Cloud

6/12/2018
04:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Microsoft Fixes 11 Critical, 39 Important Vulns

The most critical vulnerability, experts say, affects Windows Domain Name Systems, while another lets attackers hack Cortana from the lock screen.

Another month, another Patch Tuesday update. Microsoft today released 50 security fixes for problems in ChakraCore, Hyper-V Server, Windows, Microsoft Office, and Office Services. Of these, 11 are rated as Critical severity and 39 are ranked Important.

None of the bugs were under active attack at the time fixes were released, though one was publicly known. CVE-2018-8267, a scripting engine memory corruption vulnerability, is considered Critical and could corrupt memory in a way that a successful attacker could gain the rights of a current user and assume control over an affected system.

Microsoft also released updates for Speculative Store Bypass, otherwise known as Spectre Variant 4, discovered in May. Today's patches provide Windows support for Speculative Store Bypass Disable (SSBD) for Intel processors but require microcode/firmware and registry updates to fully protect against Variant 4.

Security pros point to the importance of CVE-2018-8225, a Windows DNSAPI remote code execution vulnerability that "clearly wins for most critical this month," according to researchers at Trend Micro's Zero-Day Initiative (ZDI). The flaw exists in the Windows Domain Name System (DNS) when it fails to properly handle DNS responses.

If successfully exploited, the bug could let someone run arbitrary code in the context of the Local System Account. An attacker would have to use a malicious DNS server to transmit corrupted DNS responses to the target, Microsoft explains. They could try to man-in-the-middle a legitimate query or trick a DNS server into querying a malicious server. It can be done from the command line or scripted, ZDI researchers explain.

"This means there’s a SYSTEM-level bug in a listening service on critical infrastructure servers, which also means this is wormable," they explain. "'Patch Now' doesn't even seem forceful enough. I have the sense we'll be hearing about this bug for a while."

Another critical bug worth noting is CVE-2018-8231, an HTTP protocol stack remote code execution vulnerability affecting the Web server component http.sys. An attacker could use code execution to remotely send a malformed packet to a target server and execute code with the same level of privilege as http.sys.

An interesting, though not critical, vulnerability in Windows 10 lets attackers bypass the lock screen through a default configuration for Cortana. Microsoft's voice assistant lets anyone interact by saying "Hey, Cortana" while the device is locked, McAfee researchers discovered.

CVE-2018-8140 could let an attacker execute commands via mouse, touchpad, or touchscreen to access data. If you're close enough to a machine to speak with Cortana, you're close enough to query a full menu of documents and execute programs with elevated privileges. Physical access is needed to exploit CVE-2018-8140, and experts don't think remote attacks are likely. However, the bug is worth noting as people bring voice assistants into their homes and offices.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RosanaXayaraj
50%
50%
RosanaXayaraj,
User Rank: Apprentice
6/19/2018 | 3:34:05 PM
Re: More information
Thanks
joe9804
50%
50%
joe9804,
User Rank: Apprentice
6/12/2018 | 6:50:37 PM
More information
At last Microsoft fixed the bugs. It was much needed step they have taken. many people facing the problem with this bugs. I was one of them. But I can't understand where is the problem. So I contact Netgear Router Support USA. They tell me the problem and then I can understand the main problem.
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3937
PUBLISHED: 2018-08-14
An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability...
CVE-2018-3938
PUBLISHED: 2018-08-14
An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST r...
CVE-2018-12537
PUBLISHED: 2018-08-14
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
CVE-2018-12539
PUBLISHED: 2018-08-14
In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows,...
CVE-2018-3615
PUBLISHED: 2018-08-14
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.