Microsoft Security Update Releases (Nov. 12,/20, 2019)

[German]A little addendum from Patchday as well as current information that Microsoft has published as 'Security Update Releases' regarding vulnerabilities and their fixes through security updates.


Advertising

Microsoft Security Update Releases (11/20/2019)

Currently I have a Microsoft Security Update Release from November 20, 2019 for the CVEs CVE-2019-1460 and CVE-2019-1108, which have been revised.

Outlook for Android Spoofing Vulnerability

Microsoft has released the following 'Revision Information' about this vulnerability:

– CVE-2019-1460 | Outlook for Android Spoofing Vulnerability
CVE-2019-1460 – Version: 1.0
– Reason for Revision: Information published.
– Originally posted: November 19, 2019
– Updated: N/A
– Aggregate CVE Severity Rating: Important

There is a spoofing vulnerability in the product that results from the way Microsoft Outlook for Android analyzes specially crafted email messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted email message to a victim.

An attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on the affected systems and execute scripts in the security context of the current user. A security update fixes the vulnerability by correcting the way Microsoft Outlook for Android analyzes specially crafted email messages.

A security update fixes the vulnerability by correcting the way Microsoft Outlook for Android analyzes specially crafted e-mail messages.


Advertising

Remote Desktop Protocol Client Information Disclosure Vulnerability

Microsoft has published the following revision for this vulnerability CVE-2019-1108:

– CVE-2019-1108 | Remote Desktop Protocol Client Information Disclosure Vulnerability
CVE-2019-1108
– Version: 3.0
– Reason for Revision: The following updates have been made:
1. Added Microsoft Remote Desktop for Mac OS to the Security Updates table because it
    is affected by this vulnerability. Microsoft recommends that customers running
    Microsoft Remote Desktop for Mac OS install the latest security update to be fully
   protected from this vulnerability.
   2. Added Microsoft Remote Desktop for iOS to the Security Updates table because it
   is affected by this vulnerability. Microsoft recommends that customers running
   Microsoft Remote Desktop for iOS install the latest security update to be fully
   protected from this vulnerability. Added an FAQ to explain how to get the update
   for iOS.
– Originally posted: July 9, 2019
– Updated: November 19, 2019
– Aggregate CVE Severity Rating: Important

In short: Both macOS and iOS are also affected by the RDP vulnerability originally released on July 9, 2019.

There is a vulnerability that allows information from the Windows RDP client's memory area to be disclosed. An attacker who has successfully exploited this vulnerability could obtain information to further compromise the user's system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially developed application. Again, a security update fixes the vulnerability by fixing the memory leak in the Windows RDP client.

Microsoft Security Update Releases (November 12, 2019)

From the November patchday I still have some information about CVE-2019-1454, which has been revised.

Windows User Profile Service Elevation of Privilege Vulnerability

Microsoft has issued the following revision to this CVE-2019-1454 vulnerability:

– CVE-2019-1454 | Windows User Profile Service Elevation of Privilege Vulnerability
– CVE-2019-1454
– Version: 1.0
– Reason for Revision: Information published.
– Originally posted: November 12, 2019
– Updated: N/A
– Aggregate CVE Severity Rating: Important

An Elevation of Privilege vulnerability exists due to the improper handling of symlinks by the Windows User Profile Service (ProfSvc). An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker must first log on to the system. An attacker could then run a specially developed application that could exploit the vulnerability and delete files or folders of his choice. The security update fixes the vulnerability by correcting how the Windows User Profile Service handles symlinks.

Microsoft Guidance for Vulnerability in Trusted Platform Module (TPM)

In addition, Microsoft has published information about the vulnerability in the Trusted Platform Module (TPM) – see TPM-FAIL puts Trusted Platform Module at risk.

– ADV190024 | Microsoft Guidance for Vulnerability in Trusted Platform Module (TPM)
ADV190024
– Version: 1.0
– Reason for Revision: Information published.
– Originally posted: November 12, 2019
– Updated: N/A
– Aggregate CVE Severity Rating: N/A


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in Security and tagged . Bookmark the permalink.

One Response to Microsoft Security Update Releases (Nov. 12,/20, 2019)

  1. Goltrane says:

    I'm also getting the generic icon and a Code 10 error with my SATA disk drives, USB RAID disk array, and USB Bluetooth adapter in Devices & Printers; everything is fine in Device Manager. Stupid Microsoft.

Leave a Reply

Your email address will not be published. Required fields are marked *