By Jon Munshaw.
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of which are considered "critical," with the rest being deemed "important."
This month’s security update covers security issues in a variety of Microsoft services and software, including the Scripting Engine, the Windows Hyper-V hypervisor, and Win32. Cisco Talos discovered one of these vulnerabilities, CVE-2019-1448 —a remote code execution vulnerability in Microsoft Excel. For more on this bug, read our full Vulnerability Spotlight here. We are also disclosing a remote code execution vulnerability in Microsoft Media Foundation.
Talos also released a new set of SNORTⓇ rules that provide coverage for some of these vulnerabilities. For more, check out the Snort blog post here.
Critical vulnerabilities Microsoft disclosed 13 critical vulnerabilities this month, nine of which we will highlight below.
CVE-2019-0721, CVE-2019-1389, CVE-2019-1397 and CVE-2019-1398 are all vulnerabilities in Windows Hyper-V that could allow an attacker to remotely execute code on the victim machine. These bugs arise when Hyper-V on a host server improperly validates input from an authenticated user on a guest operating system. An attacker can exploit these vulnerabilities by running a specially crafted application on a guest OS. This could allow a malicious user to escape the hypervisor or a sandbox.
CVE-2019-1390 is a remote code execution vulnerability in VBScript. This vulnerability could allow an attacker to corrupt memory in a way that would enable them to execute remote code in the context of the current user. A user could trigger this vulnerability by visiting an attacker-created website while using the Internet Explorer browser, or by opening an Office document or application that contains an ActiveX control marked "safe for initialization."
CVE-2019-1426, CVE-2019-1427, CVE-2019-1428 and CVE-2019-1429 are memory corruption vulnerabilities in the Microsoft Scripting Engine that could lead to remote code execution. The bugs exist in the way the Microsoft Edge web browser handles objects in memory. A user could trigger these vulnerabilities by visiting an attacker-controlled website in Edge.
The four other critical vulnerabilities are:
Important vulnerabilities This release also contains 62 important vulnerabilities, one of which we will highlight below.
CVE-2019-1020 is a security feature bypass vulnerability in the Windows secure boot process. An attacker could run a specially crafted application to bypass secure boot and load malicious software. This security update fixes the issue by blocking vulnerable third-party bootloaders. An update also needs to be applied to Windows Defender.
The other important vulnerabilities are:
- CVE-2018-12207
- CVE-2019-0712
- CVE-2019-11135
- CVE-2019-1234
- CVE-2019-1309
- CVE-2019-1310
- CVE-2019-1324
- CVE-2019-1370
- CVE-2019-1374
- CVE-2019-1379
- CVE-2019-1380
- CVE-2019-1381
- CVE-2019-1382
- CVE-2019-1383
- CVE-2019-1384
- CVE-2019-1385
- CVE-2019-1388
- CVE-2019-1391
- CVE-2019-1392
- CVE-2019-1393
- CVE-2019-1394
- CVE-2019-1395
- CVE-2019-1396
- CVE-2019-1399
- CVE-2019-1402
- CVE-2019-1405
- CVE-2019-1406
- CVE-2019-1407
- CVE-2019-1408
- CVE-2019-1409
- CVE-2019-1411
- CVE-2019-1412
- CVE-2019-1413
- CVE-2019-1415
- CVE-2019-1416
- CVE-2019-1417
- CVE-2019-1418
- CVE-2019-1420
- CVE-2019-1422
- CVE-2019-1423
- CVE-2019-1424
- CVE-2019-1425
- CVE-2019-1432
- CVE-2019-1433
- CVE-2019-1434
- CVE-2019-1435
- CVE-2019-1436
- CVE-2019-1437
- CVE-2019-1438
- CVE-2019-1439
- CVE-2019-1440
- CVE-2019-1442
- CVE-2019-1443
- CVE-2019-1445
- CVE-2019-1446
- CVE-2019-1447
- CVE-2019-1448
- CVE-2019-1449
- CVE-2019-1456
- CVE-2019-0721
- CVE-2019-1373
Coverage In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.
These rules are: 46548, 46549, 52205 - 52209, 52212, 52213, 52216, 52217 - 52225, 52228 - 52234, 52239, 52240