Wednesday, February 21, 2024

Microsoft Released Security Updates & Fixed 39 Vulnerabilities Including Active Zero-day

Microsoft released security updates under December Patch Tuesday and fixed several vulnerabilities that affected various Microsoft products.

There are 39 vulnerabilities were addressed including the active zero-day vulnerability that could exploit using malware and attackers execute the code in the kernel.

Following Microsoft products are patched in this December security release along with some of the critical security vulnerabilities.

  • Adobe Flash Player
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • .NET Framework
  • Microsoft Dynamics NAV
  • Microsoft Exchange Server
  • Microsoft Visual Studio
  • Windows Azure Pack (WAP)

In this case, Microsoft marked 9 vulnerabilities as “critical,” that allow very serious impact and a remote attacker could take over the vulnerable applications and 30 flaws rated as “important”.

CVE-2018-8517, A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application,” . “The vulnerability can be exploited remotely, without authentication.”

Rapid7 reported  Internet Explorer (CVE-2018-8631) and Edge (CVE-2018-8624) which considered by Microsoft that most likely to be exploited.

Microsoft Security Updates

Microsoft Office
Microsoft OfficeCVE-2018-8628Microsoft PowerPoint Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8636Microsoft Excel Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8627Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8598Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8587Microsoft Outlook Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8597Microsoft Excel Remote Code Execution Vulnerability
Microsoft Scripting Engine
Microsoft Scripting EngineCVE-2018-8629Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8643Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8625Windows VBScript Engine Remote Code Execution Vulnerability
Microsoft Scripting EngineCVE-2018-8617Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8583Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8618Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8624Chakra Scripting Engine Memory Corruption Vulnerability
Windows Kernel
Windows KernelCVE-2018-8477Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8621Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8612Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Windows KernelCVE-2018-8611Windows Kernel Elevation of Privilege Vulnerability
Windows KernelCVE-2018-8622Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8637Win32k Information Disclosure Vulnerability
Microsoft Office SharePoint
Microsoft Office SharePointCVE-2018-8635Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft Office SharePointCVE-2018-8580Microsoft SharePoint Information Disclosure Vulnerability
Microsoft Windows DNS
Microsoft Windows DNSCVE-2018-8514Remote Procedure Call runtime Information Disclosure Vulnerability
Microsoft Windows DNSCVE-2018-8626Windows DNS Server Heap Overflow Vulnerability
NET Framework
.NET FrameworkCVE-2018-8517.NET Framework Denial Of Service Vulnerability
.NET FrameworkCVE-2018-8540.NET Framework Remote Code Injection Vulnerability

Adobe Flash Player

Adobe Flash PlayerADV180031December 2018 Adobe Flash Security Update

Other Vulnerabilities

Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability
Visual StudioCVE-2018-8599Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Authentication MethodsCVE-2018-8634Microsoft Text-To-Speech Remote Code Execution Vulnerability
Windows Azure PackCVE-2018-8652Windows Azure Pack Cross Site Scripting Vulnerability
Windows Kernel-Mode DriversCVE-2018-8641Win32k Elevation of Privilege Vulnerability
Internet ExplorerCVE-2018-8619Internet Explorer Remote Code Execution Vulnerability
Internet ExplorerCVE-2018-8631Internet Explorer Memory Corruption Vulnerability
Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability

Also Read:

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Website

Latest articles

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged....

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for...

New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency

The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on...

Security Onion 2.4.50 Released for Defenders With New Features

Security Onion Solutions has recently rolled out the latest version of its network security...

VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks

VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin...

LockBit Ransomware Members Charged by Authorities, Free Decryptor Released

In a significant blow to one of the most prolific ransomware operations, authorities from...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles