Patch fixes bugs in Microsoft Windows, Edge Browser, Internet Explorer, Office, ChakraCore
The patch fixes bugs in Microsoft Windows, Edge Browser, Internet Explorer, Office, ChakraCore, .NET Framework, Exchange Server, Microsoft SQL Server, and Visual Studio.
Two of the vulnerabilities patched this time are being exploited by hackers at the time of patch release.
According to Microsoft's documents , all 19 critical vulnerabilities cause remote code execution errors, some of which can even help hackers take control of the whole system if successfully exploited. .
In addition, Microsoft also addressed 39 critical vulnerabilities, one mid-range vulnerability and one less critical vulnerability.
Detecting MiTM eavesdropping components and device sabotage components infected with VPNFilter độc malware
The following are details of some important and currently being attacked vulnerabilities:
Internet Explorer Memory Vulnerability (CVE-2018-8373)
The first being attacked is a remote code execution vulnerability reported by Trend Micro last month and affects all supported versions of Windows.
In Internet Explorer 9, 10 and 11 there exists a memory corruption issue that could allow remote attackers to take control of systems simply by convincing users to view a web page through Internet Explorer.
Windows Shell Remote Code Execution Vulnerability (CVE-2018-8414)
The second real vulnerability known and being attacked resides in the Windows Shell, which originates from improper validation of file paths.
Arbitrary code can be executed on the system by persuading the user to open a special file received via email or via a web page.
Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2018-8273)
Microsoft SQL Server versions 2016 and 2017 contain a buffer overflow vulnerability that can be remotely exploited to execute arbitrary code if a SQL Server Database Engine service account is available.
Exploiting the vulnerability requires a remote attacker to send a special query to an affected SQL server.
Windows PDF Remote Code Execution Vulnerability (CVE-2018-8350)
Windows 10 systems with a default browser of Microsoft Edge can be compromised simply by persuading a user to view a web page.
Due to improper memory handling, Windows 10's PDF library can be exploited by a remote attacker to execute arbitrary code into the system.
"Only Windows 10 systems that set Microsoft Edge as the default web browser are affected by this vulnerability."
Microsoft Exchange Memory Vulnerability (CVE-2018-8302)
The vulnerability resides in the way Microsoft Exchange software handles data in memory, allowing an attacker to execute arbitrary code by sending an email to a server with Exchange installed. This vulnerability affects Microsoft Exchange versions 2010, 2013 and 2016.
Microsoft Graphics Remote Code Execution Vulnerability (CVE-2018-8344)
Microsoft says Windows' font library does not handle homemade fonts well, allowing attackers to take over the system by transmitting malicious fonts through websites or homemade documents.
This vulnerability affects Windows 10, 8.1 and 7; as well as Windows Server 2016 and 2012.
In addition, there are remote code execution vulnerabilities LNK (CVE-2018-8345) and GDI+ (CVE-2018-8397) .
Microsoft has also released security patches for vulnerabilities in Adobe products
Users should download these patches immediately to prevent computer attacks or hijacking.
Operate and exploit advertising by iCOMM Vietnam Media and Technology Joint Stock Company.
116 Thai Ha, Trung Liet Ward, Dong Da District, Hanoi.
Email: [email protected]
Editor in chief: Tran Vo
Tel: (+84) 903076053/7 Fax: (+84) 903030935