MA-802.042021: MyCERT Advisory - Microsoft March 2021 Security Updates

  • 13 Apr 2021
  • Advisory
  • Microsoft

1.0 Introduction

Microsoft has released updates to address multiple vulnerabilities in Microsoft software.

2.0 Impact
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

3.0 Affected Products

  • Application Virtualization
  • Azure
  • Azure DevOps
  • Azure Sphere
  • Internet Explorer
  • Microsoft ActiveX
  • Microsoft Exchange Server
  • Microsoft Edge (Chromium-based)
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office PowerPoint
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Windows Codecs Library
  • Power BI
  • Role: DNS Server
  • Role: Hyper-V
  • Visual Studio
  • Visual Studio Code
  • Windows Admin Center
  • Windows Container Execution Agent
  • Windows DirectX
  • Windows Error Reporting
  • Windows Event Tracing
  • Windows Extensible Firmware Interface
  • Windows Folder Redirection
  • Windows Installer
  • Windows Media
  • Windows Overlay Filter
  • Windows Print Spooler Components
  • Windows Projected File System Filter Driver
  • Windows Registry
  • Windows Remote Access API
  • Windows Storage Spaces Controller
  • Windows Update Assistant
  • Windows Update Stack
  • Windows UPnP Device Host
  • Windows User Profile Service
  • Windows WalletService
  • Windows Win32K

4.0 Recommendations
Users and administrators are recommended to review the below URLs and perform the necessary update.

Generally, MyCERT advises the users of these applications to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

MA-801.032021: MyCERT Advisory - Microsoft February 2021 Security Updates

  • 10 Mar 2021
  • Advisory
  • Microsoft

1.0 Introduction

Microsoft has released updates to address multiple vulnerabilities in Microsoft software.

2.0 Impact
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

3.0 Affected Products

  • Windows 10 v20H2, v2004, v1909, v1809, and v1803
  • Windows Server 2019, Windows Server 2016, and Server Core installations (2019, 2016, v20H2, v2004, and v1909)
  • Windows 8.1, Windows Server 2012 R2, and Windows Server 2012
  • Microsoft Office-related software
  • Microsoft SharePoint-related software
  • Microsoft Lync/Skype for Business
  • Microsoft Exchange Server
  • Microsoft .NET-related software
  • Microsoft Visual Studio
  • Microsoft Dynamics-related software
  • Microsoft Azure-related software
  • Developer tools

4.0 Recommendations

Users and administrators are recommended to review the below URLs and perform necessary update. Kindly refer to the below URL:
https://msrc.microsoft.com/update-guide
https://msrc.microsoft.com/update-guide/releaseNote/2021-Feb

Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

MA-800.032021: MyCERT Alert - Advisory Multiple Security Updates Released for Exchange Server

  • 04 Mar 2021
  • Alert
  • Microsoft Exchange Server

1.0 Introduction

Microsoft has released out-of-band security updates to address vulnerabilities affecting Microsoft Exchange Server 2010, 2013, 2016, and 2019.

2.0 Impact

A remote attacker can exploit four remote code execution vulnerabilities—CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065—to take control of an affected system and can exploit one vulnerability—CVE-2021-26855—to obtain access to sensitive information. These vulnerabilities are being actively exploited in the wild.

3.0 Affected System and Devices

  • Microsoft Exchange Server 2010
  • Microsoft Exchange Server 2013  
  • Microsoft Exchange Server 2016  
  • Microsoft Exchange Server 2019

4.0 Recommendations
Users and system administrators are advised to review the following URL and apply the necessary updates:

 

Generally, MyCERT advises the users of this application to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

  1. https://us-cert.cisa.gov/ncas/current-activity/2021/03/02/microsoft-releases-out-band-security-updates-exchange-server
  2. https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/
  3. https://www.tenable.com/blog/cve-2021-26855-cve-2021-26857-cve-2021-26858-cve-2021-27065-four-microsoft-exchange-server-zero-day-vulnerabilities

MA-796.122020: MyCERT Alert - Microsoft Teams Remote Code Execution Vulnerability

  • 12 Dec 2020
  • Alert

1.0 Introduction

A Remote Code Execution vulnerability has been identified in Microsoft Teams (MS Teams) desktop which can be triggered by a novel Cross Site Scripting (XSS) injection in the web application (teams.microsoft.com). A specially-crafted chat message can be sent to any Microsoft Teams member or channel which will execute arbitrary code on victim devices without users interaction.

Remote Code Execution has been achieved in desktop applications across all supported platforms (Windows, macOS, Linux). Code execution gives attackers full access to victim devices and company internal networks via those devices.

Even without arbitrary code execution on victim device, with the demonstrated XSS it's possible for an attacker to obtain SSO authorisation tokens for Microsoft Teams and other Microsoft Services (e.g. Skype, Outlook, Office365). Furthermore, the XSS vulnerability by itself allows to access confidential or private conversations and files from within MS Teams.

As for the CVE part, it's currently Microsoft's policy to not issue CVEs on products that automatically updates without user's interaction.

2.0 Impact

A remote attacker could sends or edits an existing message that executes code when the message is viewed.

3.0 Affected System and Devices

  • Microsoft Teams (teams.microsoft.com)
  • Microsoft Teams macOS v 1.3.00.23764 
  • Microsoft Teams Windows v 1.3.00.21759 
  • Microsoft Teams Linux v 1.3.00.16851

4.0 Recommendations

Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

MA-786.042020: MyCERT Advisory - Microsoft Releases April 2020 Security Updates

  • 16 Apr 2020
  • Advisory
  • Microsoft

1.0 Introduction

Microsoft has released updates to address multiple vulnerabilities in Microsoft software.

2.0 Impact
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

3.0 Affected Products

  • Microsoft Windows
  • Microsoft Edge (EdgeHTML-based)
  • Microsoft Edge (Chromium-based)
  • ChakraCore
  • Internet Explorer
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Windows Defender
  • Visual Studio
  • Microsoft Dynamics
  • Microsoft Apps for Android
  • Microsoft Apps for Mac

Below is the CVE list:

CVE Title Severity Public Exploited Type
CVE-2020-1020 Adobe Font Manager Library Remote Code Execution Vulnerability Important Yes Yes RCE
CVE-2020-0938 OpenType Font Parsing Remote Code Execution Vulnerability Important No Yes RCE
CVE-2020-1027 Windows Kernel Elevation of Privilege Vulnerability Important No Yes EoP
CVE-2020-0935 OneDrive for Windows Elevation of Privilege Vulnerability Important Yes No EoP
CVE-2020-0969 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No RCE
CVE-2020-1022 Dynamics Business Central Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0948 Media Foundation Memory Corruption Vulnerability Critical No No RCE
CVE-2020-0949 Media Foundation Memory Corruption Vulnerability Critical No No RCE
CVE-2020-0950 Media Foundation Memory Corruption Vulnerability Critical No No RCE
CVE-2020-0907 Microsoft Graphics Components Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0687 Microsoft Graphics Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0927 Microsoft Office SharePoint XSS Vulnerability Critical No No XSS
CVE-2020-0929 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0931 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0932 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0974 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0965 Microsoft Windows Codecs Library Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0970 Scripting Engine Memory Corruption Vulnerability Critical No No RCE
CVE-2020-0968 Scripting Engine Memory Corruption Vulnerability Critical No No RCE
CVE-2020-0967 VBScript Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0910 Windows Hyper-V Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-0942 Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0944 Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1029 Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0784 DirectX Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0888 DirectX Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0964 GDI+ Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0889 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0953 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0959 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0960 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0988 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0992 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0994 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0995 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0999 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-1008 Jet Database Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0937 Media Foundation Information Disclosure Vulnerability Important No No Info
CVE-2020-0939 Media Foundation Information Disclosure Vulnerability Important No No Info
CVE-2020-0945 Media Foundation Information Disclosure Vulnerability Important No No Info
CVE-2020-0946 Media Foundation Information Disclosure Vulnerability Important No No Info
CVE-2020-0947 Media Foundation Information Disclosure Vulnerability Important No No Info
CVE-2020-0984 Microsoft (MAU) Office Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1002 Microsoft Defender Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1049 Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability Important No No XSS
CVE-2020-1050 Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability Important No No XSS
CVE-2020-1018 Microsoft Dynamics Business Central/NAV Information Disclosure Important No No Info
CVE-2020-0906 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0979 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0982 Microsoft Graphics Component Information Disclosure Vulnerability Important No No Info
CVE-2020-0987 Microsoft Graphics Component Information Disclosure Vulnerability Important No No Info
CVE-2020-1005 Microsoft Graphics Component Information Disclosure Vulnerability Important No No Info
CVE-2020-0961 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0760 Microsoft Office Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0991 Microsoft Office Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0923 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0924 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0925 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0926 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0930 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0933 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0954 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0973 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0978 Microsoft Office SharePoint XSS Vulnerability Important No No XSS
CVE-2020-0919 Microsoft Remote Desktop App for Mac Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1019 Microsoft RMS Sharing App for Mac Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0920 Microsoft SharePoint Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0971 Microsoft SharePoint Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0972 Microsoft SharePoint Spoofing Vulnerability Important No No Spoof
CVE-2020-0975 Microsoft SharePoint Spoofing Vulnerability Important No No Spoof
CVE-2020-0976 Microsoft SharePoint Spoofing Vulnerability Important No No Spoof
CVE-2020-0977 Microsoft SharePoint Spoofing Vulnerability Important No No Spoof
CVE-2020-0899 Microsoft Visual Studio Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1014 Microsoft Windows Update Client Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0980 Microsoft Word Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0943 Microsoft YourPhone Application for Android Authentication Bypass Vulnerability Important No No EoP
CVE-2020-1026 MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-0966 VBScript Remote Code Execution Vulnerability Important No No RCE
CVE-2020-0900 Visual Studio Extension Installer Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0956 Win32k Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0957 Win32k Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0958 Win32k Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0699 Win32k Information Disclosure Vulnerability Important No No Info
CVE-2020-0962 Win32k Information Disclosure Vulnerability Important No No Info
CVE-2020-0835 Windows Defender Antimalware Platform Hard Link Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0794 Windows Denial of Service Vulnerability Important No No DoS
CVE-2020-0993 Windows DNS Denial of Service Vulnerability Important No No DoS
CVE-2020-0934 Windows Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0983 Windows Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1009 Windows Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1011 Windows Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1015 Windows Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0952 Windows GDI Information Disclosure Vulnerability Important No No Info
CVE-2020-1004 Windows Graphics Component Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0917 Windows Hyper-V Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0918 Windows Hyper-V Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0913 Windows Kernel Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1000 Windows Kernel Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1003 Windows Kernel Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0955 Windows Kernel Information Disclosure in CPU Memory Access Important No No Info
CVE-2020-0821 Windows Kernel Information Disclosure Vulnerability Important No No Info
CVE-2020-1007 Windows Kernel Information Disclosure Vulnerability Important No No Info
CVE-2020-0940 Windows Push Notification Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1001 Windows Push Notification Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1006 Windows Push Notification Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1017 Windows Push Notification Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-1016 Windows Push Notification Service Information Disclosure Vulnerability Important No No Info
CVE-2020-0936 Windows Scheduled Task Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0981 Windows Token Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-0985 Windows Update Stack Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0996 Windows Update Stack Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-0895 Windows VBScript Engine Remote Code Execution Vulnerability Important No No EoP
CVE-2020-1094 Windows Work Folder Service Elevation of Privilege Vulnerability Important No No EoP

 

4.0 Recommendations

Generally, MyCERT advises the users of this products to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

MA-782.042020: MyCERT Advisory - Online Video Tele-conferencing (VTC) Application Security Guidelines

  • 07 Apr 2020
  • Advisory
  • Video-teleconferencing Zoom Cisco Webex Microsoft Teams

1.0 Introduction

MyCERT received many inquiries on the safety and security aspects of video tele-conferencing (VTC) platforms such as Zoom, Microsoft Teams, Cisco Webex and several others. Ever since the Movement Control Order (MCO) was announced, many organizations and individuals shifted to VTC tools to communicate, conduct online classes and for business transactions.

Most VTC providers already enhanced their applications according to security reports as evaluated by security practitioners. It is user’s responsibility to choose a secure and safe VTC platform for web conferencing. As a precaution, MyCERT recommend the following general guidelines when using VTC.

 

2.0 Security Guidelines

A. All VTC User

  1. Use the latest version of VTC and security software
    • Only download software from its official website or official app store.
    • Update regularly the software to its latest version.
    • Update operating system and security software on desktop computers, mobile devices, frequently.
  1. Never share confidential information during a meeting
    • Avoid discussing any confidential information to prevent leakage.
    • Enable non-recordable videos and audios, and limit file sharing.
  1. Protect VTC account and watch for suspicious account activity
    • Create a strong password for the account.
    • If something is suspicious, log out from clients VTC. If you lost your computer or mobile phone, log out from all clients immediately and change your login password.
    • Do not share or publish the conference ID and URL sent by the organizer
    • Log out from the application when you finish the meeting.

 

B. Unit hosting the Meeting

 

  1. Protect meeting privacy and prevent illegal intruders
    • Share the meeting ID and website only with intended participants. Never share it on social media or public online platforms
    • Create a high-intensity meeting password and send the meeting URL to participants separately
    • Use the pre-registration function to monitor list of participants
    • Disable "Join before Host" option to ensure the host is present before other participants join the meeting. This enables the host to identify participants in advance
    • Utilize the waiting room function to monitor participants log in
    • Lock the meeting immediately after all participants join the meeting
    • Enable the sharing screen to "Only Host" and when necessary only, enable this function to participants
  2. Monitoring meeting
    • Use another device to log in as participant
    • Monitor any inappropriate content shared by participants, remove inappropriate information and unidentified participant
    • Ensure all participants to log out before the main host end the session.
  3. Ensure participants safety and privacy during video conference
    • Notify all participants in advance if recording is required
    • If the recording contains sensitive information, do not save it in the cloud. Save the recording on a personal computer, with restricted access and sharing
  4. Secure your account Personal Meeting ID
    • This ID can be linked to your VTC account for personal use only
    • Do not share this ID or use it in general meetings
  5. Develop security policy for web conferences
    • Organization is advised to develop security policy for employees to follow when hosting and participating in online meetings
    • This policy should include VTC usage and safety guidelines

 

For additional references, the following websites also provide detailed guidelines on Online Video Tele-conferencing:

 

In general, MyCERT advise all users and administrators of Online Video Tele-conferencing to follow latest security announcements by the vendor and adhere to security policies, according to best practices, to determine applicable updates.

 

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

MA-781.032020: MyCERT Alert - Vulnerability in Adobe Type Manager Library

  • 25 Mar 2020
  • Alert
  • Adobe, ATM, Microsoft.

1.0 Introduction

According to Microsoft, there were ongoing exploitations in the wild targeting the unpatched vulnerabilities related to Adobe Type Manager (ATM) Library.

Two remote code execution vulnerabilities have been identified existing in Microsoft Windows ATM Library related to improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.

Microsoft has confirmed the issues, released an advisory “ADV200006 | Type 1 Font Parsing Remote Code Execution Vulnerability”, and is currently working on a fix.

2.0 Impact

By causing a Windows system to open a specially crafted document or view it in the Windows preview pane, an unauthenticated remote attacker may be able to execute arbitrary code with kernel privileges on a vulnerable system. Windows 10 based operating systems would execute the code with limited privileges, in an AppContainer sandbox.

3.0 Affected System and Devices

  • Windows 10 for 32-bit Systems
  • Windows 10 for x64-based Systems
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 Version 1607 for x64-based Systems
  • Windows 10 Version 1709 for 32-bit Systems
  • Windows 10 Version 1709 for ARM64-based Systems
  • Windows 10 Version 1709 for x64-based Systems
  • Windows 10 Version 1803 for 32-bit Systems
  • Windows 10 Version 1803 for ARM64-based Systems
  • Windows 10 Version 1803 for x64-based Systems
  • Windows 10 Version 1809 for 32-bit Systems
  • Windows 10 Version 1809 for ARM64-based Systems
  • Windows 10 Version 1809 for x64-based Systems
  • Windows 10 Version 1903 for 32-bit Systems
  • Windows 10 Version 1903 for ARM64-based Systems
  • Windows 10 Version 1903 for x64-based Systems
  • Windows 10 Version 1909 for 32-bit Systems
  • Windows 10 Version 1909 for ARM64-based Systems
  • Windows 10 Version 1909 for x64-based Systems
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows 8.1 for 32-bit systems
  • Windows 8.1 for x64-based systems
  • Windows RT 8.1
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for Itanium-Based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows Server 2012
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2
  • Windows Server 2012 R2 (Server Core installation)
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)
  • Windows Server 2019
  • Windows Server 2019 (Server Core installation)

4.0 Recommendations

According to Microsoft, they are currently working to mitigate the addressed issue. In the meantime, users could follow suggested workaround by Microsoft on details below:

  • Disable the Preview Pane and details pane in Windows Explorer.
  • Disable the WebClient service.
  • Rename the ATMFD.DLL.

Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

MA-772.022020: MyCERT Advisory - Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-0604)

  • 07 Feb 2020
  • Advisory
  • Microsoft SharepPoint, Remote Code Execution, Vulnerability

1.0 Introduction

Microsoft published a security update pertaining to a Remote Code Execution vulnerability targeting Microsoft SharePoint Services. The vulnerability, (CVE-2019-0604) would allow an attacker who has successfully exploited the service, to run arbitrary code in the context of Sharepoint Application pool and the SharePoint server farm account.

2.0 Impact

By exploiting this vulnerability, a remote, unauthenticated attacker may be able to execute arbitrary code on vulnerable systems. 

3.0 Affected Products

The vulnerability affects the following SharePoint Versions:

  • Microsoft SharePoint Enterprise Server 2016    
  • Microsoft SharePoint Foundation 2010 Service Pack 2    
  • Microsoft SharePoint Foundation 2013 Service Pack 1    
  • Microsoft SharePoint Server 2010 Service Pack 2    
  • Microsoft SharePoint Server 2013 Service Pack 1    
  • Microsoft SharePoint Server 2019    

4.0 Recommendations

Users and organizations using the affected products are advised to update and patch their systems immediately. Patches for the vulnerability can be found at Microsoft's Portal:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT

Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

MA-764.012020: MyCERT Advisory - Microsoft Windows CryptoAPI fails to properly validate ECC certificate chains

  • 16 Jan 2020
  • Advisory

1.0 Introduction

Microsoft Windows CryptoAPI fails to properly validate certificates that use Elliptic Curve Cryptography (ECC) that let an attacker to spoof the validity of digital certificate. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider.

2.0 Impact

A successful exploit could allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.

3.0 Affected Products

  • Windows 10 operating system (32 and 64 bit)
  • Windows Server 2016
  • Windows Server 2019

4.0 Recommendations

MyCERT highly recommended users to install all January 2020 Security Updates patches to effectively mitigate the vulnerability on all Windows 10, Windows Server 2016 and Windows Server 2019 systems.

Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

  • https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jan
  • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
  • https://kb.cert.org/vuls/id/849224/
  • https://www.us-cert.gov/ncas/alerts/aa20-014a

MA-758.112019: MyCERT Alert - Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability (CVE-2019-1429)

  • 21 Nov 2019
  • Alert
  • Microsoft, Internet Explorer, RCE

1.0 Introduction

Recently, MyCERT received information from valid resources about exploits in Internet Explorer. Exploit known to be a remote code execution (RCE) that will corrupt memory to execute arbitrary code within the current user context. Aside from that, an attacker could also embed this exploit in Microsoft Office application that hosts the IE rendering engine.

2.0 Impact

The attacker will craft a malicious website and sent out to targeted users to access the website through internet explorer, allowing attacker to gain user rights that have administrative privilege. This will enable attacker to take control of affected system and allow them to modify, delete or create new user with full user rights.

3.0 Affected System and Devices

  • Microsoft Internet Explorer below or equal version 11

4.0 Recommendations

As of the writing of this advisory, Microsoft has not released any security patches for this vulnerability. However, users can use the following step as a temporary workaround if they need to use Microsoft Internet Explorer:

  • Avoid clicking any suspicious links until maintainers release patch to the public.
  • Browse the software with least privilege user to limit the execution of the malicious file.
  • Consider using alternative web browsers to browse the Internet. Please make sure you use the latest version and stay up-to-date as well.

Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact MyCERT through the following channels:

E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my

5.0    References

Showing 41-50 of 165 items.
(not set)
(not set)
(not set)
(not set)
(not set)
(not set)
(not set)
(not set)
(not set)
(not set)