Zero-Day 2019- Úvod  Graf  Katalog Zranitelností  OWASP  Webové útoky (103)  Vulnerebility  Web Vul.  Top 50 in years  CVE Defination  ATT&CK Matrix for Enterprise


2020  2019  2018  2017  2016  2015  2014  2013  2012  2011  2010  2009


Microsoft Patch Tuesday – December 2019
This month the vendor has patched 36 vulnerabilities, 7 of which are rated Critical.

As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the December 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Office
Microsoft Windows
Microsoft Hyper-V
Graphics Device Interface (GDI)
Microsoft Windows Kernel
SQL Server
Visual Studio
Microsoft Authentication Library for Android
Microsoft Defender
Skype for Business Server

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Internet Explorer

VBScript Remote Code Execution Vulnerability (CVE-2019-1485) MS Rating: Important

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

Cumulative Security Update for Microsoft Office

Microsoft Word Denial of Service Vulnerability (CVE-2019-1461) MS Rating: Important

A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.

Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2019-1462) MS Rating: Important

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft Access Information Disclosure Vulnerability (CVE-2019-1463) MS Rating: Important

An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Microsoft Excel Information Disclosure Vulnerability (CVE-2019-1464) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data.

Microsoft Access Information Disclosure Vulnerability (CVE-2019-1400) MS Rating: Important

An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Cumulative Security Update for Microsoft Windows Kernel

Win32k Privilege Escalation Vulnerability (CVE-2019-1458) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Information Disclosure Vulnerability (CVE-2019-1469) MS Rating: Important

An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1472) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1474) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Cumulative Security Update for Microsoft Hyper-V

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-1471) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Information Disclosure Vulnerability (CVE-2019-1470) MS Rating: Important

An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information.

Security Update for Microsoft Graphics

Win32k Graphics Remote Code Execution Vulnerability (CVE-2019-1468) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1465) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1466) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1467) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Security Update for Microsoft Windows

Windows Privilege Escalation Vulnerability (CVE-2019-1476) MS Rating: Important

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Printer Service Privilege Escalation Vulnerability (CVE-2019-1477) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers. An authenticated attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.

Windows COM Server Privilege Escalation Vulnerability (CVE-2019-1478) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

Windows Media Player Information Disclosure Vulnerability (CVE-2019-1480) MS Rating: Important

An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.

Windows Media Player Information Disclosure Vulnerability (CVE-2019-1481) MS Rating: Important

An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.

Windows Privilege Escalation Vulnerability (CVE-2019-1483) MS Rating: Important

A privilege escalation vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system.

Windows OLE Remote Code Execution Vulnerability (CVE-2019-1484) MS Rating: Important

A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code.

Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability (CVE-2019-1453) MS Rating: Important

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding.

Remote Desktop Protocol Information Disclosure Vulnerability (CVE-2019-1489) MS Rating: Important

An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.
Security Update for Microsoft SQL Server

Microsoft SQL Server Reporting Services XSS Vulnerability (CVE-2019-1332) MS Rating: Important

A cross-site scripting (XSS) vulnerability exists when Microsoft SQL Server Reporting Services (SSRS) does not properly sanitize a specially-crafted web request to an affected SSRS server. An attacker who successfully exploited the vulnerability could run scripts in the contect of the targeted user.

Security Update for Microsoft Visual Studio

Git for Visual Studio Remote Code Execution Vulnerability (CVE-2019-1349) MS Rating: Critical

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system.

Git for Visual Studio Remote Code Execution Vulnerability (CVE-2019-1350) MS Rating: Critical

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system.

Git for Visual Studio Remote Code Execution Vulnerability (CVE-2019-1352) MS Rating: Critical

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system.

Git for Visual Studio Remote Code Execution Vulnerability (CVE-2019-1354) MS Rating: Critical

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system.

Git for Visual Studio Remote Code Execution Vulnerability (CVE-2019-1387) MS Rating: Critical

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system.

Visual Studio Live Share Spoofing Vulnerability (CVE-2019-1486) MS Rating: Important

A spoofing vulnerability exists in Visual Studio Live Share when a guest connected to a Live Share session is redirected to an arbitrary URL specified by the session host. An attacker who successfully exploited this vulnerability could cause a connected guest's computer to open a browser and navigate to a URL without consent from the guest.

Git for Visual Studio Tampering Vulnerability (CVE-2019-1351) MS Rating: Moderate

A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system.

Security Update for Microsoft Authentication Library for Android

Microsoft Authentication Library for Android Information Disclosure Vulnerability (CVE-2019-1487) MS Rating: Important

An information disclosure vulnerability in Android Apps using Microsoft Authentication Library (MSAL) 0.3.1-Alpha or later exists under specific conditions. This vulnerability could result in sensitive data being exposed.

Security Update for Microsoft Defender

Microsoft Defender Security Bypass Vulnerability (CVE-2019-1488) MS Rating: Important

A security bypass vulnerability exists when Microsoft Defender improperly handles specific buffers. An attacker could exploit the vulnerability to trigger warnings and false positives when no threat is present.
Security Update for Skype for Business Server

Skype for Business and Lync Spoofing Vulnerability (CVE-2019-1490) MS Rating: Important

A spoofing vulnerability exists when a Lync Server or Skype for Business Server does not properly sanitize a specially crafted request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected server.

 

 

Microsoft Patch Tuesday – November 2019
This month the vendor has patched 75 vulnerabilities, 14 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the November 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Windows
Microsoft Hyper-V
Graphics Device Interface
Jet Database Engine
Azure
Open Enclave SDK
Visual Studio
OpenType Font Driver
Microsoft Exchange
The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1426) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1427) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1428) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1429) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

VBScript Remote Code Execution Vulnerability (CVE-2019-1390) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Security Bypass Vulnerability (CVE-2019-1413) MS Rating: Important

A security bypass vulnerability exists when Microsoft Edge improperly handles extension requests and fails to request host permission for all_urls. An attacker who successfully exploited this vulnerability could trick a browser into installing an extension without the user's consent.

Cumulative Security Update for Microsoft Office

Microsoft Office Security Bypass Vulnerability (CVE-2019-1442) MS Rating: Important

A security bypass vulnerability exists when Microsoft Office does not validate URLs. An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials.

Microsoft SharePoint Information Disclosure Vulnerability (CVE-2019-1443) MS Rating: Important

An information disclosure vulnerability exists in Microsoft SharePoint when an attacker uploads a specially crafted file to the SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could potentially leverage SharePoint functionality to obtain SMB hashes.

Microsoft Office Online Spoofing Vulnerability (CVE-2019-1445) MS Rating: Important

A spoofing vulnerability exists when Office Online does not validate origin in cross-origin communications handlers correctly. An attacker could exploit the vulnerability by sending a specially crafted request to an affected site.

Microsoft Excel Information Disclosure Vulnerability (CVE-2019-1446) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data.

Microsoft Office Online Spoofing Vulnerability (CVE-2019-1447) MS Rating: Important

A spoofing vulnerability exists when Office Online does not validate origin in cross-origin communications handlers correctly. An attacker could exploit the vulnerability by sending a specially crafted request to an affected site.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-1448) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft Office ClickToRun Security Bypass Vulnerability (CVE-2019-1449) MS Rating: Important

A security bypass vulnerability exists in the way that Office Click-to-Run (C2R) components handle a specially crafted file, which could lead to a standard user, any AppContainer sandbox, and Office LPAC Protected View to escalate privileges to SYSTEM. To exploit this bug, an attacker would have to run a specially crafted file.

Microsoft Access Information Disclosure Vulnerability (CVE-2019-1402) MS Rating: Important

An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Microsoft Office Excel Security Bypass Vulnerability (CVE-2019-1457) MS Rating: Important

A security bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. This issue by itself does not allow arbitrary code execution.

Cumulative Security Update for Microsoft Windows Kernel

Win32k Graphics Remote Code Execution Vulnerability (CVE-2019-1441) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected system.

Win32k Privilege Escalation Vulnerability (CVE-2019-1393) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1394) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1395) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1396) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1408) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1434) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Information Disclosure Vulnerability (CVE-2019-1436) MS Rating: Important

An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Win32k Information Disclosure Vulnerability (CVE-2019-1440) MS Rating: Important

An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-11135) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Kernel Privilege Escalation Vulnerability (CVE-2019-1392) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Hyper-V

Hyper-V Remote Code Execution Vulnerability (CVE-2019-0719) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system.

Hyper-V Remote Code Execution Vulnerability (CVE-2019-0721) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-1389) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-1397) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-1398) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0712) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-1309) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-1310) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-1399) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Security Update for Microsoft Graphics

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2019-1407) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2019-1433) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2019-1435) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2019-1437) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2019-1438) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1439) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Security Update for Microsoft Windows

Microsoft Windows Media Foundation Remote Code Execution Vulnerability (CVE-2019-1430) MS Rating: Critical

A remote code execution vulnerability exists when Windows Media Foundation improperly parses specially crafted QuickTime media files. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user.

Windows TCP/IP Information Disclosure Vulnerability (CVE-2019-1324) MS Rating: Important

An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles IPv6 flowlabel filled in packets. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Error Reporting Information Disclosure Vulnerability (CVE-2019-1374) MS Rating: Important

An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-1379) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Microsoft splwow64 Privilege Escalation Vulnerability (CVE-2019-1380) MS Rating: Important

A local Privilege Escalation Vulnerability exists in how 'splwow64.exe' handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.

Microsoft Windows Information Disclosure Vulnerability (CVE-2019-1381) MS Rating: Important

An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations. An attacker who successfully exploited the vulnerability could potentially access unauthorized files.

Microsoft ActiveX Installer Service Privilege Escalation Vulnerability (CVE-2019-1382) MS Rating: Important

A privilege escalation vulnerability exists when ActiveX Installer service may allow access to files without proper authentication. An attacker who successfully exploited the vulnerability could potentially access unauthorized files.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-1383) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Microsoft Windows Security Bypass Vulnerability (CVE-2019-1384) MS Rating: Important

A security bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request.

Windows Privilege Escalation Vulnerability (CVE-2019-1385) MS Rating: Important

A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.

Windows Certificate Dialog Privilege Escalation Vulnerability (CVE-2019-1388) MS Rating: Important

A privilege escalation vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Denial of Service Vulnerability (CVE-2019-1391) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Windows UPnP Service Privilege Escalation Vulnerability (CVE-2019-1405) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.

Windows Remote Procedure Call Information Disclosure Vulnerability (CVE-2019-1409) MS Rating: Important

An information disclosure vulnerability exists when the Windows Remote Procedure Call (RPC) runtime improperly initializes objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1411) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows Installer Privilege Escalation Vulnerability (CVE-2019-1415) MS Rating: Important

A privilege escalation vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations. To exploit the vulnerability, an attacker would require unprivileged execution on the victim system.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-1416) MS Rating: Important

A privilege escalation vulnerability exists due to a race condition in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-1417) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Modules Installer Service Information Disclosure Vulnerability (CVE-2019-1418) MS Rating: Important

An information vulnerability exists when Windows Modules Installer Service improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read the contents of a log file on disk.

Windows Privilege Escalation Vulnerability (CVE-2019-1420) MS Rating: Important

A privilege escalation vulnerability exists in the way that the 'dssvc.dll' handles file creation allowing for a file overwrite or creation in a secured location. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Privilege Escalation Vulnerability (CVE-2019-1422) MS Rating: Important

A privilege escalation vulnerability exists in the way that the 'iphlpsvc.dll' handles file creation allowing for a file overwrite. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Privilege Escalation Vulnerability (CVE-2019-1423) MS Rating: Important

A privilege escalation vulnerability exists in the way that the 'StartTileData.dll' handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

NetLogon Security Bypass Vulnerability (CVE-2019-1424) MS Rating: Important

A security bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel. An attacker who successfully exploited the vulnerability could downgrade aspects of the connection allowing for further modification of the transmission.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1432) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows User Profile Service Privilege Escalation Vulnerability (CVE-2019-1454) MS Rating: Important

A privilege escalation vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context.

Windows Denial of Service Vulnerability (CVE-2018-12207) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1406) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Security Update for Microsoft Exchange

Microsoft Exchange Remote Code Execution Vulnerability (CVE-2019-1373) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the logged in user.

Security Update for Azure

Azure Stack Spoofing Vulnerability (CVE-2019-1234) MS Rating: Important

A spoofing vulnerability exists when Azure Stack fails to validate certain requests. An attacker who successfully exploited the vulnerability could make requests to internal Azure Stack resources.

Security Update for Open Enclave SDK

Open Enclave SDK Information Disclosure Vulnerability (CVE-2019-1370) MS Rating: Important

An information disclosure vulnerability exists when affected Open Enclave SDK versions improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information stored in the Enclave.

Security Update for Visual Studio

Visual Studio Privilege Escalation Vulnerability (CVE-2019-1425) MS Rating: Important

A privilege escalation vulnerability exists when Visual Studio fails to properly validate hardlinks while extracting archived files. An attacker who successfully exploited this vulnerability could overwrite arbitrary files in the security context of the local system.

Security Update for OpenType Font Driver

OpenType Font Parsing Remote Code Execution Vulnerability (CVE-2019-1419) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely.

OpenType Font Driver Information Disclosure Vulnerability (CVE-2019-1412) MS Rating: Important

An information disclosure vulnerability exists in Windows 'Adobe Type Manager Font Driver (ATMFD.dll)' when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.

OpenType Font Parsing Remote Code Execution Vulnerability (CVE-2019-1456) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely.

 

 

Microsoft Patch Tuesday – October 2019
This month the vendor has patched 59 vulnerabilities, 9 of which are rated Critical.
This month the vendor has patched 59 vulnerabilities, 9 of which are rated Critical.

As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the October 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Windows
Microsoft Hyper-V
Graphics Device Interface
Jet Database Engine
Azure App Service
Open Enclave SDK
Microsoft Dynamics 365
SQL Server Management Studio
The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

VBScript Remote Code Execution Vulnerability (CVE-2019-1238) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

VBScript Remote Code Execution Vulnerability (CVE-2019-1239) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1307) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1308) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1335) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1366) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Spoofing Vulnerability (CVE-2019-0608) MS Rating: Important

A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries.

Microsoft Edge based on Edge HTML Information Disclosure Vulnerability (CVE-2019-1356) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Microsoft Browser Spoofing Vulnerability (CVE-2019-1357) MS Rating: Important

A spoofing vulnerability exists when Microsoft Browsers improperly handle browser cookies. An attacker who successfully exploited this vulnerability could trick a browser into overwriting a secure cookie with an insecure cookie.

Internet Explorer Memory Corruption Vulnerability (CVE-2019-1371) MS Rating: Important

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Cumulative Security Update for Microsoft Office

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1070) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker can exploit this issue by sending a specially crafted request to an affected SharePoint server.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-1327) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-1328) MS Rating: Important

A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker can exploit this issue by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-1329) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker can exploit this issue by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-1330) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft SharePoint. An attacker who successfully exploited this vulnerability could attempt to impersonate another user of the SharePoint server.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-1331) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Cumulative Security Update for Microsoft Windows Kernel

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1334) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1345) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Win32k Privilege Escalation Vulnerability (CVE-2019-1362) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1364) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Hyper-V

Hyper-V Information Disclosure Vulnerability (CVE-2019-1230) MS Rating: Important

An information disclosure vulnerability exists when the Windows Hyper-V Network Switch on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information.

Security Update for Microsoft Graphics

Microsoft Graphics Components Information Disclosure Vulnerability (CVE-2019-1361) MS Rating: Important

An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1363) MS Rating: Important

An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.

Security Update for Microsoft Windows

Remote Desktop Client Remote Code Execution Vulnerability (CVE-2019-1333) MS Rating: Critical

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client.

MS XML Remote Code Execution Vulnerability (CVE-2019-1060) MS Rating: Critical

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user's system.

Windows NTLM Tampering Vulnerability (CVE-2019-1166) MS Rating: Important

A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features.

Windows Imaging API Remote Code Execution Vulnerability (CVE-2019-1311) MS Rating: Important

A remote code execution vulnerability exists when the Windows Imaging API improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user.

Windows 10 Mobile Security Bypass Vulnerability (CVE-2019-1314) MS Rating: Important

A security bypass vulnerability exists in Windows 10 Mobile when Cortana allows a user to access files and folders through the locked screen. An attacker who successfully exploited this vulnerability could access the photo library of an affected phone and modify or delete photos without authenticating to the system.

Windows Error Reporting Manager Privilege Escalation Vulnerability (CVE-2019-1315) MS Rating: Important

A privilege escalation vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.

Microsoft Windows Setup Privilege Escalation Vulnerability (CVE-2019-1316) MS Rating: Important

A privilege escalation vulnerability exists in the Microsoft Windows Setup when it does not properly handle privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Microsoft Windows Denial of Service Vulnerability (CVE-2019-1317) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Microsoft Windows Spoofing Vulnerability (CVE-2019-1318) MS Rating: Important

A spoofing vulnerability exists when Transport Layer Security (TLS) accesses non- Extended Master Secret (EMS) sessions. An attacker who successfully exploited this vulnerability may gain access to unauthorized information.

Windows Error Reporting Privilege Escalation Vulnerability (CVE-2019-1319) MS Rating: Important

A privilege escalation vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1320) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Microsoft Windows CloudStore Privilege Escalation Vulnerability (CVE-2019-1321) MS Rating: Important

A privilege escalation vulnerability exists when Windows 'CloudStore' improperly handles file Discretionary Access Control List (DACL). An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1322) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Microsoft Windows Update Client Privilege Escalation Vulnerability (CVE-2019-1323) MS Rating: Important

A privilege escalation vulnerability exists in the Microsoft Windows Update Client when it does not properly handle privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Redirected Drive Buffering System Privilege Escalation Vulnerability (CVE-2019-1325) MS Rating: Important

A privilege escalation vulnerability exists in the Windows redirected drive buffering system ('rdbss.sys') when the operating system improperly handles specific local calls within Windows 7 for 32-bit systems.

Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability (CVE-2019-1326) MS Rating: Important

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding.

Microsoft Windows Update Client Privilege Escalation Vulnerability (CVE-2019-1336) MS Rating: Important

A privilege escalation vulnerability exists in the Microsoft Windows Update Client when it does not properly handle privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Microsoft Windows Update Client Information Disclosure Vulnerability (CVE-2019-1337) MS Rating: Important

An information disclosure vulnerability exists when Windows Update Client fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose memory contents of an elevated process.

Microsoft Windows NTLM Security Bypass Vulnerability (CVE-2019-1338) MS Rating: Important

A security bypass vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLMv2 protection if a client is also sending LMv2 responses. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1339) MS Rating: Important

A privilege escalation vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1340) MS Rating: Important

A privilege escalation vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system.

Windows Power Service Privilege Escalation Vulnerability (CVE-2019-1341) MS Rating: Important

A privilege escalation vulnerability exists when umpo. dll of the Power Service, improperly handles a Registry Restore Key function.

Windows Error Reporting Manager Privilege Escalation Vulnerability (CVE-2019-1342) MS Rating: Important

A privilege escalation vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targeted file leading to an elevated status.

Microsoft Windows Denial of Service Vulnerability (CVE-2019-1343) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Microsoft Windows Code Integrity Module Information Disclosure Vulnerability (CVE-2019-1344) MS Rating: Important

An information disclosure vulnerability exists in the way that the Windows Code Integrity Module handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Microsoft Windows Denial of Service Vulnerability (CVE-2019-1346) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Microsoft Windows Denial of Service Vulnerability (CVE-2019-1347) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Microsoft IIS Server Privilege Escalation Vulnerability (CVE-2019-1365) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft IIS Server fails to check the length of a buffer prior to copying memory to it. An attacker who successfully exploited this vulnerability can allow an unprivileged function ran by the user to execute code in the context of 'NT AUTHORITY\system' escaping the Sandbox.

Microsoft Windows Secure Boot Security Bypass Vulnerability (CVE-2019-1368) MS Rating: Important

A security bypass exists when Windows Secure Boot improperly restricts access to debugging functionality. An attacker who successfully exploited this vulnerability could disclose protected kernel memory.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1358) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1359) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Security Update for SQL Server Management Studio

SQL Server Management Studio Information Disclosure Vulnerability (CVE-2019-1313) MS Rating: Important

An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when it improperly enforces permissions. An attacker could exploit the vulnerability if the attacker's credentials allow access to an affected SQL server database.

SQL Server Management Studio Information Disclosure Vulnerability (CVE-2019-1376) MS Rating: Important

An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when it improperly enforces permissions. An attacker could exploit the vulnerability if the attacker's credentials allow access to an affected SQL server database.

Security Update for Azure App Service

Azure App Service Remote Code Execution Vulnerability (CVE-2019-1372) MS Rating: Critical

An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.

Security Update for Microsoft Dynamics 365 (On-Premise)

Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability (CVE-2019-1375) MS Rating: Important

A cross site scripting vulnerability because it fails to properly sanitize user-supplied input. An authenticated attacker can exploit this issue by sending a specially crafted request to an affected Dynamics server.

Security Update for Open Enclave SDK

Open Enclave SDK Information Disclosure Vulnerability (CVE-2019-1369) MS Rating: Important

An information disclosure vulnerability exists when affected Open Enclave SDK versions improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information stored in the Enclave.

Microsoft Patch Tuesday – September 2019
This month the vendor has patched 79 vulnerabilities, 18 of which are rated Critical.
This month the vendor has patched 79 vulnerabilities, 18 of which are rated Critical.

As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the September 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Windows
Microsoft Hyper-V
Graphics Device Interface (GDI)
Jet Database Engine
Microsoft Lync Server
Azure DevOps and Team Foundation Server
Yammer for Android
Rome SDK Microsoft
Microsoft .NET
Microsoft Exchange Server
The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1138) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

VBScript Remote Code Execution Vulnerability (CVE-2019-1208) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1217) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1221) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

VBScript Remote Code Execution Vulnerability (CVE-2019-1236) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1237) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1298) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1300) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Security Bypass Vulnerability (CVE-2019-1220) MS Rating: Important

A security-bypass vulnerability exists when Microsoft Browsers fail to validate the correct Security Zone of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted Internet Security Zone than intended. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Information Disclosure Vulnerability (CVE-2019-1299) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Cumulative Security Update for Microsoft Office

Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-1295) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft SharePoint where unsafe APIs are exposed when importing data. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-1296) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft SharePoint where unsafe APIs are exposed when importing data. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-1257) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1262) MS Rating: Important

A cross-site-scripting vulnerability (XSS) exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Excel Information Disclosure Vulnerability (CVE-2019-1263) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data.

Microsoft Office Security Bypass Vulnerability (CVE-2019-1264) MS Rating: Important

A security-bypass vulnerability exists when Microsoft Office improperly handles input. An attacker who successfully exploited the vulnerability could execute arbitrary commands.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-1297) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-1260) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft SharePoint. An attacker who successfully exploited this vulnerability could attempt to impersonate another user of the SharePoint server.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-1261) MS Rating: Important

A spoofing vulnerabilty exists in Microsoft SharePoint when it improperly handles requests to authorize applications, resulting in cross-site request forgery (CSRF). To exploit this vulnerability, an attacker would need to create a page specifically designed to cause a cross-site request.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-1259) MS Rating: Moderate

A spoofing vulnerabilty exists in Microsoft SharePoint when it improperly handles requests to authorize applications, resulting in cross-site request forgery (CSRF). To exploit this vulnerability, an attacker would need to create a page specifically designed to cause a cross-site request.

Cumulative Security Update for Microsoft Windows Kernel

Win32k Privilege Escalation Vulnerability (CVE-2019-1256) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1274) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Win32k Privilege Escalation Vulnerability (CVE-2019-1285) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Hyper-V

Windows Hyper-V Information Disclosure Vulnerability (CVE-2019-1254) MS Rating: Important

An information disclosure vulnerability exists when Windows Hyper-V writes uninitialized memory to disk. An attacker could exploit the vulnerability by reading a file to recover kernel memory.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0928) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Security Update for Microsoft Graphics

Windows GDI Information Disclosure Vulnerability (CVE-2019-1252) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1286) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Microsoft Graphics Components Information Disclosure Vulnerability (CVE-2019-1283) MS Rating: Important

An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation.

Security Update for Microsoft Windows

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0787) MS Rating: Critical

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0788) MS Rating: Critical

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-1290) MS Rating: Critical

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-1291) MS Rating: Critical

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client.

LNK Remote Code Execution Vulnerability (CVE-2019-1280) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a . LNK file is processed.

Windows Privilege Escalation Vulnerability (CVE-2019-1215) MS Rating: Important

A privilege escalation vulnerability exists in the way that the ws2ifsl. sys handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1253) MS Rating: Important

A privilege escalation vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system.

Windows Denial of Service Vulnerability (CVE-2019-1292) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Windows Privilege Escalation Vulnerability (CVE-2019-1303) MS Rating: Important

A privilege escalation vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system.

Windows Common Log File System Driver Privilege Escalation Vulnerability (CVE-2019-1214) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Transaction Manager Information Disclosure Vulnerability (CVE-2019-1219) MS Rating: Important

An information disclosure vulnerability exists when the Windows Transaction Manager improperly handles objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed.

Windows ALPC Privilege Escalation Vulnerability (CVE-2019-1269) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system.

Windows ALPC Privilege Escalation Vulnerability (CVE-2019-1272) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system.

Windows Common Log File System Driver Information Disclosure Vulnerability (CVE-2019-1282) MS Rating: Important

An information disclosure exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle sandbox checks. An attacker who successfully exploited this vulnerability could potentially read data outside their expected limits.

Windows Text Service Framework Privilege Escalation Vulnerability (CVE-2019-1235) MS Rating: Important

A privilege escalation vulnerability exists in Windows Text Service Framework (TSF) when the TSF server process does not validate the source of input or commands it receives. An attacker who successfully exploited this vulnerability could inject commands or read input sent through a malicious Input Method Editor (IME).

Windows Secure Boot Security Bypass Vulnerability (CVE-2019-1294) MS Rating: Important

A security-bypass exists when Windows Secure Boot improperly restricts access to debugging functionality. An attacker who successfully exploited this vulnerability could disclose protected kernel memory.

Microsoft Windows Store Installer Privilege Escalation Vulnerability (CVE-2019-1270) MS Rating: Important

A privilege escalation vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files.

Windows Media Privilege Escalation Vulnerability (CVE-2019-1271 MS Rating: Important

An elevation of privilege exists in hdAudio. sys which may lead to an out of band write.

Windows Audio Service Privilege Escalation Vulnerability (CVE-2019-1277) MS Rating: Important

An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

DirectX Information Disclosure Vulnerability (CVE-2019-1216) MS Rating: Important

An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1244) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1245) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1251) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

DirectX Privilege Escalation Vulnerability (CVE-2019-1284) MS Rating: Important

A privilege escalation vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Network Connectivity Assistant Privilege Escalation Vulnerability (CVE-2019-1287) MS Rating: Important

A privilege escalation vulnerability exists in the way that the Windows Network Connectivity Assistant handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Update Delivery Optimization Privilege Escalation Vulnerability (CVE-2019-1289) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Update Delivery Optimization does not properly enforce file share permissions. An attacker who successfully exploited the vulnerability could overwrite files that require higher privileges than what the attacker already has.

Active Directory Federation Services XSS Vulnerability (CVE-2019-1273) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Active Directory Federation Services (ADFS) does not properly sanitize certain error messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected ADFS server.

Diagnostics Hub Standard Collector Service Privilege Escalation Vulnerability (CVE-2019-1232) MS Rating: Important

A privilege escalation vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

Microsoft Compatibility Appraiser Privilege Escalation Vulnerability (CVE-2019-1267) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Compatibility Appraiser where a configuration file, with local privileges, is vulnerable to symbolic hardlink attack. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Winlogon Privilege Escalation Vulnerability (CVE-2019-1268) MS Rating: Important

An elevation of privilege exists when Winlogon does not properly handle file path information. An attacker who successfully exploited this vulnerability could run arbitrary code.

Windows Privilege Escalation Vulnerability (CVE-2019-1278) MS Rating: Important

A privilege escalation vulnerability exists in the way that the unistore.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

Windows SMB Client Driver Information Disclosure Vulnerability (CVE-2019-1293) MS Rating: Important

An information disclosure vulnerability exists in Windows when the Windows SMB Client kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose contents of System memory.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1240) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1241) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1242) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1243) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1246) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1247) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1248) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1249) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1250) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Security Update for Exchange

Microsoft Exchange Denial of Service Vulnerability (CVE-2019-1233) MS Rating: Important

A denial of service vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.

Microsoft Exchange Spoofing Vulnerability (CVE-2019-1266) MS Rating: Important

A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests. An attacker who successfully exploited the vulnerability could perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information.

Security Update for .NET

.NET Framework Privilege Escalation Vulnerability (CVE-2019-1142) MS Rating: Important

A privilege escalation vulnerability exists when the . NET Framework common language runtime (CLR) allows file creation in arbitrary locations.

.NET Core Denial of Service Vulnerability (CVE-2019-1301) MS Rating: Important

A denial of service vulnerability exists when . NET Core improperly handles web requests.

ASP.NET Core Privilege Escalation Vulnerability (CVE-2019-1302) MS Rating: Important

A privilege escalation vulnerability exists when a ASP. NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests.

Security Update for Microsoft Lync Server

Lync 2013 Information Disclosure Vulnerability (CVE-2019-1209) MS Rating: Important

An information disclosure vulnerability exists in Lync 2013. An attacker who exploited it could read arbitrary files on the victim's machine.

Security Update for Team Foundation Server

Azure DevOps and Team Foundation Server Remote Code Execution Vulnerability (CVE-2019-1306) MS Rating: Critical

A remote code execution vulnerability exists when Azure DevOps Server (ADO) and Team Foundation Server (TFS) fail to validate input properly. An attacker who successfully exploited this vulnerability could execute code on the server in the context of the TFS or ADO service account.

Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-1305) MS Rating: Important

A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Security Update for Yammer for Android

Microsoft Yammer Security Bypass Vulnerability (CVE-2019-1265) MS Rating: Important

A security-bypass vulnerability exists when Microsoft Yammer App for Android or iOS fails to apply the correct Intune MAM Policy. This could allow an attacker to perform functions that are restricted by Intune Policy.

Security Update for Rome SDK

Rome SDK Information Disclosure Vulnerability (CVE-2019-1231) MS Rating: Important

An Information Disclosure vulnerability exists in the way Rome SDK handles server SSL/TLS certificate validation. This vulnerability allows an unauthenticated attacker to establish connection with an invalid SSL/TLS server certificate.

 

 

Microsoft Patch Tuesday – August 2019
This month the vendor has patched 93 vulnerabilities, 27 of which are rated Critical.
This month Microsoft has patched 93 vulnerabilities, 27 of which are rated Critical.

As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the August 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Windows
Microsoft Hyper-V
Graphics Device Interface (GDI)
Jet Database Engine
Visual Studio
The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1131) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1133) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1139) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1140) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1141) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-1183) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Remote Code Execution Vulnerability (CVE-2019-1194) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1195) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1196) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1197) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Information Disclosure Vulnerability (CVE-2019-1030) MS Rating: Important

A security bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins and improperly handles browser cookies. An attacker who successfully exploited this vulnerability could trick a browser into overwriting a secure cookie with an insecure cookie.

MS XML Remote Code Execution Vulnerability (CVE-2019-1057) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user's system.

Microsoft Browsers Security Bypass Vulnerability (CVE-2019-1192) MS Rating: Important

A security bypass vulnerability exists when Microsoft browsers improperly handle requests of different origins. The vulnerability allows Microsoft browsers to bypass Same-Origin Policy (SOP) restrictions, and to allow requests that should otherwise be ignored.

Internet Explorer Memory Corruption Vulnerability (CVE-2019-1193) MS Rating: Important

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Cumulative Security Update for Microsoft Office

Microsoft Outlook Memory Corruption Vulnerability (CVE-2019-1199) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft Outlook Remote Code Execution Vulnerability (CVE-2019-1200) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

Microsoft Word Remote Code Execution Vulnerability (CVE-2019-1201) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

Microsoft SharePoint Information Disclosure Vulnerability (CVE-2019-1202) MS Rating: Important

An information disclosure vulnerabilty exists in the way Microsoft SharePoint handles session objects. A locally authenticated attacker who successfully exploited the vulnerability could hijack the session of another user.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1203) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Outlook Privilege Escalation Vulnerability (CVE-2019-1204) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft Outlook initiates processing of incoming messages without sufficient validation of the formatting of the messages. An attacker who successfully exploited the vulnerability could attempt to force Outlook to load a local or remote message store (over SMB).

Microsoft Word Remote Code Execution Vulnerability (CVE-2019-1205) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

Outlook iOS Spoofing Vulnerability (CVE-2019-1218) MS Rating: Important

A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.

Cumulative Security Update for Microsoft Windows Kernel

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0965) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Hyper-V Remote Code Execution Vulnerability (CVE-2019-0720) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Kernel Privilege Escalation Vulnerability (CVE-2019-1159) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-1169) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1227) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1228) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Cumulative Security Update for Microsoft Hyper-V

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0714) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0715) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0717) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0718) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0723) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Security Update for Microsoft Graphics

Microsoft Graphics Remote Code Execution Vulnerability (CVE-2019-1149) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system.

Microsoft Graphics Remote Code Execution Vulnerability (CVE-2019-1150) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system.

Microsoft Graphics Remote Code Execution Vulnerability (CVE-2019-1151) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system.

Microsoft Graphics Remote Code Execution Vulnerability (CVE-2019-1152) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system.

Microsoft Graphics Remote Code Execution Vulnerability (CVE-2019-1144) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system.

Microsoft Graphics Remote Code Execution Vulnerability (CVE-2019-1145) MS Rating: Critical

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system.

Microsoft Graphics Component Information Disclosure Vulnerability (CVE-2019-1078) MS Rating: Important

An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Graphics Component Information Disclosure Vulnerability (CVE-2019-1143) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user's system.

Microsoft Graphics Component Information Disclosure Vulnerability (CVE-2019-1148) MS Rating: Important

An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Microsoft Graphics Component Information Disclosure Vulnerability (CVE-2019-1153) MS Rating: Important

An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows Graphics Component Information Disclosure Vulnerability (CVE-2019-1154) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user's system.

Windows Graphics Component Information Disclosure Vulnerability (CVE-2019-1158) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user's system.

Windows Kernel Elevation of Privilege Vulnerability (CVE-2019-1164) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Security Update for Microsoft Windows

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-1226) MS Rating: Critical

A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-1222) MS Rating: Critical

A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction.

Windows DHCP Server Remote Code Execution Vulnerability (CVE-2019-1213) MS Rating: Critical

A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-1181) MS Rating: Critical

A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction.

LNK Remote Code Execution Vulnerability (CVE-2019-1188) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a . LNK file is processed.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-1182) MS Rating: Critical

A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction.

Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0736) MS Rating: Critical

A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine.

Windows Denial of Service Vulnerability (CVE-2019-0716) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

Microsoft Defender Privilege Escalation Vulnerability (CVE-2019-1161) MS Rating: Important

A privilege escalation vulnerability exists when the MpSigStub. exe for Defender allows file deletion in arbitrary locations.

Windows ALPC Privilege Escalation Vulnerability (CVE-2019-1162) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system.

Windows File Signature Security Bypass Vulnerability (CVE-2019-1163) MS Rating: Important

A security bypass exists when Windows incorrectly validates CAB file signatures. An attacker who successfully exploited this vulnerability could inject code into a CAB file without invalidating the file's signature.

Microsoft Windows p2pimsvc Privilege Escalation Vulnerability (CVE-2019-1168) MS Rating: Important

A privilege escalation exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system.

Windows Shell Privilege Escalation Vulnerability (CVE-2019-1170) MS Rating: Important

A privilege escalation vulnerability exists when reparse points are created by sandboxed processes allowing sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system.

SymCrypt Information Disclosure Vulnerability (CVE-2019-1171) MS Rating: Important

An information disclosure vulnerability exists in SymCrypt during the OAEP decryption stage. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Information Disclosure Vulnerability (CVE-2019-1172) MS Rating: Important

An information disclosure vulnerability exists in Azure Active Directory (AAD) Microsoft Account (MSA) during the login request session. An attacker who successfully exploited the vulnerability could take over a user's account.

Windows Privilege Escalation Vulnerability (CVE-2019-1173) MS Rating: Important

A privilege escalation vulnerability exists in the way that the PsmServiceExtHost. dll handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1174) MS Rating: Important

A privilege escalation vulnerability exists in the way that the PsmServiceExtHost. dll handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1175) MS Rating: Important

A privilege escalation vulnerability exists in the way that the psmsrv. dll handles objects in memory.

DirectX Privilege Escalation Vulnerability (CVE-2019-1176) MS Rating: Important

A privilege escalation vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Privilege Escalation Vulnerability (CVE-2019-1177) MS Rating: Important

A privilege escalation vulnerability exists in the way that the rpcss. dll handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1178) MS Rating: Important

A privilege escalation vulnerability exists in the way that the ssdpsrv. dll handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1179) MS Rating: Important

A privilege escalation vulnerability exists in the way that the unistore. dll handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1180) MS Rating: Important

A privilege escalation vulnerability exists in the way that the wcmsvc. dll handles objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1184) MS Rating: Important

A privilege escalation vulnerability exists when Windows Core Shell COM Server Registrar improperly handles COM calls. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-1185) MS Rating: Important

A privilege escalation vulnerability exists due to a stack corruption in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Privilege Escalation Vulnerability (CVE-2019-1186) MS Rating: Important

A privilege escalation vulnerability exists in the way that the wcmsvc. dll handles objects in memory.

XmlLite runtime Denial of Service Vulnerability (CVE-2019-1187) MS Rating: Important

A denial of service vulnerability exists when the XmlLite runtime (XmlLite. dll) improperly parses XML input.

Windows Image Privilege Escalation Vulnerability (CVE-2019-1190) MS Rating: Important

A privilege escalation vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1198) MS Rating: Important

A privilege escalation exists in SyncController. dll.

Windows DHCP Server Remote Code Execution Vulnerability (CVE-2019-1206) MS Rating: Important

A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could cause the DHCP service to become nonresponsive.

Windows DHCP Server Denial of Service Vulnerability (CVE-2019-1212) MS Rating: Important

A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could cause the DHCP server service to stop responding.

Bluetooth Key Length Enforcement (CVE-2019-9506) MS Rating: Important

Executive Summary Microsoft is aware of the Bluetooth BR/EDR (basic rate/enhanced data rate, known as "Bluetooth Classic") key negotiation vulnerability that exists at the hardware specification level of any BR/EDR Bluetooth device. An attacker could potentially be able to negotiate the offered key length down to 1 byte of entropy, from a maximum of 16 bytes.

HTTP/2 Server Denial of Service Vulnerability (CVE-2019-9511) MS Rating: Important

A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests.

HTTP/2 Server Denial of Service Vulnerability (CVE-2019-9513) MS Rating: Important

A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests.

HTTP/2 Server Denial of Service Vulnerability (CVE-2019-9514) MS Rating: Important

A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests.

Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability (CVE-2019-1223) MS Rating: Important

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding.

Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2019-1224) MS Rating: Important

An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.

Remote Desktop Protocol Server Information Disclosure Vulnerability (CVE-2019-1225) MS Rating: Important

An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.

Dynamics On-Premise Elevation of Privilege Vulnerability (CVE-2019-1229) MS Rating: Important

An elevation of privilege vulnerability exists in Dynamics On-Premise v9. An attacker who successfully exploited the vulnerability could leverage a customizer privilege within Dynamics to gain control of the Web Role hosting the Dynamics installation.

HTTP/2 Server Denial of Service Vulnerability (CVE-2019-9512) MS Rating: Important

A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests.

HTTP/2 Server Denial of Service Vulnerability (CVE-2019-9518) MS Rating: Important

A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1155) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1156) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1157) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1146) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1147) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Security Update for Visual Studio

Git for Visual Studio Privilege Escalation Vulnerability (CVE-2019-1211) MS Rating: Important

A privilege escalation vulnerability exists in Git for Visual Studio when it improperly parses configuration files. An attacker who successfully exploited the vulnerability could execute code in the context of another local user.

 

 

Microsoft Patch Tuesday – July 2019
This month the vendor has patched 77 vulnerabilities, 16 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.

Microsoft's summary of the July 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft .NET
Microsoft Windows
DirectWrite
Graphics Device Interface (GDI)
Microsoft SQL Server
Team Foundation Server
Microsoft Exchange Server
Azure
Microsoft Visual Studio

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Microsoft Browser Memory Corruption Vulnerability (CVE-2019-1104) MS Rating: Critical

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Memory Corruption Vulnerability (CVE-2019-1063) MS Rating: Critical

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1001) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1004) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1056) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1059) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1062) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1092) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1103) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1106) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1107) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Cumulative Security Update for Microsoft Office

Microsoft Office Spoofing Vulnerability (CVE-2019-1109) MS Rating: Important

A spoofing vulnerability exists when Microsoft Office Javascript does not check the validity of the web page making a request to Office documents. An attacker who successfully exploited this vulnerability could read or write information in Office documents.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-1110) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-1111) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Microsoft Excel Information Disclosure Vulnerability (CVE-2019-1112) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user's computer or data.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1134) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Cumulative Security Update for Microsoft .NET

.NET Denial of Service Vulnerability (CVE-2019-1083) MS Rating: Critical

A denial of service vulnerability exists when Microsoft Common Object Runtime Library improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET web application.

.NET Framework Remote Code Execution Vulnerability (CVE-2019-1113) MS Rating: Important

A remote code execution vulnerability exists in . NET software when the software fails to check the source markup of a file.

ASP.NET Core Spoofing Vulnerability (CVE-2019-1075) MS Rating: Important

A spoofing vulnerability exists in ASP. NET Core that could lead to an open redirect. An attacker who successfully exploited the vulnerability could redirect a targeted user to a malicious website.

Cumulative Security Update for Microsoft Windows Kernel

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1071) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1073) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Win32k Information Disclosure Vulnerability (CVE-2019-1096) MS Rating: Important

An information disclosure vulnerability exists when the Win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Win32k Privilege Escalation Vulnerability (CVE-2019-1132) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Kernel Privilege Escalation Vulnerability (CVE-2019-1067) MS Rating: Moderate

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Windows

Windows DNS Server Denial of Service Vulnerability (CVE-2019-0811) MS Rating: Critical

A denial of service vulnerability exists in Windows DNS Server when it fails to properly handle DNS queries. An attacker who successfully exploited this vulnerability could cause the DNS Server service to become non-responsive.

Windows Error Reporting Privilege Escalation Vulnerability (CVE-2019-1037) MS Rating: Critical

A privilege escalation vulnerability exists in the way Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows DHCP Server Remote Code Execution Vulnerability (CVE-2019-0785) MS Rating: Important

A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could either run arbitrary code on the DHCP failover server or cause the DHCP service to become non-responsive.

SymCrypt Denial of Service Vulnerability (CVE-2019-0865) MS Rating: Important

A denial of service vulnerability exists when SymCrypt improperly handles a specially crafted digital signature. An attacker could exploit the vulnerability by creating a specially crafted connection or message.

Microsoft 'splwow64' Privilege Escalation Vulnerability (CVE-2019-0880) MS Rating: Important

A local Privilege Escalation Vulnerability exists in how splwow64. exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0887) MS Rating: Important

A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an authenticated attacker abuses clipboard redirection. An attacker who successfully exploited this vulnerability could execute arbitrary code on the victim system.

Remote Desktop Protocol Client Information Disclosure Vulnerability (CVE-2019-1108) MS Rating: Important

An information disclosure vulnerability exists when the Windows RDP client improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0966) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

ADFS Security Feature Bypass Vulnerability (CVE-2019-0975) MS Rating: Important

A security feature bypass vulnerability exists when Active Directory Federation Services (ADFS) improperly updates its list of banned IP addresses. To exploit this vulnerability, an attacker would have to convince a victim ADFS administrator to update the list of banned IP addresses.

ADFS Security Feature Bypass Vulnerability (CVE-2019-1126) MS Rating: Important

A security feature bypass vulnerability exists in Active Directory Federation Services (ADFS) which could allow an attacker to bypass the extranet lockout policy. To exploit this vulnerability, an attacker could run a specially crafted application, which would allow an attacker to launch a password brute-force attack or cause account lockouts in Active Directory.

DirectX Privilege Escalation Vulnerability (CVE-2019-0999) MS Rating: Important

A privilege escalation vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

WCF/WIF SAML Token Authentication Bypass Vulnerability (CVE-2019-1006) MS Rating: Important

An Authentication Bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys. This vulnerability allows an attacker to impersonate another user, which can lead to elevation of privileges.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1074) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Windows where certain folders, with local service privilege, are vulnerable to symbolic link attack. An attacker who successfully exploited this vulnerability could potentially access unauthorized information.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-1082) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Windows where a certain dll, with Local Service privilege, is vulnerable to race planting a customized dll. An attacker who successfully exploited this vulnerability could potentially elevate privilege to SYSTEM.

Windows WLAN Service Privilege Escalation Vulnerability (CVE-2019-1085) MS Rating: Important

A privilege escalation vulnerability exists in the way that the wlansvc.dll handles objects in memory.

Windows Audio Service Privilege Escalation Vulnerability (CVE-2019-1086) MS Rating: Important

A privilege escalation vulnerability exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

Windows Audio Service Privilege Escalation Vulnerability (CVE-2019-1087) MS Rating: Important

A privilege escalation vulnerability exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

Windows Audio Service Privilege Escalation Vulnerability (CVE-2019-1088) MS Rating: Important

A privilege escalation vulnerability exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

Windows RPCSS Privilege Escalation Vulnerability (CVE-2019-1089) MS Rating: Important

A privilege escalation vulnerability exists in rpcss.dll when the RPC service Activation Kernel improperly handles an RPC request.

Windows 'dnsrlvr.dll' Privilege Escalation Vulnerability (CVE-2019-1090) MS Rating: Important

A privilege escalation vulnerability exists in the way that the 'dnsrslvr.dll' handles objects in memory.

Microsoft 'unistore.dll' Information Disclosure Vulnerability (CVE-2019-1091) MS Rating: Important

An information disclosure vulnerability exists when 'Unistore.dll' fails to properly handle objects in memory.

Windows Privilege Escalation Vulnerability (CVE-2019-1129) MS Rating: Important

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Windows Privilege Escalation Vulnerability (CVE-2019-1130) MS Rating: Important

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

Docker Privilege Escalation Vulnerability (CVE-2018-15664) MS Rating: Important

A privilege escalation vulnerability in the Docker runtime wherein a malicious container can acquire full read or write access to the host operating system where that container is running.

Security Update for Microsoft DirectWrite

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1117) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1118) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1119) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1120) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1121) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1122) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1123) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1124) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1127) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Remote Code Execution Vulnerability (CVE-2019-1128) MS Rating: Important

A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1097) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

DirectWrite Information Disclosure Vulnerability (CVE-2019-1093) MS Rating: Important

An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Security Update for Windows Graphics Device Interface (GDI)

Windows GDI Information Disclosure Vulnerability (CVE-2019-1116) MS Rating: Critical

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1094) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1095) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1098) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1099) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1100) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1101) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system.

GDI+ Remote Code Execution Vulnerability (CVE-2019-1102) MS Rating: Important

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

Security Update for Microsoft SQL Server

Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2019-1068) MS Rating: Important

A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account.

Security Update for Microsoft Exchange

Microsoft Exchange Information Disclosure Vulnerability (CVE-2019-1084) MS Rating: Important

An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An attacker could exploit this vulnerability by creating entities with invalid display names, and add such entities to conversations without being noticed.

Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2019-1136) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could gain the same rights as any other user of the Exchange server.

Microsoft Exchange Server Spoofing Vulnerability (CVE-2019-1137) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected server.

Security Update for Azure and Team Foundation Server

Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-1076) MS Rating: Important

A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server and Team Foundation Server Remote Code Execution Vulnerability (CVE-2019-1072) MS Rating: Important

A remote code execution vulnerability exists when Azure DevOps Server and Team Foundation Server (TFS) improperly handle user input. An attacker who successfully exploited the vulnerability could execute code on the target server in the context of the DevOps or TFS service account.

Azure Automation Privilege Escalation Vulnerability (CVE-2019-0962) MS Rating: Critical

A privilege escalation vulnerability exists in Azure Automation "RunAs account" runbooks for users with contributor role. This vulnerability could potentially allow members of an organization to access Key Vault secrets through a runbook, even if these members would personally not have access to that Key Vault.

Security Update for Microsoft Visual Studio

Visual Studio Privilege Escalation Vulnerability (CVE-2019-1077) MS Rating: Important

A privilege escalation vulnerability exists when the Visual Studio updater service improperly handles file permissions. An attacker who successfully exploited this vulnerability overwrite arbitrary files with XML content in the security context of the local system.

Visual Studio Information Disclosure Vulnerability (CVE-2019-1079) MS Rating: Important

An information disclosure vulnerability exists when Visual Studio improperly parses XML input in certain settings files. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.


Microsoft Patch Tuesday – June 2019
This month the vendor has patched 88 vulnerabilities, 20 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.

Microsoft's summary of the June 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Windows
Windows Hyper-V
Graphics Device Interface (GDI)
Jet Database Engine
Skype for Business and Lync Server
Azure

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Microsoft Edge Security Feature Bypass Vulnerability (CVE-2019-1054) MS Rating: Important

A security bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW). An attacker can exploit this issue by hosting a malicious website or sending the targeted user a specially crafted .url file that is designed to exploit the bypass.

Microsoft Browser Memory Corruption Vulnerability (CVE-2019-1038) MS Rating: Critical

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0989) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0991) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0992) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0993) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1002) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1003) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1024) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1051) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-1052) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0920) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0988) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Scripting Engine Information Disclosure Vulnerability (CVE-2019-0990) MS Rating: Critical

An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker can exploit this issue to obtain information to further compromise the user's system.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1055) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1080) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-1005) MS Rating: Important

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user.

Scripting Engine Information Disclosure Vulnerability (CVE-2019-1023) MS Rating: Important

An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker can exploit this issue to obtain information to further compromise the user's system.

Microsoft Browser Information Disclosure Vulnerability (CVE-2019-1081) MS Rating: Important

An information disclosure vulnerability exists when the Microsoft browsers do not properly handle objects in memory. An attacker can exploit this issue to obtain information to further compromise the user's system.

Cumulative Security Update for Microsoft Office

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1031) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1032) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1033) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-1036) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Word Remote Code Execution Vulnerability (CVE-2019-1034) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker can exploit this issue to use a specially crafted file to perform actions in the security context of the current user.

Microsoft Word Remote Code Execution Vulnerability (CVE-2019-1035) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker can exploit this issue to use a specially crafted file to perform actions in the security context of the current user.

Cumulative Security Update for Microsoft Windows Kernel

Win32k Elevation of Privilege Vulnerability (CVE-2019-0960) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode.

Win32k Elevation of Privilege Vulnerability (CVE-2019-1014) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode.

Win32k Elevation of Privilege Vulnerability (CVE-2019-1017) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-1039) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker can exploit this issue to obtain information to further compromise the user's system.

Windows Kernel Elevation of Privilege Vulnerability (CVE-2019-1041) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode.

Windows Secure Kernel Mode Security Feature Bypass Vulnerability (CVE-2019-1044) MS Rating: Important

A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker can exploit this issue to violate virtual trust levels (VTL).

Windows Kernel Elevation of Privilege Vulnerability (CVE-2019-1065) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Windows Hyper-V

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0620) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker requires to run a specially crafted application on a guest operating system that causes the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0722) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker requires to run a specially crafted application on a guest operating system that causes the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0713) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0709) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker can exploit this issue to execute arbitrary code on the host operating system.

Windows Hyper-V Denial Of Service Vulnerability (CVE-2019-0710) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Windows Hyper-V Denial Of Service Vulnerability (CVE-2019-0711) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Cumulative Security Update for Microsoft Windows Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0904) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0905) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0906) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0907) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0908) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0909) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0974) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this issue to execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

Cumulative Security Update for Microsoft Windows Graphics Device Interface (GDI)

Windows GDI Information Disclosure Vulnerability (CVE-2019-1009) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1010) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1011) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1012) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1013) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1015) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1016) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1046) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1047) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1048) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1049) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-1050) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0968) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0977) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this issue by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage to obtain information to further compromise the user's system.

Cumulative Security Update for Microsoft Windows

Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1021) MS Rating: Important

A privilege escalation exists in Windows Audio Service. An attacker can exploit this issue to run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker requires to run a specially crafted application that could exploit the vulnerability.

Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1022) MS Rating: Important

A privilege escalation exists in Windows Audio Service. An attacker can exploit this issue to run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker requires to run a specially crafted application that could exploit the vulnerability.

Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1026) MS Rating: Important

A privilege escalation exists in Windows Audio Service. An attacker can exploit this issue to run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker requires to run a specially crafted application that could exploit the vulnerability.

Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1027) MS Rating: Important

A privilege escalation exists in Windows Audio Service. An attacker can exploit this issue to run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker requires to run a specially crafted application that could exploit the vulnerability.

Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1028) MS Rating: Important

A privilege escalation exists in Windows Audio Service. An attacker can exploit this issue to run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker requires to run a specially crafted application that could exploit the vulnerability.

Windows Audio Service Elevation of Privilege Vulnerability (CVE-2019-1007) MS Rating: Important

A privilege escalation exists in Windows Audio Service. An attacker can exploit this issue to run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker requires to run a specially crafted application that could exploit the vulnerability.

ActiveX Data Objects (ADO) Remote Code Execution Vulnerability (CVE-2019-0888) MS Rating: Critical

A remote code execution vulnerability exists in the way that ActiveX Data Objects (ADO) handle objects in memory. An attacker can exploit this issue to execute arbitrary code with the victim user's privileges. An attacker could craft a website that exploits the vulnerability and then convince a victim user to visit the website.

Microsoft Speech API Remote Code Execution Vulnerability (CVE-2019-0985) MS Rating: Critical

A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language.

Microsoft IIS Server Denial of Service Vulnerability (CVE-2019-0941) MS Rating: Important

A denial of service exists in Microsoft IIS Server when the optional request filtering feature improperly handles requests. An attacker can exploit this issue to perform a temporary denial of service against pages configured to use request filtering. To exploit this vulnerability, an attacker could send a specially crafted request to a page utilizing request filtering.

Windows ALPC Elevation of Privilege Vulnerability (CVE-2019-0943) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker can exploit this issue to run arbitrary code in the security context of the local system. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system.

Windows Event Viewer Information Disclosure Vulnerability (CVE-2019-0948) MS Rating: Moderate

An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker can exploit this issue to read arbitrary files via an XML external entity (XXE) declaration. To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file.

Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2019-0959) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker can exploit this issue to run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.

Local Security Authority Subsystem Service Denial of Service Vulnerability (CVE-2019-0972) MS Rating: Important

This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system.

Windows Installer Elevation of Privilege Vulnerability (CVE-2019-0973) MS Rating: Important

A privilege escalation vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges.

Windows Storage Service Elevation of Privilege Vulnerability (CVE-2019-0983) MS Rating: Important

A privilege escalation vulnerability exists when the Storage Service improperly handles file operations. An attacker can exploit this issue to gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application.

Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2019-0984) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker can exploit this issue to run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system

Windows User Profile Service Elevation of Privilege Vulnerability (CVE-2019-0986) MS Rating: Important

A privilege escalation vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker can exploit this issue to delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing.

Windows Storage Service Elevation of Privilege Vulnerability (CVE-2019-0998) MS Rating: Important

A privilege escalation vulnerability exists when the Storage Service improperly handles file operations. An attacker can exploit this issue to gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application.

DirectX Elevation of Privilege Vulnerability (CVE-2019-1018) MS Rating: Important

A privilege escalation vulnerability exists when DirectX improperly handles objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Microsoft Windows Security Feature Bypass Vulnerability (CVE-2019-1019) MS Rating: Important

A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker can exploit this issue to access another machine using the original user privileges.

Windows Denial of Service Vulnerability (CVE-2019-1025) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker can exploit this issue to cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network share.

Windows NTLM Tampering Vulnerability (CVE-2019-1040) MS Rating: Important

A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. An attacker can exploit this issue to gain the ability to downgrade NTLM security features. To exploit this vulnerability, the attacker would need to tamper with the NTLM exchange. The attacker could then modify flags of the NTLM packet without invalidating the signature.

Comctl32 Remote Code Execution Vulnerability (CVE-2019-1043) MS Rating: Important

A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker can exploit this issue to gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system.

Windows Network File System Elevation of Privilege Vulnerability (CVE-2019-1045) MS Rating: Important

A privilege escalation vulnerability exists in the way that the Windows Network File System (NFS) handles objects in memory. An attacker can exploit this issue to execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

Windows Shell Elevation of Privilege Vulnerability (CVE-2019-1053) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Shell fails to validate folder shortcuts. An attacker can exploit this issue to elevate privileges by escaping a sandbox. To exploit this vulnerability, an attacker would require unprivileged execution on the victim system.

Windows Elevation of Privilege Vulnerability (CVE-2019-1064) MS Rating: Important

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker can exploit this issue to run processes in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Task Scheduler Elevation of Privilege Vulnerability (CVE-2019-1069) MS Rating: Important

A privilege escalation vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker can exploit this issue to gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system.

Security Update for Skype for Business and Lync Server

Skype for Business and Lync Server Denial of Service Vulnerability (CVE-2019-1029) MS Rating: Important

A denial of service vulnerability exists in Skype for Business. An attacker can exploit this issue to cause Skype for Business to stop responding. Note that the denial of service would not allow an attacker to execute code or to elevate the attacker's user rights.

Security Update for Azure

Azure DevOps Server Spoofing Vulnerability (CVE-2019-0996) MS Rating: Important

A spoofing vulnerability exists in Azure DevOps Server when it improperly handles requests to authorize applications, resulting in a cross-site request forgery. An attacker can exploit this issue to bypass OAuth protections and register an application on behalf of the targeted user. To exploit this vulnerability, an attacker would need to create a page specifically designed to cause a cross-site request. The attacker would then need to convince a targeted user to click a link to the malicious page.


 

Microsoft Patch Tuesday – May 2019
This month the vendor has patched 79 vulnerabilities, 22 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
IMPORTANT: Due to the severity of CVE-2019-0708, and the high likelihood of exploitation, Symantec recommends that customers apply patches immediately. If immediate patching is not possible, customers should take the following steps:

Disable Remote Desktop Services if not required
Block TCP port 3389 at the firewall
Enable Network Level Protection
UPDATE 05-22-2019: Symantec has released the following IPS signatures to detect and block attempts to exploit CVE-2019-0708:

31527 (OS Attack: Microsoft Windows Desktop Services RCE CVE-2019-0708)
31529 (OS Attack: Microsoft Windows Desktop Services RCE CVE-2019-0708 2)
Microsoft's summary of the May 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft .NET
Microsoft Windows
Microsoft Remote Desktop Services
Graphics Device Interface (GDI)
Jet Database Engine
Team Foundation Server
Skype for Android
Azure
NuGet

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0911) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0912) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0913) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0914) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0915) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0916) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0917) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0918) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Spoofing Vulnerability (CVE-2019-0921) MS Rating: Important

A spoofing vulnerability exists when Internet Explorer improperly handles URLs. An attacker who successfully exploits this vulnerability could trick a user by redirecting the user to a specially crafted website.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0922) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0923) MS Rating: Important

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0924) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0925) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Memory Corruption Vulnerability (CVE-2019-0926) MS Rating: Critical

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0927) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Memory Corruption Vulnerability (CVE-2019-0929) MS Rating: Critical

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Information Disclosure Vulnerability (CVE-2019-0930) MS Rating: Important

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploits this vulnerability could obtain information to further compromise the user's system.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0884) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0937) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Privilege Escalation Vulnerability (CVE-2019-0938) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploits this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandbox.

Microsoft Browser Memory Corruption Vulnerability (CVE-2019-0940) MS Rating: Critical

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. This vulnerability may corrupt memory in such a way that could allow an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0933) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Security Bypass Vulnerability (CVE-2019-0995) MS Rating: Important

A security bypass vulnerability exists when 'urlmon.dll' improperly handles certain Mark of the Web queries. The vulnerability allows Internet Explorer to bypass Mark of the Web warnings or restrictions for files downloaded or created in a specific way.

Cumulative Security Update for Microsoft Office

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0945) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0946) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0947) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-0949) MS Rating: Important

A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-0950) MS Rating: Important

A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-0951) MS Rating: Important

A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2019-0952) MS Rating: Important

A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.NET web controls.

Microsoft Word Remote Code Execution Vulnerability (CVE-2019-0953) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft Word when it fails to properly handle objects in memory. An attacker who successfully exploits the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

Microsoft SharePoint Server Information Disclosure Vulnerability (CVE-2019-0956) MS Rating: Important

An information disclosure vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-0957) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-0958) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0963) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Cumulative Security Update for Microsoft .NET

.NET Framework and .NET Core Denial of Service Vulnerability (CVE-2019-0820) MS Rating: Important

A denial of service (DoS) vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET application.

.NET Framework Denial of Service Vulnerability (CVE-2019-0864) MS Rating: Important

A denial of service (DoS) vulnerability exists when .NET Framework improperly handles objects in heap memory. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET application.

ASP.NET Core Denial of Service Vulnerability (CVE-2019-0980) MS Rating: Important

A denial of service (DoS) vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploits this vulnerability could cause a denial of service against an ASP.NET Core web application.

ASP.NET Core Denial of Service Vulnerability (CVE-2019-0981) MS Rating: Important

A denial of service vulnerability (DoS) exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploits this vulnerability could cause a denial of service against an ASP.NET Core web application.

ASP.NET Denial of Service Vulnerability (CVE-2019-0982) MS Rating: Important

A denial of service (DoS) vulnerability exists when ASP.NET improperly handles web requests. An attacker who successfully exploits this vulnerability could cause a denial of service against an ASP.NET web application.

NuGet Package Manager Tampering Vulnerability (CVE-2019-0976) MS Rating: Important

A tampering vulnerability exists in the NuGet Package Manager for Linux and Mac that could allow an authenticated attacker to modify a NuGet package's folder structure. An attacker who successfully exploits this vulnerability could potentially modify files and folders that are unpacked on a system.

Cumulative Security Update for Microsoft Windows Kernel

Windows Kernel Privilege Escalation Vulnerability (CVE-2019-0881) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Kernel improperly handles key enumeration. An attacker who successfully exploits the vulnerability could gain elevated privileges on a targeted system.

Win32k Privilege Escalation Vulnerability (CVE-2019-0892) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Windows

Windows DHCP Server Remote Code Execution Vulnerability (CVE-2019-0725) MS Rating: Critical

A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploits this vulnerability could run arbitrary code on the DHCP server.

Windows NDIS Privilege Escalation Vulnerability (CVE-2019-0707) MS Rating: Important

A privilege escalation vulnerability exists in the Network Driver Interface Specification (NDIS) when 'ndis.sys' fails to check the length of a buffer prior to copying memory to it.

Diagnostic Hub Standard Collector,Visual Studio Standard Collector Privilege Escalation Vulnerability (CVE-2019-0727) MS Rating: Important

A privilege escalation vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector allows file deletion in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system.

Windows Defender Application Control Security Bypass Vulnerability (CVE-2019-0733) MS Rating: Important

A security bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploits this vulnerability could circumvent Windows PowerShell Constrained Language Mode on the machine.

Windows Privilege Escalation Vulnerability (CVE-2019-0734) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully decode and replace authentication requests using Kerberos, allowing an attacker to be validated as an Administrator. The update addresses this vulnerability by changing how these requests are validated.

Microsoft SQL Server Analysis Services Information Disclosure Vulnerability (CVE-2019-0819) MS Rating: Important

An information disclosure vulnerability exists in Microsoft SQL Server Analysis Services when it improperly enforces metadata permissions. An attacker who successfully exploits the vulnerability could query tables or columns for which they do not have access rights.

Windows Error Reporting Privilege Escalation Vulnerability (CVE-2019-0863) MS Rating: Important

A privilege escalation vulnerability exists in the way Windows Error Reporting (WER) handles files. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode.

Windows OLE Remote Code Execution Vulnerability (CVE-2019-0885) MS Rating: Important

A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code.

Windows Hyper-V Information Disclosure Vulnerability (CVE-2019-0886) MS Rating: Important

An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information.

Windows Storage Service Privilege Escalation Vulnerability (CVE-2019-0931) MS Rating: Important

A privilege escalation vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploits this vulnerability could gain elevated privileges on the victim system.

Windows Privilege Escalation Vulnerability (CVE-2019-0936) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links. An attacker who successfully exploits this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions.

Unified Write Filter Privilege Escalation Vulnerability (CVE-2019-0942) MS Rating: Important

A privilege escalation vulnerability exists in the Unified Write Filter (UWF) feature for Windows 10 when it improperly restricts access to the registry. An attacker who successfully exploits the vulnerability could make changes to the registry keys protected by UWF without having administrator privileges.

Microsoft Dynamics On-Premise Security Bypass Vulnerability (CVE-2019-1008) MS Rating: Important

A security bypass vulnerability exists in Dynamics On Premise. An attacker who successfully exploits the vulnerability could send attachment types that are blocked by the email attachment system.

Security Update for Microsoft Remote Desktop Services

Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) MS Rating: Critical

A remote code execution vulnerability exists in Remote Desktop Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction.

Security Update for Windows Graphics Device Interface (GDI)

GDI+ Remote Code Execution Vulnerability (CVE-2019-0903) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploits this vulnerability could take control of the affected system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0758) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploits the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0882) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploits the vulnerability could obtain information to further compromise the user's system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0961) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploits the vulnerability could obtain information to further compromise the user's system.

Security Update for Skype for Android

Skype for Android Information Disclosure Vulnerability (CVE-2019-0932) MS Rating: Important

An information disclosure vulnerability exists in Skype for Android. An attacker who successfully exploits this vulnerability could listen to the conversation of a Skype for Android user without the user's knowledge.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0889) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0890) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0891) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0893) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0894) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0895) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0896) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0897) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0898) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0899) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0900) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0901) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0902) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploits this vulnerability could execute arbitrary code on a victim system.

Security Update for Azure and Team Foundation Server

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0872) MS Rating: Important

A cross-site scripting (XSS) vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to an Azure DevOps server or a Team Foundation server, which will get executed in the context of the user every time a user visits the compromised page.

Microsoft Azure AD Connect Privilege Escalation Vulnerability (CVE-2019-1000) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in the context of a privileged account, and perform privileged actions.

Azure DevOps Server and Team Foundation Server Information Disclosure Vulnerability (CVE-2019-0971) MS Rating: Important

An information disclosure vulnerability exists when Azure DevOps Server and Microsoft Team Foundation Server do not properly sanitize a specially crafted authentication request to an affected server. An attacker who successfully exploits this vulnerability could execute malicious code on a vulnerable server.

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0979) MS Rating: Important

A cross-site scripting (XSS) vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user-provided input. An authenticated attacker could exploit this vulnerability by sending a specially crafted payload to an Azure DevOps server or a Team Foundation server, which will get executed in the context of the user every time a user visits the compromised page.


Microsoft Patch Tuesday – April 2019
This month the vendor has patched 74 vulnerabilities, 14 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the April 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Exchange
Microsoft Windows
XML Core Service
Graphics Device Interface (GDI)
LUA File Virtualization Filter Driver (Luafv.sys)
Jet Database Engine
Azure DevOps Server
Team Foundation Server
ASP.NET
Open Enclave Software Development Kit

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0739) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0753) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0806) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0810) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0812) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0860) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0861) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0829) MS Rating: Critical

A memory-corruption vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Microsoft Edge Information Disclosure Vulnerability (CVE-2019-0833) MS Rating: Important

An information disclosure vulnerability exists in the way that Microsoft Edge handles objects in memory. An attacker can exploit this issue to obtain information to further compromise the user's system.

Microsoft Browsers Tampering Vulnerability (CVE-2019-0764) MS Rating: Important

A tampering vulnerability exists when Microsoft browsers fails to properly validate input under specific conditions. An attacker can exploit this issue to pass custom command line parameters.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0752) MS Rating: Important

A memory-corruption vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Microsoft Scripting Engine Information Disclosure Vulnerability (CVE-2019-0835) MS Rating: Important

An information disclosure vulnerability exists when the scripting engine handles objects in memory. An attacker can exploit this issue to obtain information to further compromise the user's system.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-0842) MS Rating: Important

A remote code execution vulnerability exists in the way that the VBScript scripting engine handles objects in memory. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-0862) MS Rating: Important

A remote code execution vulnerability exists in the way that the VBScript scripting engine handles objects in memory. An attacker can exploit this issue to execute arbitrary code in the context of the current user. Successful exploitation of this vulnerability would allow an attacker to gain the same user rights as the current user.

VBScript Remote Code Execution Vulnerability (CVE-2019-0794) MS Rating: Important

A remote code execution vulnerability exists in the way that the VBScript scripting engine handles objects in memory. An attacker can exploit this issue to gain access to the affected system. Successful exploitation of this vulnerability requires an attacker to host a specially crafted website designed to invoke VBScript through a web browser.

Cumulative Security Update for Microsoft Office

Office Remote Code Execution Vulnerability (CVE-2019-0801) MS Rating: Important

A remote code execution vulnerability exists when Microsoft Office fails to properly handle certain files. Successful exploitation of this vulnerability requires an attacker to convince a user to open a specially crafted URL file that points to an Excel or PowerPoint file that was also downloaded.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0823) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file that causes arbitrary code execution on the affected system.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0824) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file that causes arbitrary code execution on the affected system.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0825) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file that causes arbitrary code execution on the affected system.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0826) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file that causes arbitrary code execution on the affected system.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0827) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file that causes arbitrary code execution on the affected system.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0830) MS Rating: Important

A cross-site-scripting vulnerability exists when Microsoft SharePoint Server fails to properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker can exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0831) MS Rating: Important

A cross-site-scripting vulnerability exists when Microsoft SharePoint Server fails to properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker can exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Excel Remote Code Execution Vulnerability (CVE-2019-0828) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker can exploit this vulnerability to run arbitrary code in the context of the current user.

Cumulative Security Update for Microsoft Exchange

Microsoft Exchange Spoofing Vulnerability (CVE-2019-0817) MS Rating: Important

A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests. An attacker can exploit this vulnerability to perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information. An attacker could also redirect the user to a malicious website that could spoof content or the vulnerability could be used as a pivot to chain an attack with other vulnerabilities in web services. Successful exploitation of this vulnerability requires an attacker to send a specially crafted email containing a malicious link to a user, or use a chat client to social-engineer a user into clicking the malicious link.

Microsoft Exchange Spoofing Vulnerability (CVE-2019-0858) MS Rating: Important

A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests. An attacker can exploit this vulnerability to perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information. An attacker could also redirect the user to a malicious website that could spoof content or the vulnerability could be used as a pivot to chain an attack with other vulnerabilities in web services. Successful exploitation of this vulnerability requires an attacker to send a specially crafted email containing a malicious link to a user, or use a chat client to social-engineer a user into clicking the malicious link.

Cumulative Security Update for Microsoft Windows Kernel

Win32k Elevation of Privilege Vulnerability (CVE-2019-0685) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control of an affected system.

Win32k Elevation of Privilege Vulnerability (CVE-2019-0859) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control of an affected system.

Win32k Elevation of Privilege Vulnerability (CVE-2019-0803) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker can exploit this issue to run arbitrary code in kernel mode. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control of an affected system.

Win32k Information Disclosure Vulnerability (CVE-2019-0814) MS Rating: Important

An information disclosure vulnerability exists when the Win32k component fails to properly provide kernel information. An attacker can exploit this issue to obtain information to further compromise the user's system. Successful exploitation of this vulnerability requires an attacker to log on to an affected system and run a specially crafted application.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0840) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker can exploit this issue to obtain information to further compromise the user's system. Successful exploitation of this vulnerability requires an attacker to log on to an affected system and run a specially crafted application.

Win32k Information Disclosure Vulnerability (CVE-2019-0848) MS Rating: Important

An information disclosure vulnerability exists when the Win32k component fails to properly provide kernel information. An attacker can exploit this issue to obtain information to further compromise the user's system. Successful exploitation of this vulnerability requires an attacker to log on to an affected system and run a specially crafted application.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0844) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker can exploit this issue to obtain information to further compromise the user's system. Successful exploitation of this vulnerability requires an attacker to log on to an affected system and run a specially crafted application.

Cumulative Security Update for Microsoft Windows

SMB Server Elevation of Privilege Vulnerability (CVE-2019-0786) MS Rating: Critical

A privilege escalation vulnerability exists in the Microsoft Server Message Block (SMB) Server when an attacker with valid credentials attempts to open a specially crafted file over the SMB protocol on the same machine. An attacker can exploit this vulnerability to bypass certain security checks in the operating system.

Windows IOleCvt Interface Remote Code Execution Vulnerability (CVE-2019-0845) MS Rating: Critical

A remote code execution vulnerability exists when the IOleCvt interface renders ASP web page content. An attacker can exploit this vulnerability to run malicious code remotely to take control of the user's system. Successful exploitation of this vulnerability requires an attacker to host a specially crafted website designed to render malicious ASP pages through a web browser.

Windows Admin Center Elevation of Privilege Vulnerability (CVE-2019-0813) MS Rating: Important

A privilege escalation vulnerability exists when Windows Admin Center improperly impersonates operations in certain situations. An attacker can exploit this vulnerability to gain elevated privileges.

Windows Security Feature Bypass Vulnerability (CVE-2019-0732) MS Rating: Important

A security bypass vulnerability exists in Windows because Windows fails to properly handle calls to the LUAFV driver (luafv.sys). An attacker can exploit this vulnerability to circumvent a User Mode Code Integrity (UMCI) policy on the machine to bypass Device Guard. Successful exploitation of this vulnerability requires an attacker to first access the local machine, and then run a malicious program.

Windows TCP/IP Information Disclosure Vulnerability (CVE-2019-0688) MS Rating: Important

An information disclosure vulnerability exists when the Windows TCP/IP stack fails to properly handle fragmented IP packets. An attacker can exploit this vulnerability to obtain information to further compromise the user's system. Successful exploitation of this vulnerability requires an attacker to send specially crafted fragmented IP packets to a remote Windows computer.

DirectX Information Disclosure Vulnerability (CVE-2019-0837) MS Rating: Important

An information disclosure vulnerability exists when DirectX fails to properly handle objects in memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system. An authenticated attacker can exploit this vulnerability by running a specially crafted application.

Windows Information Disclosure Vulnerability (CVE-2019-0838) MS Rating: Important

An information disclosure vulnerability exists when Windows Task Scheduler improperly discloses credentials to Windows Credential Manager. An attacker can exploit this vulnerability to obtain information to further compromise the user's system.

Windows Information Disclosure Vulnerability (CVE-2019-0839) MS Rating: Important

An information disclosure vulnerability exists when the Terminal Services component improperly discloses the contents of its memory. An attacker can exploit this vulnerability to obtain information to further compromise a user's system. Successful exploitation of this vulnerability requires an attacker to log on to an affected system and run a specially crafted application.

NTFS Elevation of Privilege Vulnerability (CVE-2019-0841) MS Rating: Important

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) fails to properly handle hard links. An attacker can exploit this vulnerability to run processes in an elevated context. An attacker could then install programs and view, change, or delete data. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control of an affected system.

Windows Remote Code Execution Vulnerability (CVE-2019-0856) MS Rating: Important

A remote code execution vulnerability exists when Windows fails to properly handle objects in memory. An attacker who successfully exploits these vulnerabilities could take control of an affected system. Successful exploitation of the vulnerabilities require an attacker to first log on to the target system and then run a specially crafted application.

Windows CSRSS Elevation of Privilege Vulnerability (CVE-2019-0735) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Client Server Run-Time Subsystem (CSRSS) fails to properly handle objects in memory. An attacker can exploit this vulnerability to run arbitrary code.

Security Update for Microsoft XML Core Services

MS XML Remote Code Execution Vulnerability (CVE-2019-0791) MS Rating: Critical

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker can exploit this vulnerability to run malicious code remotely to take control of the user's system. Successful exploitation of the vulnerability requires an attacker to host a specially crafted website designed to invoke MSXML through a web browser.

MS XML Remote Code Execution Vulnerability (CVE-2019-0792) MS Rating: Critical

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker can exploit this vulnerability to run malicious code remotely to take control of the user's system. Successful exploitation of the vulnerability requires an attacker to host a specially crafted website designed to invoke MSXML through a web browser.

MS XML Remote Code Execution Vulnerability (CVE-2019-0793) MS Rating: Critical

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker can exploit this vulnerability to run malicious code remotely to take control of the user's system. Successful exploitation of the vulnerability requires an attacker to host a specially crafted website designed to invoke MSXML through a web browser.

MS XML Remote Code Execution Vulnerability (CVE-2019-0790) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker can exploit this vulnerability to run malicious code remotely to take control of the user's system. Successful exploitation of the vulnerability requires an attacker to host a specially crafted website designed to invoke MSXML through a web browser.

MS XML Remote Code Execution Vulnerability (CVE-2019-0795) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker can exploit this vulnerability to run malicious code remotely to take control of the user's system. Successful exploitation of the vulnerability requires an attacker to host a specially crafted website designed to invoke MSXML through a web browser.

Security Update for Windows Graphics Device Interface (GDI)

GDI+ Remote Code Execution Vulnerability (CVE-2019-0853) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker can exploit this vulnerability to take control of the affected system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0802) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system. An attacker can exploit this vulnerability by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0849) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system. An attacker can exploit this vulnerability by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.

Microsoft Graphics Components Remote Code Execution Vulnerability (CVE-2019-0822) MS Rating: Important

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a target system. Successful exploitation of this vulnerability requires an attacker to open a specially crafted file.

Security Update for Windows LUA File Virtualization Filter Driver (Luafv.sys)

Windows LUAFV Elevation of Privilege Vulnerability (CVE-2019-0730) MS Rating: Important

A privilege escalation vulnerability exists when Windows fails to properly handle calls to the LUAFV driver (luafv.sys). An attacker can exploit this vulnerability to run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control over an affected system.

Windows LUAFV Elevation of Privilege Vulnerability (CVE-2019-0731) MS Rating: Important

A privilege escalation vulnerability exists when Windows fails to properly handle calls to the LUAFV driver (luafv.sys). An attacker can exploit this vulnerability to run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control over an affected system.

Windows LUAFV Elevation of Privilege Vulnerability (CVE-2019-0796) MS Rating: Important

A privilege escalation vulnerability exists when Windows fails to properly handle calls to the LUAFV driver (luafv.sys). An attacker can exploit this vulnerability to run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control over an affected system.

Windows LUAFV Elevation of Privilege Vulnerability (CVE-2019-0805) MS Rating: Important

A privilege escalation vulnerability exists when Windows fails to properly handle calls to the LUAFV driver (luafv.sys). An attacker can exploit this vulnerability to run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control over an affected system.

Windows LUAFV Elevation of Privilege Vulnerability (CVE-2019-0836) MS Rating: Important

A privilege escalation vulnerability exists when Windows fails to properly handle calls to the LUAFV driver (luafv.sys). An attacker can exploit this vulnerability to run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Successful exploitation of this vulnerability requires an attacker to first log on to the system. An attacker could then run a specially crafted application that can exploit this vulnerability and take control over an affected system.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0846) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0847) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0851) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0877) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0879) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine fails to properly handle objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted file.

Security Update for Azure DevOps Server and Team Foundation Server

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0866) MS Rating: Important

A cross-site scripting vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user-provided input. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0867) MS Rating: Important

A cross-site scripting vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user-provided input. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0868) MS Rating: Important

A cross-site scripting vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user-provided input. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0870) MS Rating: Important

A cross-site scripting vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user-provided input. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0871) MS Rating: Important

A cross-site scripting vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user-provided input. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server Elevation of Privilege Vulnerability (CVE-2019-0875) MS Rating: Important

A privilege escalation vulnerability exists when Azure DevOps Server 2019 does not properly enforce project permissions. An attacker can exploit this issue to add GitHub repos to a project without having the proper access granted to their account.

Azure DevOps Server Cross-site Scripting Vulnerability (CVE-2019-0874) MS Rating: Important

A cross-site scripting vulnerability exists when Azure DevOps Server does not properly sanitize user provided input. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Azure DevOps Server Spoofing Vulnerability (CVE-2019-0857) MS Rating: Important

A spoofing vulnerability that could allow a security bypass exists in Azure DevOps Server when it does not properly sanitize user-provided input. An attacker who exploits the vulnerability could trick a user into loading a page containing malicious content. An authenticated attacker can exploit this vulnerability by sending a specially crafted payload to the Team Foundation Server, which would get executed in the context of the user every time a user visits the compromised page. To exploit the bypass, an attacker can leverage any external source in the script-src to embed malicious script by bypassing Content Security Policy (CSP).

Azure DevOps Server HTML Injection Vulnerability (CVE-2019-0869) MS Rating: Important

A spoofing vulnerability exists in Microsoft Azure DevOps Server when it fails to properly handle web requests. An attacker can exploit this vulnerability to perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information. An attacker could also redirect the user to a malicious website that could spoof content or the vulnerability could be used as a pivot to chain an attack with other vulnerabilities in web services. Successful exploitation of this vulnerability requires an attacker to create a popup to harvest information or present a user with a malicious link.

Security Update for Microsoft ASP.NET

ASP.NET Core Denial of Service Vulnerability (CVE-2019-0815) MS Rating: Important

A denial of service (DoS) vulnerability exists when ASP.NET Core fails to properly handle web requests. An attacker can exploit this vulnerability to cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication. A remote unauthenticated attacker can exploit this vulnerability by issuing specially crafted requests to the .NET Core application.

Security Update for Open Enclave Software Development Kit

Open Enclave SDK Information Disclosure Vulnerability (CVE-2019-0876) MS Rating: Important

An information disclosure vulnerability exists when affected Open Enclave SDK versions improperly handle objects in memory. An attacker can exploit this vulnerability to obtain information stored in the Enclave. Successful exploitation of this vulnerability requires an attacker to successfully compromise the host application running the enclave. The attacker can then pivot to the enclave and exploit this vulnerability without user interaction.


Microsoft Patch Tuesday – March 2019
This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the March 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Windows
Jet Database Engine
Visual Studio
Windows Hyper-V
Team Foundation Server
Skype for Business and Lync
The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0592) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0609) MS Rating: Critical

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0639) MS Rating: Critical

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-0666) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-0667) MS Rating: Critical

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0680) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Memory Corruption Vulnerability (CVE-2019-0763) MS Rating: Critical

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0769) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0770) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0771) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0773) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Privilege Escalation Vulnerability (CVE-2019-0678) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain. In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0746) MS Rating: Important

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Security Bypass Vulnerability (CVE-2019-0768) MS Rating: Important

A security bypass vulnerability exists when Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, and to allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data that would otherwise be restricted.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-0772) MS Rating: Important

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Memory Corruption Vulnerability (CVE-2019-0779) MS Rating: Important

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Browser Memory Corruption Vulnerability (CVE-2019-0780) MS Rating: Important

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0783) MS Rating: Important

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Browsers Security Bypass Vulnerability (CVE-2019-0762) MS Rating: Important

A security bypass vulnerability exists when Microsoft browsers improperly handle requests of different origins. The vulnerability allows Microsoft browsers to bypass Same-Site cookie restrictions, and to allow requests that should otherwise be ignored.

Microsoft Edge Security Bypass Vulnerability (CVE-2019-0612) MS Rating: Important

A security bypass vulnerability exists when Click2Play protection in Microsoft Edge improperly handles flash objects. By itself, this bypass vulnerability does not allow arbitrary code execution. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Windows VBScript Engine Remote Code Execution Vulnerability (CVE-2019-0665) MS Rating: Important

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0611) MS Rating: Important

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Cumulative Security Update for Microsoft Office

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0748) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0778) MS Rating: Important

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Cumulative Security Update for Microsoft Windows Kernel

Windows Kernel Privilege Escalation Vulnerability (CVE-2019-0696) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0702) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0755) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0767) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0775) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.

Win32k Information Disclosure Vulnerability (CVE-2019-0776) MS Rating: Important

An information disclosure vulnerability exists when the Win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0782) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.

Win32k Privilege Escalation Vulnerability (CVE-2019-0797) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Privilege Escalation Vulnerability (CVE-2019-0808) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Cumulative Security Update for Microsoft Windows

Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0697) MS Rating: Critical

A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine.

Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0698) MS Rating: Critical

A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine.

Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0726) MS Rating: Critical

A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine.

MS XML Remote Code Execution Vulnerability (CVE-2019-0756) MS Rating: Critical

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user system.

Windows ActiveX Remote Code Execution Vulnerability (CVE-2019-0784) MS Rating: Critical

A remote code execution vulnerability exists in the way that the ActiveX Data objects (ADO) handles objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

Windows Deployment Services TFTP Server Remote Code Execution Vulnerability (CVE-2019-0603) MS Rating: Critical

A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0614) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-0682) MS Rating: Important

A privilege escalation vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Active Directory Privilege Escalation Vulnerability (CVE-2019-0683) MS Rating: Important

A privilege escalation vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest. To exploit this vulnerability, an attacker would first need to compromise an Active Directory forest.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-0689) MS Rating: Important

A privilege escalation vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-0692) MS Rating: Important

A privilege escalation vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-0693) MS Rating: Important

A privilege escalation vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows Subsystem for Linux Privilege Escalation Vulnerability (CVE-2019-0694) MS Rating: Important

A privilege escalation vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Windows SMB Information Disclosure Vulnerability (CVE-2019-0703) MS Rating: Important

An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server.

Windows SMB Information Disclosure Vulnerability (CVE-2019-0821) MS Rating: Important

An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server.

Windows SMB Information Disclosure Vulnerability (CVE-2019-0704) MS Rating: Important

An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server.

Windows Denial of Service Vulnerability (CVE-2019-0754) MS Rating: Important

A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

NuGet Package Manager Tampering Vulnerability (CVE-2019-0757) MS Rating: Important

A tampering vulnerability exists in the NuGet Package Manager for Linux and Mac that could allow an authenticated attacker to modify a NuGet package's folder structure. An attacker who successfully exploited this vulnerability could potentially modify files and folders that are unpackaged on a system.

Windows Print Spooler Information Disclosure Vulnerability (CVE-2019-0759) MS Rating: Important

An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory. An attacker who successfully exploited this vulnerability could use the information to further exploit the victim system.

Internet Explorer Security Bypass Vulnerability (CVE-2019-0761) MS Rating: Important

A security bypass vulnerability exists when Internet Explorer fails to validate the correct Security Zone of requests for specific URLs. This could allow an attacker to cause a user to access a URL in a less restricted Internet Security Zone than intended.

Comctl32 Remote Code Execution Vulnerability (CVE-2019-0765) MS Rating: Important

A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-0766) MS Rating: Important

A privilege escalation vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0774) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0617) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Security Update for Microsoft Windows Hyper-V

Windows Hyper-V Denial of Service Vulnerability (CVE-2019-0690) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.

Hyper-V Denial of Service Vulnerability (CVE-2019-0695) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Hyper-V Denial of Service Vulnerability (CVE-2019-0701) MS Rating: Important

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.

Security Update for Visual Studio

Visual Studio Remote Code Execution Vulnerability (CVE-2019-0809) MS Rating: Important

A remote code execution vulnerability exists when the Visual Studio C++ Redistributable Installer improperly validates input before loading dynamic link library (.DLL) files. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the current user.

Security Update for Team Foundation Server

Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0777) MS Rating: Low

A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page.

Security Update for Skype for Business and Lync

Skype for Business and Lync Spoofing Vulnerability (CVE-2019-0798) MS Rating: Important

A spoofing vulnerability exists when a Lync Server or Skype for Business Server does not properly sanitize a specially crafted request. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected server.

Security Update for Azure

Azure SSH Keypairs Security Bypass Vulnerability (CVE-2019-0816) MS Rating: Moderate

A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init. Extraneous Microsoft service public keys can be unexpectedly added to the VM authorized keys file in the limited scenarios.


Microsoft Patch Tuesday – February 2019
This month the vendor has patched 74 vulnerabilities, 20 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.
Microsoft's summary of the February 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Exchange
Microsoft Windows
Jet Database Engine
Microsoft .NET
Visual Studio
Windows Hyper-V
Access Connectivity Engine
Azure IoT Java SDK
Team Foundation Server

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0590) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0591) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0593) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0605) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Memory Corruption Vulnerability (CVE-2019-0606) MS Rating: Critical

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0607) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Memory Corruption Vulnerability (CVE-2019-0634) MS Rating: Critical

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0640) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0642) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Memory Corruption Vulnerability (CVE-2019-0644) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Memory Corruption Vulnerability (CVE-2019-0645) MS Rating: Critical

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0650) MS Rating: Critical

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. This vulnerability may corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0651) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0652) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0655) MS Rating: Critical

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Memory Corruption Vulnerability (CVE-2019-0610) MS Rating: Important

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0648) MS Rating: Important

An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user’s computer or data. To exploit the vulnerability, an attacker must know the memory address of where the object was created. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0649) MS Rating: Important

A vulnerability exists in Microsoft Chakra JIT server. An attacker who successfully exploited this vulnerability could gain elevated privileges. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Browser Spoofing Vulnerability (CVE-2019-0654) MS Rating: Important

A spoofing vulnerability exists when Microsoft browsers improperly handles specific redirects. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate website. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Scripting Engine Information Disclosure Vulnerability (CVE-2019-0658) MS Rating: Important

An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Internet Explorer Information Disclosure Vulnerability (CVE-2019-0676) MS Rating: Important

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Security Bypass Vulnerability (CVE-2019-0641) MS Rating: Moderate

A security bypass vulnerability exists in Microsoft Edge handles whitelisting. Edge depends on a default whitelist of sites where Adobe Flash will load without user interaction. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Microsoft Edge Information Disclosure Vulnerability (CVE-2019-0643) MS Rating: Moderate

An information disclosure vulnerability exists in the way that Microsoft Edge handles cross-origin requests. An attacker who successfully exploited this vulnerability could determine the origin of all webpages in the affected browser. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.

Cumulative Security Update for Microsoft Office

Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-0594) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-0604) MS Rating: Critical

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Microsoft Office Security Bypass Vulnerability (CVE-2019-0540) MS Rating: Important

A security bypass vulnerability exists when Microsoft Office does not validate URLs. An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-0668) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Excel Information Disclosure Vulnerability (CVE-2019-0669) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data.

Microsoft SharePoint Spoofing Vulnerability (CVE-2019-0670) MS Rating: Moderate

A spoofing vulnerability exists in Microsoft SharePoint when the application does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website.

Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0671) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0672) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0673) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0674) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Access Connectivity Engine Remote Code Execution Vulnerability (CVE-2019-0675) MS Rating: Important

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Cumulative Security Update for Microsoft Exchange

Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2019-0686) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could attempt to impersonate any other user of the Exchange server.

Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2019-0724) MS Rating: Important

A privilege escalation vulnerability exists in Microsoft Exchange Server. An attacker who successfully exploited this vulnerability could attempt to impersonate any other user of the Exchange server.

Cumulative Security Update for Microsoft Windows Kernel

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0621) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.

Win32k Privilege Escalation Vulnerability (CVE-2019-0623) MS Rating: Important

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Win32k Information Disclosure Vulnerability (CVE-2019-0628) MS Rating: Important

An information disclosure vulnerability exists when the Win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows Kernel Privilege Escalation Vulnerability (CVE-2019-0656) MS Rating: Important

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0661) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.

Cumulative Security Update for Microsoft Windows

GDI+ Remote Code Execution Vulnerability (CVE-2019-0618) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

Windows DHCP Server Remote Code Execution Vulnerability (CVE-2019-0626) MS Rating: Critical

A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited this vulnerability could run arbitrary code on the DHCP server.

GDI+ Remote Code Execution Vulnerability (CVE-2019-0662) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system.

HID Information Disclosure Vulnerability (CVE-2019-0600) MS Rating: Important

An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victim system.

HID Information Disclosure Vulnerability (CVE-2019-0601) MS Rating: Important

An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victim system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0602) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0615) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0616) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0619) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows Security Bypass Vulnerability (CVE-2019-0627) MS Rating: Important

A security bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine.

Windows SMB Remote Code Execution Vulnerability (CVE-2019-0630) MS Rating: Important

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests.

Windows Security Bypass Vulnerability (CVE-2019-0631) MS Rating: Important

A security bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine.

Windows Security Bypass Vulnerability (CVE-2019-0632) MS Rating: Important

A security bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine.

Windows SMB Remote Code Execution Vulnerability (CVE-2019-0633) MS Rating: Important

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests.

Windows Information Disclosure Vulnerability (CVE-2019-0636) MS Rating: Important

An information vulnerability exists when Windows improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read the contents of files on disk.

Windows Defender Firewall Security Bypass Vulnerability (CVE-2019-0637) MS Rating: Important

A security bypass vulnerability exists when Windows Defender Firewall incorrectly applies firewall profiles to cellular network connections. This vulnerability occurs when Windows is connected to both an Ethernet network and a cellular network.

Windows Storage Service Privilege Escalation Vulnerability (CVE-2019-0659) MS Rating: Important

A privilege escalation vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0660) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Windows GDI Information Disclosure Vulnerability (CVE-2019-0664) MS Rating: Important

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user system.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0595) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0596) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0597) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0598) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0599) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0625) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

Security Update for Microsoft .NET

.NET Framework Remote Code Execution Vulnerability (CVE-2019-0613) MS Rating: Important

A remote code execution vulnerability exists in .NET Framework and Visual Studio software when the software fails to check the source markup of a file.

.NET Spoofing Vulnerability (CVE-2019-0657) MS Rating: Important

A vulnerability exists in certain .NET Framework APIs and Visual Studio in the way they parse URLs.

Security Update for Visual Studio

Visual Studio Code Remote Code Execution Vulnerability (CVE-2019-0728) MS Rating: Important

A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Security Update for Team Foundation Server

Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0742) MS Rating: Important

A Cross-site Scripting (CSS) vulnerability exists when Team Foundation Server does not properly sanitize user-provided input.

Team Foundation Server Cross-site Scripting Vulnerability (CVE-2019-0743) MS Rating: Important

A Cross-site Scripting (CSS) vulnerability exists when Team Foundation Server does not properly sanitize user-provided input.

Security Update for Microsoft Windows Hyper-V

Windows Hyper-V Information Disclosure Vulnerability (CVE-2019-0635) MS Rating: Important

An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information.

Security Update for Azure IoT Java SDK

Azure IoT Java SDK Privilege Escalation Vulnerability (CVE-2019-0729) MS Rating: Important

A privilege escalation vulnerability exists in the way Azure IoT Java SDK generates symmetric keys for encryption, allowing an attacker to predict the randomness of the key.

Azure IoT Java SDK Information Disclosure Vulnerability (CVE-2019-0741) MS Rating: Important

An information disclosure vulnerability exists in the way Azure IoT Java SDK logs sensitive information. An attacker can exploit this vulnerability if a user has exposed the logs on the internet and can use this information to compromise the device.


Microsoft Patch Tuesday – January 2019
This month the vendor has patched 49 vulnerabilities, 7 of which are rated Critical.
As always, customers are advised to follow these security best practices:

Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining functionality.
Avoid handling files from unknown or questionable sources.
Never visit sites of unknown or questionable integrity.
Block external access at the network perimeter to all key systems unless specific access is required.

Microsoft's summary of the January 2019 releases can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance

This month's update covers vulnerabilities in:

Internet Explorer
Microsoft Edge
ChakraCore
Microsoft Office
Microsoft Exchange
Microsoft Windows
Jet Database Engine
Microsoft ASP.NET
Visual Studio
Skype for Android

The following is a breakdown of the issues being addressed this month:

Cumulative Security Update for Microsoft Browsers

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0539) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit the vulnerability to corrupt memory and execute arbitrary code in the context of the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0567) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit the vulnerability to corrupt memory and execute arbitrary code in the context of the current user.

Chakra Scripting Engine Memory Corruption Vulnerability (CVE-2019-0568) MS Rating: Critical

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. An attacker can exploit the vulnerability to corrupt memory and execute arbitrary code in the context of the current user.

Microsoft Edge Memory Corruption Vulnerability (CVE-2019-0565) MS Rating: Critical

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. An attacker can exploit the vulnerability to corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user.

Microsoft Edge Privilege Escalation Vulnerability (CVE-2019-0566) MS Rating: Important

A privilege escalation vulnerability exists in the Microsoft Edge Browser Broker COM object. An attacker can exploit the vulnerability to use the Browser Broker COM object to elevate privileges on an affected system.

Internet Explorer Remote Code Execution Vulnerability (CVE-2019-0541) MS Rating: Important

A remote code execution vulnerability exists in the way that Internet Explorer (IE) improperly validates input. An attacker could execute arbitrary code in the context of the current user.

Cumulative Security Update for Microsoft Office

Microsoft XmlDocument Privilege Escalation Vulnerability (CVE-2019-0555) MS Rating: Important

A privilege escalation vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker can exploit this vulnerability to gain elevated privileges and break out of the Edge AppContainer sandbox.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0556) MS Rating: Important

A cross-site scripting vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0557) MS Rating: Important

A cross-site scripting vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Office SharePoint XSS Vulnerability (CVE-2019-0558) MS Rating: Important

A cross-site scripting vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Outlook Information Disclosure Vulnerability (CVE-2019-0559) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Outlook improperly handles certain types of messages. An attacker can exploit this vulnerability to gather information about the victim.

Microsoft Office Information Disclosure Vulnerability (CVE-2019-0560) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory. An attacker can exploit the vulnerability to use the information to compromise the user's computer or data.

Microsoft Word Information Disclosure Vulnerability (CVE-2019-0561) MS Rating: Important

An information disclosure vulnerability exists when Microsoft Word macro buttons are used improperly. An attacker can exploit this vulnerability to read arbitrary files from a targeted system.

Microsoft SharePoint Privilege Escalation Vulnerability (CVE-2019-0562) MS Rating: Important

A privilege escalation vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.

Microsoft Word Remote Code Execution Vulnerability (CVE-2019-0585) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker can exploit the vulnerability to use a specially crafted file to perform actions in the security context of the current user.

Cumulative Security Update for Microsoft Exchange

Microsoft Exchange Memory Corruption Vulnerability (CVE-2019-0586) MS Rating: Important

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker can exploit the vulnerability to run arbitrary code in the context of the System user.

Microsoft Exchange Information Disclosure Vulnerability (CVE-2019-0588) MS Rating: Important

An information disclosure vulnerability exists when the Microsoft Exchange PowerShell API grants calendar contributors more view permissions than intended. To exploit this vulnerability, an attacker would need to be granted contributor access to an Exchange Calendar by an administrator via PowerShell.

Cumulative Security Update for Microsoft Windows Kernel

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0536) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0549) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0554) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system.

Windows Kernel Information Disclosure Vulnerability (CVE-2019-0569) MS Rating: Important

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system.

Cumulative Security Update for Microsoft Windows

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0550) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0551) MS Rating: Critical

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0547) MS Rating: Critical

A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker can exploit the vulnerability to run arbitrary code on the client machine.

Microsoft Windows Privilege Escalation Vulnerability (CVE-2019-0543) MS Rating: Important

A privilege escalation vulnerability exists when Windows improperly handles authentication requests. An attacker can exploit this vulnerability to run processes in an elevated context.

Windows COM Privilege Escalation Vulnerability (CVE-2019-0552) MS Rating: Important

A privilege escalation exists in Windows COM Desktop Broker. An attacker can exploit the vulnerability to run arbitrary code with elevated privileges.

Windows Subsystem for Linux Information Disclosure Vulnerability (CVE-2019-0553) MS Rating: Important

An information disclosure vulnerability exists when Windows Subsystem for Linux improperly handles objects in memory. An attacker can exploit this vulnerability to obtain information to further compromise the user's system.

Windows Runtime Privilege Escalation Vulnerability (CVE-2019-0570) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker can exploit this vulnerability to run arbitrary code in an elevated context.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-0571) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker can exploit this vulnerability to run processes in an elevated context.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-0572) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker can exploit this vulnerability to run processes in an elevated context.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-0573) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker can exploit this vulnerability to run processes in an elevated context.

Windows Data Sharing Service Privilege Escalation Vulnerability (CVE-2019-0574) MS Rating: Important

A privilege escalation vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker can exploit this vulnerability to run processes in an elevated context.

Security Update for Jet Database Engine

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0538) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0575) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0576) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0577) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0578) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0579) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0580) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0581) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0582) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0583) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0584) MS Rating: Important

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker can exploit this vulnerability to execute arbitrary code on a victim system by enticing a victim to open a specially crafted file.

Security Update for Microsoft ASP.NET

ASP.NET Information Disclosure Vulnerability (CVE-2019-0545) MS Rating: Important

An information disclosure vulnerability exists in ASP.NET and ASP.NET Core which allows bypassing Cross-origin Resource Sharing (CORS) configurations. An attacker can exploit the vulnerability to retrieve content, which is normally restricted, from a web application.

ASP.NET Core Denial of Service Vulnerability (CVE-2019-0548) MS Rating: Important

A denial-of-service (DoS) vulnerability exists when ASP.NET Core improperly handles web requests. An attacker can exploit this vulnerability by issuing specially crafted requests to the .NET Core application to cause a denial of service against an ASP.NET Core web application.

ASP.NET Core Denial of Service Vulnerability (CVE-2019-0564) MS Rating: Important

A denial-of-service (DoS) vulnerability exists when ASP.NET Core improperly handles web requests. An attacker can exploit this vulnerability by issuing specially crafted requests to the .NET Core application to cause a denial of service against an ASP.NET Core web application.

Security Update for Visual Studio

Microsoft Visual Studio Information Disclosure Vulnerability (CVE-2019-0537) MS Rating: Important

An information disclosure vulnerability exists when Visual Studio improperly discloses arbitrary file contents if the victim opens a malicious .vscontent file. An attacker can exploit this vulnerability by tricking a user into opening a malicious .vscontent file using a vulnerable version of Visual Studio to view arbitrary file contents from the computer where the victim launched Visual Studio.

Visual Studio Remote Code Execution Vulnerability (CVE-2019-0546) MS Rating: Moderate

A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project. An attacker can exploit the vulnerability to run arbitrary code in the context of the current user.

Security Update for Skype for Android

Skype for Android Elevation of Privilege Vulnerability (CVE-2019-0622) MS Rating: Moderate

A privilege escalation vulnerability exists when Skype for Android fails to properly handle specific authentication requests. An attacker with physical access to the phone can exploit this vulnerability to bypass Android's lockscreen and access a victim's personal information.