This Tuesday, Microsoft has rolled-out its scheduled monthly updates for 80 different bugs. Notably, the September Patch Tuesday update bundle from Microsoft brings fixes for two zero-day bugs under active exploit.
Patches For Actively Exploited Zero-Day Vulnerabilities
The most noteworthy fixes in Microsoft September Patch Tuesday bundle includes ones for two zero-day bugs under active exploit.
These two zero-days precisely are privilege escalation bugs. While both of these attained important severity rating, they became a problem owing to their active exploitation in the wild.
The first of these is an EoP in the Windows Common Log File System Driver (CVE-2019-1214). The bug existed due to improper object handling in the memory by Windows CLFS. Upon an exploit, the flaw could let an attacker execute processes with elevated user privileges. Regarding the exploit condition, Microsoft stated in their advisory,
To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.
Whereas, the other EoP existed in the ws2ifsl.sys (Winsock) owing to improper object handling in memory. Regarding this Windows vulnerability (CVE-2019-1215), Microsoft explained in the advisory,
An attacker who successfully exploited the vulnerability could execute code with elevated privileges.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
Other Microsoft September Patch Tuesday Updates
Apart from the two zero-days, Microsoft has also patched 79 other bugs with this update bundle. These include 17 critical vulnerabilities that could allow remote code execution upon exploit. Of these, 4 existed in the Remote Desktop Client, 5 in the Chakra Scripting Engine, 2 in VBScript, 3 in Microsoft SharePoint, and 1 RCE bug each in Scripting Engine, .LNK file processing, and Azure DevOps Server (ADO) and Team Foundation Server (TFS).
Microsoft also fixed 60 other important severity bugs in various products. These bugs, upon exploit, could result in information disclosure, spoofing, elevation of privileges, or even remote code execution.
In addition, Microsoft also patched a moderate severity spoofing vulnerability (CVE-2019-1259), in Microsoft SharePoint.
In August, Microsoft addressed 93 vulnerabilities with its Patch Tuesday bundle, more than the ones addressed this month. However, the previous month’s patches did not include any actively exploited bugs.
Make sure to update your systems at the earliest to stay protected from potential attacks.
Latest posts by Abeerah Hashim (see all)
- WolfRAT Malware Targets Messengers Apps On Android Devices - May 21, 2020
- How DDoS Attacks Are Evolving In 2020 - May 20, 2020
- Review Of KeepSolid Smart DNS – A Quick Way To Bypass Georestrictions - May 20, 2020