Sunday, December 29, 2024
HomeMicrosoftMicrosoft Released Security Update For July With the Fixes of 2 Actively...

Microsoft Released Security Update For July With the Fixes of 2 Actively Exploited Zero-Day Vulnerabilities – Update Now

Published on

SIEM as a Service

Microsoft Released new security update under patch Tuesday for July 2019 with the fixes of more than 70 security vulnerabilities that affected several Microsoft Products.

Microsoft’s July security patch release applied to the vulnerabilities that resides in the following Microsoft software.

  • Microsoft Windows
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Azure DevOps
  • Open Source Software
  • .NET Framework
  • Azure
  • SQL Server
  • ASP.NET
  • Visual Studio
  • Microsoft Exchange Server

Totally 77 vulnerabilities are fixed under this June security update includes, 15 critical severity and 2 actively exploited Zero-day vulnerabilities.

- Advertisement - SIEM as a Service

First Zero-day is an Elevation of Privilege Vulnerability that resides in the Win32k component due to improperly objects handle in memory.

An attacker who successfully exploits this vulnerability (CVE-2019-1132) could lead to executing the arbitrary code in kernel mode eventually take control of an affected system and the flaw reported by Anton Cherepanov, Malware Researcher of ESET.

Second zero-day is a local privilege escalation vulnerability (CVE-2019-0880) existing in the splwow64.exe when it handles specific calls. if the vulnerability exploited, an attacker could elevate privileges on an affected system from low-integrity and the vulnerability reported by Gene Yoo from ReSecurity.

Among 15 Critical Vulnerabilities, 11 vulnerabilities are based on scripting engines and browsers (Internet Explorer and Edge), rest of the 4 vulnerability affected the DHCP Server, GDI+, the .NET Framework and the Azure DevOps Server.

Microsoft also fixed the SanboxEscaper publicly disclosed Windows 10 Zero-day, a local privilege escalation vulnerability(CVE-2019-1130) that resides in the Windows AppX Deployment Service when it improperly handles hard links.

Another one of the most critical vulnerability is DHCP Server bug (CVE-2019-0785). a remote code-execution (RCE) let attacker with network access to the failover DHCP server could run arbitrary code.

In this Microsoft Security Update for July, patch applied for several other vulnerabilities including XSS, Remote Code Execution, Memory Corruption Token Authentication Bypass, Denial of Service, Spoofing, Information Disclosure, and Token Authentication Bypass.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the July 2019 Patch here.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

CISA Releases Secure Practices for Microsoft 365 Cloud Services

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01:...

CISA Warns of Adobe & Windows Kernel Driver Vulnerabilities Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two...

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams...