attacker who successfully exploited the vulnerability
could view out of bound memory.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0921) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server. affected SharePoint
server.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0922) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
Office software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0923) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server. affected SharePoint
server.
Microsoft Exchange Information Disclosure Vulnerability (CVE-2018-0941) MS Rating: Important
An
information disclosure vulnerability exists in the way that Microsoft Exchange
Server handles importing data. If an impacted user is using Microsoft Exchange
Outlook Web Access (OWA).
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0944) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server. affected SharePoint
server.
Microsoft Exchange Elevation of Privilege Vulnerability (CVE-2018-0940) MS Rating: Moderate
A
privilege escalation vulnerability exists when Microsoft Exchange Outlook Web
Access (OWA) fails to properly sanitize links presented to users.
Microsoft Exchange Information Disclosure Vulnerability (CVE-2018-0924) MS Rating: Low
An
information disclosure vulnerability exists in the way that Microsoft Exchange
Server handles URL redirects. If an impacted user is using Microsoft Exchange
Outlook Web Access (OWA) Light.
Cumulative Security Update for Microsoft ASP.NET Core
ASP.NET Core Elevation Of Privilege Vulnerability (CVE-2018-0787) MS Rating: Important
A
privilege escalation vulnerability exists when a Kestrel web application fails
to validate web requests. An attacker who successfully exploited this
vulnerability could perform HTML injection attacks.
ASP.NET Core Denial Of Service Vulnerability (CVE-2018-0808) MS Rating: Important
A
denial of service vulnerability exists when ASP. NET Core improperly handles web
requests. An attacker who successfully exploited this vulnerability could cause
a denial of service against an ASP.NET Core web application.
.NET Core Denial of Service Vulnerability (CVE-2018-0875) MS Rating: Important
A
denial of service vulnerability exists in the way that .NET Core handles
specially crafted requests, causing a hash collision.
Cumulative Security Update for Microsoft Hyper-V
Windows Hyper-V Denial of Service Vulnerability (CVE-2018-0885) MS Rating: Important
A
denial of service vulnerability exists when Microsoft Hyper-V Network Switch on
a host server fails to properly validate input from a privileged user on a guest
operating system. An attacker who successfully exploited the vulnerability could
cause the host server to crash.
Hyper-V Information Disclosure Vulnerability (CVE-2018-0888) MS Rating: Important
An
information disclosure vulnerability exists when Windows Hyper-V on a host
operating system fails to properly validate input from an authenticated user on
a guest operating system.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0811) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
initializes objects in memory. To exploit this vulnerability, an authenticated
attacker could run a specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0813) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
initializes objects in memory. To exploit this vulnerability, an authenticated
attacker could run a specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0814) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
initializes objects in memory. To exploit this vulnerability, an authenticated
attacker could run a specially crafted application.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0894) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0895) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0896) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0897) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0898) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0899) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0900) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0901) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0904) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0926) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
initializes objects in memory. To exploit this vulnerability, an authenticated
attacker could run a specially crafted application.
Win32k Elevation of Privilege Vulnerability (CVE-2018-0977) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Windows
kernel-mode driver fails to properly handle objects in memory. An attacker who
successfully exploited this vulnerability could run arbitrary code in kernel
mode.
Cumulative Security Update for Microsoft Windows
Windows GDI Elevation of Privilege Vulnerability (CVE-2018-0815) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Graphics
Device Interface (GDI) handles objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Windows GDI Elevation of Privilege Vulnerability (CVE-2018-0816) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Graphics
Device Interface (GDI) handles objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Windows GDI Elevation of Privilege Vulnerability (CVE-2018-0817) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Graphics
Device Interface (GDI) handles objects in memory. An attacker who successfully
exploited this vulnerability could run arbitrary code in kernel mode.
Windows Installer Elevation of Privilege Vulnerability (CVE-2018-0868) MS Rating: Important
A
privilege escalation vulnerability exists in the Windows Installer when the
Windows Installer fails to properly sanitize input leading to an insecure
library loading behavior. A locally authenticated attacker could run arbitrary
code with elevated system privileges.
Windows Desktop Bridge VFS Elevation of Privilege Vulnerability (CVE-2018-0877) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Desktop Bridge VFS
does not take into account user/kernel mode when managing file paths. An
attacker who successfully exploited this vulnerability could run arbitrary code
in kernel mode.
Windows Remote Assistance Information Disclosure Vulnerability (CVE-2018-0878) MS Rating: Important
An
information disclosure vulnerability exists when Windows Remote Assistance
incorrectly processes XML External Entities (XXE).
Windows Desktop Bridge Elevation of Privilege Vulnerability (CVE-2018-0880) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when Desktop Bridge does
not properly manage the virtual registry. An attacker who successfully exploited
this vulnerability could run arbitrary code in kernel mode.
Microsoft Video Control Elevation of Privilege Vulnerability (CVE-2018-0881) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when the Microsoft Video
Control mishandles objects in memory. An attacker who successfully exploited
this vulnerability could run arbitrary code in system mode.
Windows Desktop Bridge Elevation of Privilege Vulnerability (CVE-2018-0882) MS Rating: Important
A
privilege escalation vulnerability exists in Windows when Desktop Bridge does
not properly manage the virtual registry. An attacker who successfully exploited
this vulnerability could run arbitrary code in kernel mode.
Windows Shell Remote Code Execution Vulnerability (CVE-2018-0883) MS Rating: Important
A
remote code execution vulnerability exists when Windows Shell does not properly
validate file copy destinations. An attacker who successfully exploited the
vulnerability could run arbitrary code in the context of the current user.
Windows Security Bypass Vulnerability (CVE-2018-0884) MS Rating: Important
A
security bypass vulnerability exists in Windows Scripting Host which could allow
an attacker to bypass Device Guard. An attacker who successfully exploited this
vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the
machine.
CredSSP Remote Code Execution Vulnerability (CVE-2018-0886) MS Rating: Important
A
remote code execution vulnerability exists in the Credential Security Support
Provider protocol (CredSSP).
CNG Security Bypass Vulnerability (CVE-2018-0902) MS Rating: Important
A
security bypass vulnerability exists in the Cryptography Next Generation (CNG)
kernel-mode driver (cng. sys) when it fails to properly validate and enforce
impersonation levels.
Windows Storage Services Elevation of Privilege Vulnerability (CVE-2018-0983) MS Rating: Important
A privilege escalation vulnerability exists when Storage Services improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
Microsoft Patch Tuesday – February 2018
This month the vendor has patched 50 vulnerabilities, 14 of which are rated
Critical.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the February 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Office
Microsoft Windows
ChakraCore
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for Microsoft Browsers
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0763) MS Rating: Critical
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker can exploit this issue to obtain
sensitive information to further compromise the user’s system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0834) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0835) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0837) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0838) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0840) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0856) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0857) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0858) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the ChakraCore
scripting engine handles objects in memory. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0859) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0860) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0861) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0836) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. This vulnerability may corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0839) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker can exploit this issue to obtain
sensitive information to further compromise the user’s system.
Windows Scripting Engine Memory Corruption Vulnerability (CVE-2018-0847) MS Rating: Important
An
information disclosure vulnerability exists when VBScript improperly discloses
the contents of its memory. An attacker can exploit this issue to obtain
sensitive information to further compromise the user’s system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0866) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user.
Microsoft Edge Security Feature Bypass (CVE-2018-0771) MS Rating: Moderate
A
security bypass vulnerability exists when Microsoft Edge improperly handles
requests of different origins. The vulnerability allows Microsoft Edge to bypass
Same-Origin Policy (SOP) restrictions, and to allow requests that should
otherwise be ignored.
Cumulative Security Update for Microsoft Office
Microsoft Outlook Memory Corruption Vulnerability (CVE-2018-0852) MS Rating: Critical
A
remote code execution vulnerability exists in Microsoft Outlook when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2018-0850) MS Rating: Important
A
privilege escalation vulnerability exists when Outlook initiates processing of
incoming messages without sufficient validation of the formatting of the
messages. An attacker who successfully exploited the vulnerability could attempt
to force Outlook to load a local or remote message store (over SMB).
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0851) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
Office software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Microsoft Office Information Disclosure Vulnerability (CVE-2018-0853) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Office software reads
out of bound memory due to an uninitialized variable, which could disclose the
contents of memory. An attacker who successfully exploited the vulnerability
could view out of bound memory.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0864) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft SharePoint Elevation of Privilege Vulnerability (CVE-2018-0869) MS Rating: Important
A
privilege escalation vulnerability exists when Microsoft SharePoint Server does
not properly sanitize a specially crafted web request to an affected SharePoint
server. An authenticated attacker could exploit the vulnerability by sending a
specially crafted request to an affected SharePoint server.
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-0841) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Excel software when the
software fails to properly handle objects in memory. An attacker who
successfully exploited the vulnerability could run arbitrary code in the context
of the current user.
Cumulative Security Update for Microsoft Windows Kernel
Windows Kernel Elevation of Privilege Vulnerability (CVE-2018-0742) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Windows Kernel Elevation of Privilege Vulnerability (CVE-2018-0756) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0757) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user’s system.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0810) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel fails to
properly initialize a memory address. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user’s
system.
Windows Kernel Elevation Of Privilege Vulnerability (CVE-2018-0820) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0829) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user’s system.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0830) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could obtain information to further compromise the user’s system.
Windows Kernel Elevation of Privilege Vulnerability (CVE-2018-0831) MS Rating: Important
A
privilege escalation vulnerability exists in the way that the Windows Kernel
handles objects in memory. An attacker who successfully exploited the
vulnerability could execute code with elevated permissions.
Windows Kernel Information Disclosure Vulnerability (CVE-2018-0843) MS Rating: Important
An
information disclosure vulnerability exists when the Windows kernel fails to
properly initialize a memory address. An attacker who successfully exploited
this vulnerability could obtain information to further compromise the user’s
system.
Cumulative Security Update for Microsoft Windows
StructuredQuery Remote Code Execution Vulnerability (CVE-2018-0825) MS Rating: Critical
A
remote code execution vulnerability exists in StructuredQuery when the software
fails to properly handle objects in memory. An attacker who successfully
exploited the vulnerability could run arbitrary code in the context of the
current user.
Windows EOT Font Information Disclosure Vulnerability (CVE-2018-0755) MS Rating: Important
An
information disclosure vulnerability exists in the way that the Microsoft
Windows Embedded OpenType (EOT) font engine parses specially crafted embedded
fonts. An attacker who successfully exploited this vulnerability could
potentially read data that was not intended to be disclosed.
Windows EOT Font Information Disclosure Vulnerability (CVE-2018-0760) MS Rating: Important
An
information disclosure vulnerability exists in the way that the Microsoft
Windows Embedded OpenType (EOT) font engine parses specially crafted embedded
fonts. An attacker who successfully exploited this vulnerability could
potentially read data that was not intended to be disclosed.
Windows EOT Font Information Disclosure Vulnerability (CVE-2018-0761) MS Rating: Important
An
information disclosure vulnerability exists in the way that the Microsoft
Windows Embedded OpenType (EOT) font engine parses specially crafted embedded
fonts. An attacker who successfully exploited this vulnerability could
potentially read data that was not intended to be disclosed.
Windows EOT Font Information Disclosure Vulnerability (CVE-2018-0855) MS Rating: Important
An
information disclosure vulnerability exists in the way that the Microsoft
Windows Embedded OpenType (EOT) font engine parses specially crafted embedded
fonts. An attacker who successfully exploited this vulnerability could
potentially read data that was not intended to be disclosed.
Windows Elevation of Privilege Vulnerability (CVE-2018-0809) MS Rating: Important
A
privilege escalation vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker who successfully exploited this
vulnerability could run arbitrary code in kernel mode.
Windows AppContainer Elevation Of Privilege Vulnerability (CVE-2018-0821) MS Rating: Important
A
privilege escalation vulnerability exists when AppContainer improperly
implements constrained impersonation. An attacker who successfully exploited
this vulnerability could run processes in an elevated context.
Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability (CVE-2018-0822) MS Rating: Important
A
privilege escalation vulnerability exist when NTFS improperly handles objects.
An attacker who successfully exploited this vulnerability could run processes in
an elevated context.
Windows Storage Services Elevation of Privilege Vulnerability (CVE-2018-0826) MS Rating: Important
A
privilege escalation vulnerability exist when Storage Services improperly
handles objects in memory. An attacker who successfully exploited this
vulnerability could run processes in an elevated context.
Windows Security Feature Bypass Vulnerability (CVE-2018-0827) MS Rating: Important
A
security bypass vulnerability exists in Windows Scripting Host which could allow
an attacker to bypass Device Guard. An attacker who successfully exploited this
vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the
machine.
Windows Elevation of Privilege Vulnerability (CVE-2018-0828) MS Rating: Important
A
privilege escalation vulnerability exists in Microsoft Windows when the
MultiPoint management account password is improperly secured. An attacker who
successfully exploited this vulnerability could run arbitrary code with elevated
privileges.
Windows Information Disclosure Vulnerability (CVE-2018-0832) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited
the vulnerability could retrieve the memory address of a kernel object.
Windows Remote Code Execution Vulnerability (CVE-2018-0842) MS Rating: Important
A
remote code execution vulnerability exist when Windows improperly handles
objects in memory. An attacker who successfully exploited these vulnerabilities
could take control of an affected system.
Windows Common Log File System Driver Elevation Of Privilege Vulnerability (CVE-2018-0844) MS Rating: Important
A
privilege escalation vulnerability exist when the Windows Common Log File System
(CLFS) driver improperly handles objects in memory. An attacker who successfully
exploited this vulnerability could run processes in an elevated context.
Windows Common Log File System Driver Elevation Of Privilege Vulnerability (CVE-2018-0846) MS Rating: Important
A
privilege escalation vulnerability exist when the Windows Common Log File System
(CLFS) driver improperly handles objects in memory. An attacker who successfully
exploited this vulnerability could run processes in an elevated context.
Named Pipe File System Elevation of Privilege Vulnerability (CVE-2018-0823) MS Rating: Important
A
privilege escalation vulnerability exist when Named Pipe File System improperly
handles objects. An attacker who successfully exploited this vulnerability could
run processes in an elevated context.
SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability (CVE-2018-0833) MS Rating: Moderate
A denial of service vulnerability exists in implementations of the Microsoft Server Message Block. The vulnerability is due to improper handling of certain requests sent by a malicious SMB server to the client.
Microsoft Patch Tuesday – January 2018
This month the vendor has patched 59 vulnerabilities, 17 of which are rated
Critical.
Hello, welcome to this month's blog on the Microsoft patch release. This month
the vendor has patched 59 vulnerabilities, 17 of which are rated Critical.
Please note 33 CVEs were released out-of-band on January 3, 2018.
As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining
functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless
specific access is required.
Microsoft's summary of the January 2018 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance
This month's update covers vulnerabilities in:
Internet Explorer
Microsoft Edge
Microsoft Windows
Microsoft Office
SQL Server
ChakraCore
.NET Framework
.NET Core
ASP.NET Core
The following is a breakdown of the issues being addressed this month:
Cumulative Security Update for CPU Microcode
Vulnerability in CPU Microcode Could Allow Information Disclosure (CVE-2017-5715) MS Rating: Important
A
security vulnerability referred to as 'speculative execution side-channel
attacks' affect many modern processors and operating systems including Intel,
AMD, and ARM.
Vulnerability in CPU Microcode Could Allow Information Disclosure (CVE-2017-5753) MS Rating: Important
A
security vulnerability referred to as 'speculative execution side-channel
attacks' affect many modern processors and operating systems including Intel,
AMD, and ARM.
Vulnerability in CPU Microcode Could Allow Information Disclosure (CVE-2017-5754) MS Rating: Important
A
security vulnerability referred to as 'speculative execution side-channel
attacks' affect many modern processors and operating systems including Intel,
AMD, and ARM.
Cumulative Security Update for Microsoft Browsers
Scripting Engine Security Feature Bypass (CVE-2018-0818) MS Rating: Important
A
security feature bypass vulnerability exists in the Microsoft Chakra scripting
engine that allows Control Flow Guard (CFG) to be bypassed.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-0767) MS Rating: Critical
An
information disclosure vulnerability exists when the scripting engine does not
properly handle objects in memory in Microsoft Edge. An attacker can exploit
this issue to obtain information to further compromise the user's system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0768) MS Rating: Important
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0769) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0770) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0772) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. An attacker can exploit this
issue to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0773) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0774) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0775) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0776) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0777) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0778) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-0780) MS Rating: Critical
An
information disclosure vulnerability exists when the scripting engine does not
properly handle objects in memory in Microsoft Edge. An attacker can exploit
this issue to obtain information to further compromise the user's system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0781) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Information Disclosure Vulnerability (CVE-2018-0800) MS Rating: Critical
An
information disclosure vulnerability exists when the scripting engine does not
properly handle objects in memory in Microsoft Edge. An attacker can exploit
this issue to obtain information to further compromise the user's system.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0758) MS Rating: Critical
A
remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Microsoft Edge. An attacker can exploit this issue
to execute arbitrary code in the context of the current user.
Scripting Engine Memory Corruption Vulnerability (CVE-2018-0762) MS Rating: Critical
A
remote code execution vulnerability exists in the way the scripting engine
handles objects in memory in Microsoft browsers. An attacker can exploit this
issue to execute arbitrary code in the context of the current user.
Microsoft Edge Information Disclosure Vulnerability (CVE-2018-0766) MS Rating: Important
An
information disclosure vulnerability exists when Microsoft Edge improperly
handles objects in memory. An attacker can exploit this issue to obtain
information to further compromise the user's system.
Microsoft Edge Elevation of Privilege Vulnerability (CVE-2018-0803) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft Edge does not
properly enforce cross-domain policies. An attacker can exploit this issue to
gain access to the information from one domain and inject it into another
domain.
Cumulative Security Update for Microsoft Office
Microsoft SharePoint Cross Site Scripting Elevation of Privilege Vulnerability (CVE-2018-0789) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An attacker can exploit this issue by sending a specially
crafted request to an affected SharePoint server.
Microsoft SharePoint Cross Site Scripting Elevation of Privilege Vulnerability (CVE-2018-0790) MS Rating: Important
An
elevation of privilege vulnerability exists when Microsoft SharePoint Server
does not properly sanitize a specially crafted web request to an affected
SharePoint server. An attacker can exploit this issue by sending a specially
crafted request to an affected SharePoint server.
Microsoft Outlook Remote Code Execution Vulnerability (CVE-2018-0791) MS Rating: Important
A
remote code execution vulnerability exists in the way that Microsoft Outlook
parses specially crafted email messages. An attacker can exploit this issue to
take control of an affected system.
Microsoft Word Remote Code Execution (CVE-2018-0792) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Outlook Remote Code Execution (CVE-2018-0793) MS Rating: Important
A
remote code execution vulnerability exists in the way that Microsoft Outlook
parses specially crafted email messages. An attacker can exploit this issue to
take control of an affected system.
Microsoft Word Remote Code Execution (CVE-2018-0794) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Remote Code Execution (CVE-2018-0795) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Excel Remote Code Execution (CVE-2018-0796) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Word Memory Corruption Vulnerability (CVE-2018-0797) MS Rating: Critical
An
Office RTF remote code execution vulnerability exists in Microsoft Office
software when the Office software fails to properly handle RTF files. An
attacker can exploit this issue to run arbitrary code in the context of the
current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0798) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Remote Code Execution Vulnerability (CVE-2018-0801) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0802) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0804) MS Rating: Low
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0805) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0806) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0807) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0812) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Office Memory Corruption Vulnerability (CVE-2018-0819) MS Rating: Important
A
remote code execution vulnerability exists in Microsoft Office software when the
software fails to properly handle objects in memory. An attacker can exploit
this issue to run arbitrary code in the context of the current user.
Microsoft Access Tampering Vulnerability (CVE-2018-0799) MS Rating: Important
A
cross-site-scripting (XSS) vulnerability exists when Microsoft Access does not
properly sanitize inputs to image fields edited within Design view. An attacker
can exploit this issue by sending a specially crafted file to a victim, or by
hosting the file on a web server.
Cumulative Security Update for ASP.NET
ASP.NET Core Elevation Of Privilege Vulnerability (CVE-2018-0784) MS Rating: Important
An
elevation of privilege vulnerability exists when the ASP.NET Core fails to
properly sanitize web requests. An attacker can exploit this issue to perform
content injection attacks and run script in the security context of the
logged-on user.
ASP.NET Core Cross Site Request Forgery Vulnerabilty (CVE-2018-0785) MS Rating: Moderate
A
Cross Site Request Forgery (CSRF) vulnerability exists when a ASP.NET Core web
application is created using vulnerable project templates. An attacker can
exploit this issue to change the recovery codes associated with the victim's
user account without his/her consent.
Cumulative Security Update for .NET Framework
.NET Security Feature Bypass Vulnerability (CVE-2018-0786) MS Rating: Important
A
security feature bypass vulnerability exists when Microsoft .NET Framework (and
.NET Core) components do not completely validate certificates. An attacker can
exploit this issue by presenting a certificate that is marked invalid for a
specific use, but the component uses it for that purpose.
.NET and .NET Core Denial Of Service Vulnerability (CVE-2018-0764) MS Rating: Important
A
Denial of Service vulnerability exists when .NET, and .NET core, improperly
process XML documents. An attacker can exploit this issue to cause a denial of
service against a .NET application.
Cumulative Security Update for Microsoft Windows
Microsoft Color Management Information Disclosure Vulnerability (CVE-2018-0741) MS Rating: Important
An
information disclosure vulnerabilities exists in the way that the Color
Management Module (ICM32.dll) handles objects in memory. An attacker can exploit
this issue to retrieve information to bypass usermode ASLR (Address Space Layout
Randomization) on a targeted system.
Windows Subsystem for Linux Elevation of Privilege Vulnerability (CVE-2018-0743) MS Rating: Important
An
elevation of privilege vulnerability exists due to an integer overflow in
Windows Subsystem for Linux. An attacker can exploit this issue to execute code
with elevated permissions.
Windows Elevation of Privilege Vulnerability (CVE-2018-0744) MS Rating: Important
An
elevation of privilege vulnerability exists when the Windows kernel fails to
properly handle objects in memory. An attacker can exploit this issue to run
arbitrary code in kernel mode.
Windows Information Disclosure Vulnerability (CVE-2018-0745) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker can exploit this issue to
retrieve the memory address of a kernel object.
Windows Information Disclosure Vulnerability (CVE-2018-0746) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker can exploit this issue to
retrieve the memory address of a kernel object.
Windows Information Disclosure Vulnerability (CVE-2018-0747) MS Rating: Important
An
information disclosure vulnerability exists in the Windows kernel that could
allow an attacker to retrieve information that could lead to a Kernel Address
Space Layout Randomization (ASLR) bypass. An attacker can exploit this issue to
retrieve the memory address of a kernel object.
Windows Elevation of Privilege Vulnerability (CVE-2018-0748) MS Rating: Important
An
elevation of privilege vulnerability exists in the way that the Windows Kernel
API enforces permissions. An attacker can exploit this issue to impersonate
processes, interject cross-process communication, or interrupt system
functionality.
SMB Server Elevation of Privilege Vulnerability (CVE-2018-0749) MS Rating: Important
An
elevation of privilege vulnerability exists in the Microsoft Server Message
Block (SMB) Server when an attacker with valid credentials attempts to open a
specially crafted file over the SMB protocol on the same machine. An attacker
can exploit this issue to bypass certain security checks in the operating system.
Windows GDI Information Disclosure Vulnerability (CVE-2018-0750) MS Rating: Important
A
Win32k information disclosure vulnerability exists when the Windows GDI
component improperly discloses kernel memory addresses. An attacker can exploit
this issue to obtain information to further compromise the user's system.
Windows Elevation of Privilege Vulnerability (CVE-2018-0751) MS Rating: Important
An
elevation of privilege vulnerability exists in the way that the Windows Kernel
API enforces permissions. An attacker can exploit this issue to impersonate
processes, interject cross-process communication, or interrupt system
functionality.
Windows Elevation of Privilege Vulnerability (CVE-2018-0752) MS Rating: Important
An
elevation of privilege vulnerability exists in the way that the Windows Kernel
API enforces permissions. An attacker can exploit this issue to impersonate
processes, interject cross-process communication, or interrupt system
functionality.
Windows IPSec Denial of Service Vulnerability (CVE-2018-0753) MS Rating: Important
A
denial of service vulnerability exists in the way that Windows handles objects
in memory. An attacker can exploit this issue cause a target system to stop
responding.
ATMFD.dll Information Disclosure Vulnerability (CVE-2018-0754) MS Rating: Important
An
information disclosure vulnerability exists in Adobe Type Manager Font Driver (ATMFD.dll)
when it fails to properly handle objects in memory. An attacker can exploit this
issue to potentially read data that was not intended to be disclosed.
ATMFD.dll Information Disclosure Vulnerability (CVE-2018-0788) MS Rating: Important
An information disclosure vulnerability exists in Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker can exploit this issue to potentially read data that was not intended to be disclosed.