Microsoft Issues 9 Critical Security Patches

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft Issues 9 Critical Security Patches


None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.



Today is the second Tuesday of the month, and Microsoft is right on schedule with 59 security fixes, nine of which are considered Critical in severity.
None of the vulnerablities were previously known or exploited, and 49 are ranked Important and one as Moderate. 
The latest release affects Windows, Internet Explorer, Edge, ChakraCore, Microsoft Office and Office Services and Web Apps, Microsoft Dynamics 365, SQL Server Management Studio, Windows Update Assistant, and Open Source Software. Its a smaller-volume roundup compared with many Patch Tuesdays of late:
Septembers
fixed 80 bugs and Augusts
patched
93, including a wormable remote code execution (RCE) flaw. In July, Microsoft
addressed
77 vulnerabilities.
October continued the trend of patching remote desktop vulnerabilities, which have been common the past four months. CVE-2019-1333 is an RCE flaw that exists in the Remote Desktop Client when a user connects with a malicious server. An attacker who successfully exploited the bug could view, change, or delete data; install programs; or create new accounts with user rights.
To exploit
CVE-2019-1333
, an attacker would need to control a server and convince a target to connect using a social engineering scam, DNS poisoning, or a man-in-the-middle attack. They could also compromise a legitimate server, host malicious code on it, and wait for someone to connect to it. Todays patch corrects how Remote Desktop Client handles connection requests.
While this RCE vulnerability is only being disclosed today and attackers havent yet taken advantage of it, Microsoft warns exploitation is more likely for this one. The patch should be applied immediately, says Richard Melick, senior technical product manager at Automox, even though this bug isnt as severe as the remote desktop flaws disclosed back in August.
Lateral access through a network only requires one compromised machine and with this capability in the hands of an attacker, their actions would be masked longer due to the escalated access, Melick says of the implications of this vulnerability in the wrong hands. Even so, the requirement for attackers to convince a target to connect makes this tough to exploit.
Important-ranked patch
CVE-2019-1326
is a Remote Desktop Protocol denial-of-service bug that exists when an attacker connects to the target system using RDP and sends specially crafted requests. If successful, they could cause the RDP service on a target system to stop responding.
Microsoft also re-released CVE-2019-1367, which was first deployed on Sept. 23 as an
out-of-band
patch to address a scripting engine memory corruption vulnerability in Internet Explorer that was under active attack. The bug could let an attacker execute arbitrary code at the same privilege level as a legitimate user and in doing so, install programs, view and change data, and create new accounts with full user rights while the legitimate user is logged in as an admin.
The update to this patch released today addresses a known printing issue some users might have experienced after installing any of the Security Updates, IE Cumulative Updates, or Monthly Rollups released on Sept. 23 or Oct. 3 for Internet Explorer 9, 10, or 11, or Windows.
For those who use the Azure App Service, another RCE vulnerability worth noting is
CVE-2019-1372
. This exists when Azure App Service/Antares on the Azure Stack fails to check the length of a buffer before copying the memory to it. An attacker who successfully exploited this could allow an unprivileged function run by the user to execute code in the context of NT Authority system and escape the sandbox. The patch ensures Azure App Services sanitizes user inputs.
If you have the Azure App Service deployed to your Azure Stack, this patch should be prioritized, says Qualys director of product management Jimmy Graham.
Related Content:
6 Active Directory Security Tips for Your Poor, Neglected AD
Beyond the Horde: The Uptick in Targeted Attacks (And How to Fight Back)
Cybercrime: AIs Growing Threat
Rethinking Cybersecurity Hiring: Dumping Resumes & Other Garbage
Check out 
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
Can the Girl Scouts Save the Moon from Cyberattack?


Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft Issues 9 Critical Security Patches