{"id":13660,"date":"2020-03-14T02:50:58","date_gmt":"2020-03-14T01:50:58","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13660"},"modified":"2023-03-23T19:11:12","modified_gmt":"2023-03-23T18:11:12","slug":"0patch-fix-for-windows-installer-flaw-cve-2020-0683","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/","title":{"rendered":"0patch: Fix for Windows Installer flaw CVE-2020-0683"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/13\/0patch-fix-fr-windows-installer-schwachstelle-cve-2020-0683\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]ACROS Security has released a micro-patch for its 0patch agent that fixes the Privilege Escalation vulnerability CVE-2020-0683 in the Windows Installer. The micro-fix is available for users of Windows 7 SP1 and Windows Server 2008 R2 who have not purchased the corresponding ESU package from Microsoft but have purchased support from ACROS Security. <\/p>\n<p><!--more--><\/p>\n<h2>The Windows Installer vulnerability CVE-2020-0683<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/445f36546c9145398f6f5121a280590a\" width=\"1\" height=\"1\">A privilege escalation vulnerability exists in the Windows Installer, which has been assigned the identifier CVE-2020-0683&nbsp; and has been publicly disclosed since February 2020. The Common Vulnerabilities and Exposures database (CVE) contains the following details:<\/p>\n<blockquote>\n<p>An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686.<\/p>\n<\/blockquote>\n<p>When handling symbolic links during the processing of MSI installation packages, privileges may be increased. Packet Storm Security has published some details in <a href=\"https:\/\/packetstormsecurity.com\/files\/156373\/Microsoft-Windows-10-MSI-Privilege-Escalation.html\" target=\"_blank\" rel=\"noopener noreferrer\">this document<\/a> &#8211; Mc Afee links all information <a href=\"https:\/\/web.archive.org\/web\/20211203194302\/https:\/\/www.mcafee.com\/enterprise\/de-de\/threat-center\/threat-landscape-dashboard\/vulnerabilities-details.cve-2020-0683.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.&nbsp; <\/p>\n<h2>Microsoft released updates in Feb. 2020<\/h2>\n<p>Microsoft classifies the exploitability of the vulnerability in <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0683\" target=\"_blank\" rel=\"noopener noreferrer\">this document<\/a> as 'low'. This is because an attacker would have to log on to the system first. Only then could he execute a specially crafted MSI application to exploit the privilege escalation vulnerability. But then he could add or remove files.&nbsp; <\/p>\n<p>On February 11, 2020, Microsoft published updates for Windows 7, Windows 8.1, and all versions of Windows 10, as well as the Windows Server counterparts, on the Windows Installer Elevation of Privilege Vulnerability support page <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0683\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0683<\/a>.&nbsp; <\/p>\n<p><a href=\"https:\/\/github.com\/padovah4ck\/CVE-2020-0683\/raw\/master\/msi_eop.gif?raw=true\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" alt=\"Screenshot\" src=\"https:\/\/github.com\/padovah4ck\/CVE-2020-0683\/raw\/master\/msi_eop.gif?raw=true\" width=\"596\" height=\"335\"><\/a><br \/>(<a href=\"https:\/\/github.com\/padovah4ck\/CVE-2020-0683\/raw\/master\/msi_eop.gif?raw=true\" target=\"_blank\" rel=\"noopener noreferrer\">Click to zoom<\/a>)<\/p>\n<h2>0patch releases Micro Patch for CVE-2020-0683 <\/h2>\n<p>However, users of Windows 7 SP1 and Windows Server 2008 R2 who do not have an ESU license will no longer receive the security updates that are released by Microsoft. Since there is an exploit, the people at ACROS Security have developed a micro-fix for the vulnerability. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">We have just released a micropatch for CVE-2020-0683, a privilege escalation in Windows Installer for which a POC is publicly available (<a href=\"https:\/\/t.co\/0yNhCM4mJV\">https:\/\/t.co\/0yNhCM4mJV<\/a>). This micropatch is targeted at our Windows 7 and Windows Server 2008 R2 users without Extended Security Updates. <a href=\"https:\/\/t.co\/quYWLsj6Ia\">pic.twitter.com\/quYWLsj6Ia<\/a><\/p>\n<p>\u2014 0patch (@0patch) <a href=\"https:\/\/twitter.com\/0patch\/status\/1238130250707546113?ref_src=twsrc%5Etfw\">March 12, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserve77e8fef77f964eb28fb074cf4963818a\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>If you have installed the 0patch agent and purchased a Pro or Enterprise subscription, Windows 7 SP1 or Windows Server 2008 R2 will protect the system against the vulnerability.  <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-forcing-february-2020-security-updates-part-1\/\">Windows 7: Forcing February 2020 Security Updates \u2013 Part 1<\/a> \u2013 Teil 1<br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution \u2013 Part 2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]ACROS Security has released a micro-patch for its 0patch agent that fixes the Privilege Escalation vulnerability CVE-2020-0683 in the Windows Installer. The micro-fix is available for users of Windows 7 SP1 and Windows Server 2008 R2 who have not purchased &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,247,18],"class_list":["post-13660","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows-7-sp1","tag-windows-server-2008-r2"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13660"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13660\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}