Microsoft has launched its month-to-month scheduled updates for various merchandise this week. As soon as once more, the tech big mounted two zero-day bugs beneath lively exploit within the wild. The Microsoft July Patch Tuesday bundle addressed 15 vital vulnerabilities with a complete of 78 bug fixes in all.
Actively Exploited Zero-Day Bugs Mounted
The Microsoft July Patch Tuesday replace bundle holds significance for fixing actively exploited zero-days. These two zero-day bugs have been beneath lively exploits by Russian hackers.
The primary of those is a Win32ok elevation of privilege vulnerability (CVE-2019-1132). Describing this vulnerability within the advisory, Microsoft acknowledged,
An elevation of privilege vulnerability exists in Home windows when the Win32ok element fails to correctly deal with objects in reminiscence. An attacker who efficiently exploited this vulnerability might run arbitrary code in kernel mode. An attacker might then set up packages; view, change, or delete information; or create new accounts with full consumer rights.
To take advantage of the flaw, merely had to go online to the goal system and run a specifically crafted app.
As reported by the researcher Anton Cherepanov from ESET, the vulnerability was beneath lively exploits in Japanese Europe, as found in June 2019. Explaining in regards to the exploit in his blog, he acknowledged that the flaw affected Home windows 7 (SP-1) and Home windows Server 2008 (SP 1 and a couple of).
The opposite zero-day vulnerability included an area elevation of privilege in the best way Microsoft splwow64 handles some calls. As acknowledged in Microsoft’s advisory,
An attacker who efficiently exploited the vulnerability might elevate privileges on an affected system from low-integrity to medium-integrity.
This flaw (CVE-2019-0880) might result in distant code execution as effectively when exploited along with one other flaw.
15 Crucial Safety Fixes Rolled-Out
Along with the 2 important-severity zero-days mentioned above, Microsoft additionally launched fixes for 15 vital safety flaws. All of those might enable distant code execution by an adversary upon an exploit. A few of the notable ones embody a reminiscence corruption vulnerability in Home windows DHCP Server (CVE-2019-0785), and RCE flaws in Azure DevOps Server and Crew Basis Server (CVE-2019-1072), GDI+ (CVE-2019-1102), and .NET Framework (CVE-2019-1113).
Moreover, Microsoft additionally patched four reminiscence corruption vulnerabilities in Scripting Engine, 5 reminiscence corruption flaws in Chakra Scripting Engine, and 1 reminiscence corruption vulnerability every in Web Explorer and Microsoft browser.
Patches For Essential Publicly Disclosed Vulnerabilities
With July updates, Microsoft additionally patched 6 vulnerabilities that had been disclosed publicly.
Exactly, these embody elevation of privilege vulnerabilities in Docker (CVE-2018-15664), Azure Automation (CVE-2019-0962) and Home windows AppX Deployment Service (AppXSVC) (CVE-2019-1129); distant code execution vulnerabilities in Distant Desktop Providers (CVE-2019-0887) and Microsoft SQL Server (CVE-2019-1068); and denial of service vulnerability in SymCrypt (CVE-2019-0865).
Luckily, Microsoft patched these vital severity vulnerabilities earlier than any exploits.
Different Microsoft July Patch Tuesday Fixes
Alongside the above-discussed safety flaws, the tech big additionally patched 54 different vital severity vulnerabilities in varied merchandise. Moreover, in addition they mounted a single moderate-severity ASP.NET Core Spoofing Vulnerability (CVE-2019-1075) with these updates.
Whereas this replace bundle additionally mounted tens of safety flaws, it nonetheless addressed comparatively fewer bugs than the earlier month. In June’s Patch Tuesday, Microsoft mounted 88 safety flaws together with zero-day bugs.
Take your time to touch upon this text.