Tuesday, November 26, 2024
HomeExploitMicrosoft Released Security Updates & Fixed 39 Vulnerabilities Including Active Zero-day

Microsoft Released Security Updates & Fixed 39 Vulnerabilities Including Active Zero-day

Published on

Microsoft released security updates under December Patch Tuesday and fixed several vulnerabilities that affected various Microsoft products.

There are 39 vulnerabilities were addressed including the active zero-day vulnerability that could exploit using malware and attackers execute the code in the kernel.

Following Microsoft products are patched in this December security release along with some of the critical security vulnerabilities.

- Advertisement - SIEM as a Service
  • Adobe Flash Player
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • .NET Framework
  • Microsoft Dynamics NAV
  • Microsoft Exchange Server
  • Microsoft Visual Studio
  • Windows Azure Pack (WAP)

In this case, Microsoft marked 9 vulnerabilities as “critical,” that allow very serious impact and a remote attacker could take over the vulnerable applications and 30 flaws rated as “important”.

CVE-2018-8517, A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application,” . “The vulnerability can be exploited remotely, without authentication.”

Rapid7 reported  Internet Explorer (CVE-2018-8631) and Edge (CVE-2018-8624) which considered by Microsoft that most likely to be exploited.

Microsoft Security Updates

Microsoft Office
Microsoft OfficeCVE-2018-8628Microsoft PowerPoint Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8636Microsoft Excel Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8627Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8598Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8587Microsoft Outlook Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8597Microsoft Excel Remote Code Execution Vulnerability
Microsoft Scripting Engine
Microsoft Scripting EngineCVE-2018-8629Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8643Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8625Windows VBScript Engine Remote Code Execution Vulnerability
Microsoft Scripting EngineCVE-2018-8617Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8583Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8618Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8624Chakra Scripting Engine Memory Corruption Vulnerability
Windows Kernel
Windows KernelCVE-2018-8477Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8621Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8612Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Windows KernelCVE-2018-8611Windows Kernel Elevation of Privilege Vulnerability
Windows KernelCVE-2018-8622Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8637Win32k Information Disclosure Vulnerability
Microsoft Office SharePoint
Microsoft Office SharePointCVE-2018-8635Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft Office SharePointCVE-2018-8580Microsoft SharePoint Information Disclosure Vulnerability
Microsoft Windows DNS
Microsoft Windows DNSCVE-2018-8514Remote Procedure Call runtime Information Disclosure Vulnerability
Microsoft Windows DNSCVE-2018-8626Windows DNS Server Heap Overflow Vulnerability
NET Framework
.NET FrameworkCVE-2018-8517.NET Framework Denial Of Service Vulnerability
.NET FrameworkCVE-2018-8540.NET Framework Remote Code Injection Vulnerability

Adobe Flash Player

Adobe Flash PlayerADV180031December 2018 Adobe Flash Security Update

Other Vulnerabilities

Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability
Visual StudioCVE-2018-8599Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Authentication MethodsCVE-2018-8634Microsoft Text-To-Speech Remote Code Execution Vulnerability
Windows Azure PackCVE-2018-8652Windows Azure Pack Cross Site Scripting Vulnerability
Windows Kernel-Mode DriversCVE-2018-8641Win32k Elevation of Privilege Vulnerability
Internet ExplorerCVE-2018-8619Internet Explorer Remote Code Execution Vulnerability
Internet ExplorerCVE-2018-8631Internet Explorer Memory Corruption Vulnerability
Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability

Also Read:

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team...

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

Hackers Abuse EDRSilencer Red Team Tool To Evade Detection

EDRSilencer, a red team tool, interferes with EDR solutions by blocking network communication for...