Date:11/07/19
Patch Tuesday updates for July 2019 fixed security issued in numerous products of the tech giant, including Windows operating systems, Internet Explorer, Edge, Office, Azure DevOps, Open Source Software, .NET Framework, Azure, SQL Server, ASP.NET, Visual Studio, and Exchange Server.
All the 14 critical vulnerabilities addressed by Microsoft are remote code execution issues affecting various products, including Internet Explorer and Edge to Windows Server DHCP, Azure DevOps and Team Foundation Servers.
Technical details for six important security flaws were publicly disclosed before a patch was released, fortunately, there is no news of the exploitation of the flaws in the wild.
Microsoft also addressed two privilege escalation flaws actively exploited in the wild.
The first one, tracked as CVE-2019-1132, affects the Win32k component and could be exploited to run arbitrary code in kernel mode.
“An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.” reads the security advisory.
“To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.”
The second one, tracked as CVE-2019.0880, affects Windows 7 and Server 2008. The issue resides in the way splwow64 (Thunking Spooler APIs) handles certain calls.
“A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.” reads the advisory.
“This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.”
Important-rated security flaws include remote code execution vulnerabilities, privilege escalation issues, information disclosure, cross-site scripting (XSS), security feature bypass, spoofing, and denial of service flaws.
Microsoft released Patch Tuesday security updates for July 2019
Microsoft released Patch Tuesday updates for July 2019 that address a total of 77 vulnerabilities, 14 rated as Critical, 62 as Important, and only 1 as Moderate in severity.Patch Tuesday updates for July 2019 fixed security issued in numerous products of the tech giant, including Windows operating systems, Internet Explorer, Edge, Office, Azure DevOps, Open Source Software, .NET Framework, Azure, SQL Server, ASP.NET, Visual Studio, and Exchange Server.
All the 14 critical vulnerabilities addressed by Microsoft are remote code execution issues affecting various products, including Internet Explorer and Edge to Windows Server DHCP, Azure DevOps and Team Foundation Servers.
Technical details for six important security flaws were publicly disclosed before a patch was released, fortunately, there is no news of the exploitation of the flaws in the wild.
Microsoft also addressed two privilege escalation flaws actively exploited in the wild.
The first one, tracked as CVE-2019-1132, affects the Win32k component and could be exploited to run arbitrary code in kernel mode.
“An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.” reads the security advisory.
“To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.”
The second one, tracked as CVE-2019.0880, affects Windows 7 and Server 2008. The issue resides in the way splwow64 (Thunking Spooler APIs) handles certain calls.
“A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.” reads the advisory.
“This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.”
Important-rated security flaws include remote code execution vulnerabilities, privilege escalation issues, information disclosure, cross-site scripting (XSS), security feature bypass, spoofing, and denial of service flaws.
Views: 498
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World