Windows: CVE-2018-8423; CVE-2018-8453, CVE-2018-8495

[German]In October 2018, Microsoft patched some vulnerabilities in Windows with updates. The vulnerability CVE-2018-8495 is now being actively exploited. For the (probably incompletely patched) vulnerability CVE-2018-8495 a Proof-of-Concept (PoC) is now available. And the vulnerability CVE-2018-8423 was probably patched. Here is some information.


Advertising

Exploit CVE-2018-8453 used in the wild

On 9.10.2018 Microsoft released a security update for the Win32k Elevation of Privilege vulnerability CVE-2018-8453 for all still supported Windows versions. The individual updates for the various Windows versions are available on this Microsoft page

It is recommended to patch your systems as soon as possible. Microsoft writes that there is no known attack on this vulnerability (0 – Exploitation Detected). But anti-virus provider Kaspersky claims the opposite in the following tweet. 

Within this article Kaspersky security researchers write that a limited number of attacks have been detected in the Middle East that exploit this vulnerability. Details can be found in the linked article.

CVE-2018-8423: Windows Shell Remote Code Execution

Vulnerability CVE-2018-8423 describes a Windows Shell Remote Code Execution vulnerability that Microsoft classifies as 'important'. The vulnerability exists, if remote code is executed when the Windows shell improperly handles URIs. An attacker who successfully exploited the vulnerability could obtain the same user privileges as the current user.


Advertising

Microsoft also writes: "An attacker could host a specially crafted website designed to exploit the vulnerability in Microsoft Edge. But the attacker must then convince a user to visit the site. The attack requires a specific user interaction to execute the remote code.

Proof of Concept for CVE-2018-8423

In this article, a security researcher describes some scenarios as proof of concept how this vulnerability could be exploited. Especially in environments where many users cannot resist the temptations of the Web, administrators should take care of eliminating this vulnerability. 

CVE-2018-8423 incompletely patched

I was alerted Friday by the vendor 0patch that the Microsoft fix for the CVE-2018-8423 vulnerability was incomplete. The 0patch people are writing:

This week [Microsoft on] Windows Updates brought a solution to the "0day" vulnerability in the Jet Database Engine (CVE-2018-8423) that we previously micropatched.  

Our analysis has shown that this official solution is flawed. We have informed Microsoft and released another micropatch to fix the official patch.

In other words, customers of 0patch who were actually protected from the CVE-2018-8423 vulnerability by their micropatch will find themselves in a stupid situation after the October 2018 patchday. Installing the Microsoft update will disable the 0patch micropatch and the vulnerability could be exploited again.

As you write this blog post, fully updated 32-bit and 64-bit Windows 10, Windows 8.1, Windows 7, Windows Server 2008, and Windows Server 2012 systems are vulnerable. The developers of 0patch suspect that the vulnerability is unfixed in all versions of Windows that use version 4.0.9801.0 of msrd3x40.dll.

0patch has therefore developed another micropatch for its customers for version 4.0.9801.0 of msrd3x40.dll, which closes the vulnerability that Microsoft has incompletely closed. The details can be found in this blog post.

CVE-2018-8495 patched

On October 10, 2018, Microsoft released a security update for the supported versions of Windows for the Microsoft JET Database Engine Remote Code Execution vulnerability CVE-2018-8495. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs, view, modify, or delete data, or create new accounts with full user privileges. Users whose accounts are configured to have fewer user privileges on the system could be less affected than users who work with administrative user privileges.

To exploit the vulnerability, a user must open/import a specially crafted Microsoft JET Database Engine file. In an email attack scenario, an attacker could exploit the vulnerability by sending a specially crafted file to the user and then convincing them to open the file. Microsoft classifies the exploitation of this vulnerability as 'Exploitation Less Likely'.  This vulnerability has been know since September 2018. The developers of 0patch had created a micro patch for their customers. 

In the tweet above, 0patch now informs its users that the 0patch solution is automatically deactivated when the Microsoft update is installed.


Advertising

This entry was posted in Security, Update and tagged , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).