Microsoft Released new security update under patch Tuesday for July 2019 with the fixes of more than 70 security vulnerabilities that affected several Microsoft Products.
Microsoft’s July security patch release applied to the vulnerabilities that resides in the following Microsoft software.
- Microsoft Windows
- Internet Explorer
- Microsoft Edge
- Microsoft Office and Microsoft Office Services and Web Apps
- Azure DevOps
- Open Source Software
- .NET Framework
- Azure
- SQL Server
- ASP.NET
- Visual Studio
- Microsoft Exchange Server
Totally 77 vulnerabilities are fixed under this June security update includes, 15 critical severity and 2 actively exploited Zero-day vulnerabilities.
First Zero-day is an Elevation of Privilege Vulnerability that resides in the Win32k component due to improperly objects handle in memory.
An attacker who successfully exploits this vulnerability (CVE-2019-1132) could lead to executing the arbitrary code in kernel mode eventually take control of an affected system and the flaw reported by Anton Cherepanov, Malware Researcher of ESET.
Second zero-day is a local privilege escalation vulnerability (CVE-2019-0880) existing in the splwow64.exe when it handles specific calls. if the vulnerability exploited, an attacker could elevate privileges on an affected system from low-integrity and the vulnerability reported by Gene Yoo from ReSecurity.
Among 15 Critical Vulnerabilities, 11 vulnerabilities are based on scripting engines and browsers (Internet Explorer and Edge), rest of the 4 vulnerability affected the DHCP Server, GDI+, the .NET Framework and the Azure DevOps Server.
Microsoft also fixed the SanboxEscaper publicly disclosed Windows 10 Zero-day, a local privilege escalation vulnerability(CVE-2019-1130) that resides in the Windows AppX Deployment Service when it improperly handles hard links.
Another one of the most critical vulnerability is DHCP Server bug (CVE-2019-0785). a remote code-execution (RCE) let attacker with network access to the failover DHCP server could run arbitrary code.
In this Microsoft Security Update for July, patch applied for several other vulnerabilities including XSS, Remote Code Execution, Memory Corruption Token Authentication Bypass, Denial of Service, Spoofing, Information Disclosure, and Token Authentication Bypass.
You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the July 2019 Patch here.
Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.