Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 38 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB5002145
KB5002135
KB5002120
KB5002136
KB5002147
KB5002155
QID Detection Logic:
This authenticated QID checks the file versions from the above Microsoft KB article with the versions on the affected SharePoint system.
KB5002145
KB5002135
KB5002120
KB5002136
KB5002147
KB5002155
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update
This security update contains the following:
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB3172514
KB3118335
KB5002146
KB5002140
KB5002149
KB5002156
KB5002137
KB5002133
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB3172514
KB3118335
KB5002146
KB5002140
KB5002149
KB5002156
KB5002137
KB5002133
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft office January 2022
This security update contains the following KBs:
Affected Products:
Microsoft Outlook 2016 for Mac
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on affected outlook applications.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Outlook 2016 for Mac
CVE-2022-23276: SQL Server for Linux Containers Elevation of Privilege Vulnerability
SQL Server 2019 GDR, Customers who have deployed SQL Server 2019 Linux container images need to update SQL Server 15.0.2090.38. and Cumulative Update 15 for SQL Server 2019 version 15.0.4198.2.
Affected Software:
SQL Server version from 15.0.2090.0 through 15.0.2090.37.
SQL Server Version from 15.0.4198.0 through 15.0.4198.1
QID Detection Logic(Authenticate):
This QID will check the vulnerable version of SQL Server 2019 GDR on the Linux container.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5010657
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5010419 - 6.3.9600.20269
KB5010395 - 6.3.9600.20269
KB5010403 - 6.0.6003.21374
KB5010412 - 6.2.9200.23605
KB5010359 - 10.0.14393.4946
KB5010358 - 10.0.10240.19204
KB5010342 - 10.0.19041.1526
KB5010386 - 10.0.22000.493
KB5010354 - 10.0.20348.524
KB5010345 - 10.0.18362.2094
KB5010351 - 10.0.17763.2565
KB5010404 - 6.1.7601.25860
KB5010422 - 6.1.7601.25860
KB5010384 - 6.0.6003.21374
KB5010392 - 6.2.9200.23605
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5010342
KB5010345
KB5010351
KB5010354
KB5010358
KB5010359
KB5010384
KB5010386
KB5010392
KB5010395
KB5010403
KB5010404
KB5010412
KB5010419
KB5010422
Microsoft has released a security Update for Visual Studio which resolves Denial of Service Vulnerability.
Affected Software:
Microsoft Visual Studio 2019 version 16.9 (includes 16.0-16.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0-16.10)
Microsoft Visual Studio 2022 version 17.0
and Microsoft Visual Studio 2019 for Mac version 8.10
The vulnerable versions of Visual Studio let attackers to perform Denial of Service Attacks.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-21986
Affected versions:
.NET 5.0 before version 5.0.14
and .NET 6.0 before version 6.0.2
QID Detection Logic: Authenticated
This QID detects vulnerable versions of Microsoft .NET Core by checking the file version on windows.
Successful exploitation of this vulnerability could lead to Denial of Service Vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-21986
This QID checks for the file version of dns.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5010342 - 10.0.19041.1526
KB5010354 - 10.0.20348.524
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5010342
KB5010345
KB5010354
KB5010386
KB5010456
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5010386 - 10.0.22000.493
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5010386
CVE-2022-21965: Microsoft Teams Denial of Service Vulnerability
Affected Software:
Microsoft Teams Versions prior to 1.0.94.20xxx
QID Detection Logic(Authenticated):
QID checks for the vulnerable version of Teams.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-21965 Windows
Affected Product:
"HEVC from Device Manufacturer" media codec before version 1.0.43421.0
"VP9 from Device Manufacturer" media codec before version 1.0.42791.0
QID detection Logic:
The gets the version of HEVCVideoExtension and VP9VideoExtensions by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2022-21844
CVE-2022-21926
CVE-2022-21927
CVE-2022-22709
These new vulnerability checks are included in Qualys vulnerability signature 2.5.397-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.