Cloud

6/12/2018
04:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Microsoft Fixes 11 Critical, 39 Important Vulns

The most critical vulnerability, experts say, affects Windows Domain Name Systems, while another lets attackers hack Cortana from the lock screen.

Another month, another Patch Tuesday update. Microsoft today released 50 security fixes for problems in ChakraCore, Hyper-V Server, Windows, Microsoft Office, and Office Services. Of these, 11 are rated as Critical severity and 39 are ranked Important.

None of the bugs were under active attack at the time fixes were released, though one was publicly known. CVE-2018-8267, a scripting engine memory corruption vulnerability, is considered Critical and could corrupt memory in a way that a successful attacker could gain the rights of a current user and assume control over an affected system.

Microsoft also released updates for Speculative Store Bypass, otherwise known as Spectre Variant 4, discovered in May. Today's patches provide Windows support for Speculative Store Bypass Disable (SSBD) for Intel processors but require microcode/firmware and registry updates to fully protect against Variant 4.

Security pros point to the importance of CVE-2018-8225, a Windows DNSAPI remote code execution vulnerability that "clearly wins for most critical this month," according to researchers at Trend Micro's Zero-Day Initiative (ZDI). The flaw exists in the Windows Domain Name System (DNS) when it fails to properly handle DNS responses.

If successfully exploited, the bug could let someone run arbitrary code in the context of the Local System Account. An attacker would have to use a malicious DNS server to transmit corrupted DNS responses to the target, Microsoft explains. They could try to man-in-the-middle a legitimate query or trick a DNS server into querying a malicious server. It can be done from the command line or scripted, ZDI researchers explain.

"This means there’s a SYSTEM-level bug in a listening service on critical infrastructure servers, which also means this is wormable," they explain. "'Patch Now' doesn't even seem forceful enough. I have the sense we'll be hearing about this bug for a while."

Another critical bug worth noting is CVE-2018-8231, an HTTP protocol stack remote code execution vulnerability affecting the Web server component http.sys. An attacker could use code execution to remotely send a malformed packet to a target server and execute code with the same level of privilege as http.sys.

An interesting, though not critical, vulnerability in Windows 10 lets attackers bypass the lock screen through a default configuration for Cortana. Microsoft's voice assistant lets anyone interact by saying "Hey, Cortana" while the device is locked, McAfee researchers discovered.

CVE-2018-8140 could let an attacker execute commands via mouse, touchpad, or touchscreen to access data. If you're close enough to a machine to speak with Cortana, you're close enough to query a full menu of documents and execute programs with elevated privileges. Physical access is needed to exploit CVE-2018-8140, and experts don't think remote attacks are likely. However, the bug is worth noting as people bring voice assistants into their homes and offices.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
joe9804
50%
50%
joe9804,
User Rank: Apprentice
6/12/2018 | 6:50:37 PM
More information
At last Microsoft fixed the bugs. It was much needed step they have taken. many people facing the problem with this bugs. I was one of them. But I can't understand where is the problem. So I contact Netgear Router Support USA. They tell me the problem and then I can understand the main problem.
RosanaXayaraj
50%
50%
RosanaXayaraj,
User Rank: Apprentice
6/19/2018 | 3:34:05 PM
Re: More information
Thanks
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.