By Jon Munshaw.
Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. This month's Patch Tuesday covers 98 vulnerabilities, 12 of which are considered critical and 84 that are considered important. There are also two bugs that were not assigned a severity.
This month's patches include updates to the Windows kernel, the Windows scripting engine and Remote Desktop Procol, among other software and features. Microsoft also provided a critical advisory covering updates to Adobe Flash Player.
Talos released a new set of SNORTⓇ rules today that provide coverage for some of these vulnerabilities, which you can see here.
Critical vulnerabilities Microsoft disclosed 12 critical vulnerabilities this month, all of which we will highlight below.
CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713 and CVE-2020-0767 are all memory corruption vulnerabilities in the Microsoft scripting engine that deals with how Internet Explorer handles objects in memory. An attacker could use these vulnerabilities to corrupt memory on the victim machine in a way that would allow them to execute arbitrary code. A user could trigger this bug by visiting an attacker-controlled web page on Internet Explorer that's been specially crafted to exploit this vulnerability. Alternatively, an attacker could embed an ActiveX control marked "safe for initialization" in another application or Microsoft Office document that utilizes the Internet Explorer rendering engine and convince the victim to open that file.
CVE-2020-0681 and CVE-2020-0734 are remote code execution vulnerabilities in Remote Desktop Protocol when the user connects to a malicious server. An attacker can exploit these vulnerabilities by hosting a server, and convincing a user to connect to it, likely via social engineering or a man-in-the-middle technique.
CVE-2020-0662 is a remote code execution vulnerability in Windows 10 and some versions of Windows Server that exists in the way the software handles objects in memory. If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code with elevated permissions on the victim machine. The attacker would need a domain user account, and then create a specially crafted request.
CVE-2020-0729 is a remote code execution vulnerability in Windows that could allow an attacker to remotely execute code if Windows processes a specially crafted .LNK file. An adversary could exploit this vulnerability by sending the user a removable drive or remote share containing a malicious .LNK file and an associated malicious binary. If the user opens the file in Windows Explorer or another application that parses .LNK files, the binary will execute code of the attacker's choice.
CVE-2020-0738 is a memory corruption vulnerability in Windows Media Foundation that exists in the way the software handles objects in memory. An attacker could exploit this bug by convincing the user to open a specially crafted, malicious file or web page, which would corrupt memory in a way the attacker could then install programs, manipulate user data or create new user accounts on the victim machine.
Important vulnerabilities This release also contains 84 important vulnerabilities:
- CVE-2020-0618
- CVE-2020-0655
- CVE-2020-0657
- CVE-2020-0658
- CVE-2020-0659
- CVE-2020-0660
- CVE-2020-0661
- CVE-2020-0663
- CVE-2020-0665
- CVE-2020-0666
- CVE-2020-0667
- CVE-2020-0668
- CVE-2020-0669
- CVE-2020-0670
- CVE-2020-0671
- CVE-2020-0672
- CVE-2020-0675
- CVE-2020-0676
- CVE-2020-0677
- CVE-2020-0678
- CVE-2020-0679
- CVE-2020-0680
- CVE-2020-0682
- CVE-2020-0683
- CVE-2020-0685
- CVE-2020-0686
- CVE-2020-0688
- CVE-2020-0689
- CVE-2020-0691
- CVE-2020-0692
- CVE-2020-0694
- CVE-2020-0695
- CVE-2020-0696
- CVE-2020-0697
- CVE-2020-0698
- CVE-2020-0701
- CVE-2020-0703
- CVE-2020-0704
- CVE-2020-0705
- CVE-2020-0706
- CVE-2020-0707
- CVE-2020-0708
- CVE-2020-0709
- CVE-2020-0714
- CVE-2020-0715
- CVE-2020-0716
- CVE-2020-0717
- CVE-2020-0719
- CVE-2020-0720
- CVE-2020-0721
- CVE-2020-0722
- CVE-2020-0723
- CVE-2020-0724
- CVE-2020-0725
- CVE-2020-0726
- CVE-2020-0727
- CVE-2020-0728
- CVE-2020-0730
- CVE-2020-0731
- CVE-2020-0732
- CVE-2020-0733
- CVE-2020-0735
- CVE-2020-0736
- CVE-2020-0737
- CVE-2020-0739
- CVE-2020-0740
- CVE-2020-0741
- CVE-2020-0742
- CVE-2020-0743
- CVE-2020-0744
- CVE-2020-0745
- CVE-2020-0746
- CVE-2020-0747
- CVE-2020-0748
- CVE-2020-0749
- CVE-2020-0750
- CVE-2020-0751
- CVE-2020-0752
- CVE-2020-0753
- CVE-2020-0754
- CVE-2020-0755
- CVE-2020-0756
- CVE-2020-0759
- CVE-2020-0766
- CVE-2020-0693
- CVE-2020-0702
Coverage In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.
These rules are: 48701, 48702, 53050 - 53056, 53061, 53072, 53073, 53079 - 53089