Sunday, July 14, 2024
EHA

Microsoft Released Security Updates & Fixed 39 Vulnerabilities Including Active Zero-day

Microsoft released security updates under December Patch Tuesday and fixed several vulnerabilities that affected various Microsoft products.

There are 39 vulnerabilities were addressed including the active zero-day vulnerability that could exploit using malware and attackers execute the code in the kernel.

Following Microsoft products are patched in this December security release along with some of the critical security vulnerabilities.

  • Adobe Flash Player
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • .NET Framework
  • Microsoft Dynamics NAV
  • Microsoft Exchange Server
  • Microsoft Visual Studio
  • Windows Azure Pack (WAP)

In this case, Microsoft marked 9 vulnerabilities as “critical,” that allow very serious impact and a remote attacker could take over the vulnerable applications and 30 flaws rated as “important”.

CVE-2018-8517, A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application,” . “The vulnerability can be exploited remotely, without authentication.”

Rapid7 reported  Internet Explorer (CVE-2018-8631) and Edge (CVE-2018-8624) which considered by Microsoft that most likely to be exploited.

Microsoft Security Updates

Microsoft Office
Microsoft OfficeCVE-2018-8628Microsoft PowerPoint Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8636Microsoft Excel Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8627Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8598Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8587Microsoft Outlook Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8597Microsoft Excel Remote Code Execution Vulnerability
Microsoft Scripting Engine
Microsoft Scripting EngineCVE-2018-8629Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8643Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8625Windows VBScript Engine Remote Code Execution Vulnerability
Microsoft Scripting EngineCVE-2018-8617Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8583Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8618Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8624Chakra Scripting Engine Memory Corruption Vulnerability
Windows Kernel
Windows KernelCVE-2018-8477Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8621Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8612Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Windows KernelCVE-2018-8611Windows Kernel Elevation of Privilege Vulnerability
Windows KernelCVE-2018-8622Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8637Win32k Information Disclosure Vulnerability
Microsoft Office SharePoint
Microsoft Office SharePointCVE-2018-8635Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft Office SharePointCVE-2018-8580Microsoft SharePoint Information Disclosure Vulnerability
Microsoft Windows DNS
Microsoft Windows DNSCVE-2018-8514Remote Procedure Call runtime Information Disclosure Vulnerability
Microsoft Windows DNSCVE-2018-8626Windows DNS Server Heap Overflow Vulnerability
NET Framework
.NET FrameworkCVE-2018-8517.NET Framework Denial Of Service Vulnerability
.NET FrameworkCVE-2018-8540.NET Framework Remote Code Injection Vulnerability

Adobe Flash Player

Adobe Flash PlayerADV180031December 2018 Adobe Flash Security Update

Other Vulnerabilities

Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability
Visual StudioCVE-2018-8599Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Authentication MethodsCVE-2018-8634Microsoft Text-To-Speech Remote Code Execution Vulnerability
Windows Azure PackCVE-2018-8652Windows Azure Pack Cross Site Scripting Vulnerability
Windows Kernel-Mode DriversCVE-2018-8641Win32k Elevation of Privilege Vulnerability
Internet ExplorerCVE-2018-8619Internet Explorer Remote Code Execution Vulnerability
Internet ExplorerCVE-2018-8631Internet Explorer Memory Corruption Vulnerability
Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability

Also Read:

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Website

Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles