Saturday, April 13, 2024

Microsoft Released Security Update For July With the Fixes of 2 Actively Exploited Zero-Day Vulnerabilities – Update Now

Microsoft Released new security update under patch Tuesday for July 2019 with the fixes of more than 70 security vulnerabilities that affected several Microsoft Products.

Microsoft’s July security patch release applied to the vulnerabilities that resides in the following Microsoft software.

  • Microsoft Windows
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Azure DevOps
  • Open Source Software
  • .NET Framework
  • Azure
  • SQL Server
  • ASP.NET
  • Visual Studio
  • Microsoft Exchange Server

Totally 77 vulnerabilities are fixed under this June security update includes, 15 critical severity and 2 actively exploited Zero-day vulnerabilities.

First Zero-day is an Elevation of Privilege Vulnerability that resides in the Win32k component due to improperly objects handle in memory.

An attacker who successfully exploits this vulnerability (CVE-2019-1132) could lead to executing the arbitrary code in kernel mode eventually take control of an affected system and the flaw reported by Anton Cherepanov, Malware Researcher of ESET.

Second zero-day is a local privilege escalation vulnerability (CVE-2019-0880) existing in the splwow64.exe when it handles specific calls. if the vulnerability exploited, an attacker could elevate privileges on an affected system from low-integrity and the vulnerability reported by Gene Yoo from ReSecurity.

Among 15 Critical Vulnerabilities, 11 vulnerabilities are based on scripting engines and browsers (Internet Explorer and Edge), rest of the 4 vulnerability affected the DHCP Server, GDI+, the .NET Framework and the Azure DevOps Server.

Microsoft also fixed the SanboxEscaper publicly disclosed Windows 10 Zero-day, a local privilege escalation vulnerability(CVE-2019-1130) that resides in the Windows AppX Deployment Service when it improperly handles hard links.

Another one of the most critical vulnerability is DHCP Server bug (CVE-2019-0785). a remote code-execution (RCE) let attacker with network access to the failover DHCP server could run arbitrary code.

In this Microsoft Security Update for July, patch applied for several other vulnerabilities including XSS, Remote Code Execution, Memory Corruption Token Authentication Bypass, Denial of Service, Spoofing, Information Disclosure, and Token Authentication Bypass.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the July 2019 Patch here.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Website

Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles