Tuesday, May 28, 2024

Microsoft Security Update Fixed 59 Vulnerabilities Including Multiple Critical Severity Bugs – Update Now!!

Microsoft released a security update under patch Tuesday for October and fixed 59 vulnerabilities that affected various Microsoft products.

Out of 59 vulnerabilities, 9 marked as “Critical” severity mainly affected the MS office and rest of the vulnerabilities categorized under “Important” and “Moderate” severity.

In the “important” severity category, Microsoft patched 20 vulnerabilities that allow attackers to perform elevation of privileges on vulnerable Microsoft products.

This October security update covers nine Microsoft products of the following:

  • Microsoft Windows
  • Internet Explorer
  • Microsoft Edge (EdgeHTML-based)
  • ChakraCore
  • Microsoft Office and Microsoft Office Services and Web Apps
  • SQL Server Management Studio
  • Open Source Software
  • Microsoft Dynamics 365
  • Windows Update Assistant

Remote Code Execution – Remote Desktop Client

In “critical” severity categories, Microsoft fixed a Remote Desktop Client Remote Code Execution Vulnerability (CVE-2019-1333) that affected hundreds of millions of Windows computers the same as Bluekeep vulnerability that we have reported in July. unlike infamous Bluekeep, it requires user interaction to exploit the bug.

An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client.

Remote Code Execution – Chakra Scripting Engine

4 critical memory corruption remote code execution vulnerabilities ( CVE-2019-1307, CVE-2019-1308, CVE-2019-1335, and CVE-2019-1366) are patched in the Chakra Scripting Engine, a JavaScript engine developed by Microsoft for its Microsoft Edge web browser.

The vulnerability corrupts the memory in the script engine in such a way that an attacker could execute arbitrary code in the context of the current user.

If the user logged the system as an administrator, The attacker who successfully exploited the vulnerability could take control of an affected system.

Remote Code Execution – Microsoft Excel

In this Microsoft Patch Tuesday update, Another 2 ( CVE-2019-1327CVE-2019-1331) Critical remote code execution vulnerabilities are fixed that affected Microsoft Excel, which allows an attacker to execute the arbitrary code in the context of the current user to perform a denial of service.

The vulnerability existing the Microsoft Excel software due to improperly handle objects in memory and the successful exploit allows an attacker to install programs; view, change, or delete data; or create new accounts with full user rights.

It could be achieved by attackers through trick user open a specially crafted file with an affected version of Microsoft Excel.

Remote Code Execution – Azure App Service

Another remote code execution vulnerability(CVE-2019-1372) affected Microsoft Azure App service, let an attacker exploit the vulnerability, and execute code in the context of NT AUTHORITY\system, thereby escaping the Sandbox an unprivileged function.

The RCE vulnerability affected the Azure App service because Azure Stack fails to check the length of a buffer prior to copying memory to it.

No Zero-day

Unlike previous Patch Tuesday update that released in September and August, There is no zero-day vulnerability fixed, and no active exploit have seen in the wide in this October Tuesday update.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the August 2019 Patch here.


Latest articles

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting...

Google Patches Chrome Zero-Day: Type Confusion in V8 JavaScript

Google has released a patch for a zero-day exploit in its Chrome browser.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles