Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Microsoft Patches Zero Day Disclosed by Google

Author: Waveya Tong
by Waveya Tong
Posted: Nov 09, 2016

Microsoft followed by and currently patched a zero-day vulnerability becoming exploited in public attacks which was disclosed by Google researchers nine days in the past.

The victims have yet to possess been identified, but cheap office professional plus 2010 did accuse the Sofacy APT gang of carrying out the attacks. Sofacy is generally thought to own ties to Russian military intelligence and its targets are strategic, for example government and diplomatic agencies, military and defense contractors, and community policy think-tanks.

Google's disclosure on Oct. 31 came 10 days soon after it privately reported the vulnerability to Microsoft, along with a Flash zero working day to Adobe also used in these attacks.

Adobe patched the Flash vulnerability with an emergency update unveiled on Oct. 26, but Microsoft failed to publicly acknowledge the bug until only following Google publicly disclosed it. Google's inside policy gives vendors 7 times to publicly report or patch vulnerabilities being actively exploited.

Google said the vulnerability can be a local privilege escalation inside the Windows kernel that leads to a sandbox escape.

The attackers chained this bug and the Flash zero day in order to get on targeted computers. The sandbox escape allows the attacker to operate code in kernel mode.

"Microsoft implemented new exploit mitigations in the Home windows 10 Anniversary Update variation of your win32k kernel element," Microsoft reported in its bulletin, MS16-135. "These cheap windows 10 pro Anniversary Update mitigations, which were being developed based on proactive inner research, stop all observed in-the-wild instances of the exploit."

MS16-135 also patched two other elevation of privilege vulnerabilities during the Home windows kernel (CVE-2016-7215 and CVE-2016-7246), as well as an details disclosure bug inside the kernel that opens the door for a kernel ASLR bypass (CVE-2016-7214), along with a separate facts disclosure bug from the Windows browser.sys kernel-mode driver (CVE-2016-7218).

Six on the 14 bulletins put out by Microsoft these days are rated crucial. Just one, MS16-132, involved an additional vulnerability less than attack in the Windows Graphics Component. Microsoft mentioned a distant code execution Open Variety Font vulnerability was patched during the Windows font library.

That bulletin patched three other flaws, which includes an facts disclosure flaw in Open Kind Font, precisely during the ATMFD component, which leaks plenty of details to carry out a further compromise. Also addressed was a remote code execution memory corruption vulnerabilities in Windows Animation Manager and Windows Media Foundation.

Microsoft also provided cumulative updates for its browsers, Edge and World-wide-web Explorer. The edge update, MS16-129, patched 17 vulnerabilities, most of which lead to distant code execution. Two of the flaws, CVE-2016-7209 and CVE-2016-7199, ended up publicly disclosed, Microsoft stated, but not used in in-the-wild attacks. The 2nd disclosed bug was also patched within the World wide web Explorer update, MS16-142, which patched 7 CVEs.

MS16-130 patched three crucial Windows bugs, a remote code execution flaw within the way Windows' image file loading handles malformed image files, together with two elevation of privilege flaws in Windows IME and Home windows Task Scheduler.

Another remote code execution vulnerability was addressed in MS16-131 inside the cheap windows 10 home Video Regulate part. The remaining vital bulletin could be the Adobe Flash Player update for IE and Edge; Adobe released an update today for Flash Player patching nine remote code execution flaws inside the software.

Nevertheless rated critical by Microsoft, an Office bulletin, MS16-133, also merits attention because it patches a dozen vulnerabilities together with ten that lead to distant code execution. None of the Office bugs are staying publicly attacked, Microsoft explained.

Microsoft also patched SQL Server, addressing a half-dozen elevation of privilege and details disclosure vulnerabilities in MS16-136. A few of your EoP bugs are in the SQL Server RDBMS engine, in addition to a cross-site scripting flaw in SQL Server MDS, an information and facts disclosure challenge in SQL Analysis Solutions, and yet another EoP issue while in the SQL Server Engine Server Agent.

"The best priority for most administrators will be to quickly deploy fixes for browsers, graphics components, and Office. All of these components are afflicted by one particular or much more code execution vulnerabilities Microsoft has classified as highly exploitable," claimed Craig Young, stability researcher at Tripwire. "These are of your highest priority due for the actuality that the vulnerabilities can potentially be triggered by normal web browsing activities providing an external attacker a way into networks."

About the Author

Some blogs about software, like windows, office, adobe.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Waveya Tong

Waveya Tong

Member since: Oct 23, 2016
Published articles: 12

Related Articles