Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 120 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
The KB Articles associated with the update:
KB4565479
KB4565537
KB4565513
KB4565489
KB4565508
KB4565511
KB4565503
KB4565524
KB4565483
KB4565541
KB4565536
KB4558998
This QID checks for the file version of Mshtml.dll
The following versions of Mshtml.dll with their corresponding KBs are verified:
KB4565479 - 9.0.8112.21461 , 11.0.9600.19750
KB4565537 - 11.0.9600.19750
KB4565513 - 11.0.10240.18638
KB4565489 - 11.0.17134.1610
KB4565508 - 11.0.16299.1992
KB4565511 - 11.0.14393.3808
KB4565503 - 11.0.19041.388
KB4565524 - 11.0.9600.19750
KB4565483 - 11.0.18362.959
KB4565541 - 11.0.9600.19750
KB4565536 - 9.0.8112.21461
KB4558998 - 11.0.17763.1339
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
This security update contains the following KBs:
KB4484443
KB4484453
KB4484448
KB4484451
KB4484436
KB4484370
KB4484440
KB4484374
KB4484411
KB4484353
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected SharePoint system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft SharePoint Foundation and SharePoint Server July 2020
This security update contains the following KBs:
KB4484357
KB4484451
KB4484458
KB4484446
KB4484463
KB4484441
KB4484450
KB4484363
KB4484456
KB4484438
KB4484433
KB4484381
KB4484382
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected office system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update JUNE 2020
The update addresses the vulnerability by modifying how Microsoft Skype for Business Server validate tokens.
Affected Software:
Microsoft Lync Server 2013
KB articles: 4571334
QID Detection Logic:
This authenticated QID detects vulnerable Lync Server 2013 Web Component by checking Microsoft.Rtc.Server.WebInfrastructure.dll file versions lesser than 5.0.8308.1134 from:
\Microsoft.NET\assembly\GAC_32\Microsoft.Rtc.Server.WebInfrastructure.0_5.0.0.0*
\Microsoft.NET\assembly\GAC_64\Microsoft.Rtc.Server.WebInfrastructure.0_5.0.0.0*
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Skype for Business Server 2015 CU8
Skype for Business Server 2019 CU2
The update addresses the vulnerability by correcting how Microsoft OneDrive handles file operations.
Affected Software:
OneDrive for Windows versions prior to 20.114.0607.0002 for all rings
QID Detection Logic:
This QID detects vulnerable versions of OneDrive by checking file version of OneDrive.exe
NOTE: Only per machine installation (System wide installation) of OneDrive are affected.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
OneDrive for Windows
QID Detection Logic (Authenticated):
This QID checks for Windows registry key "HKLM\SYSTEM\CurrentControlSet\Services\DNS\Parameters", posts this QID when value "TcpReceivePacketSize" is 65280(0xFF00)
The KB Articles associated with the update:
KB4558998
KB4565483
KB4565489
KB4565503
KB4565508
KB4565511
KB4565513
KB4565524
KB4565529
KB4565535
KB4565536
KB4565537
KB4565539
KB4565540
KB4565541
QID Detection Logic (Authenticated):
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB4565489 - 10.0.17134.1610
KB4565524 - 6.1.7601.24557
KB4558998 - 10.0.17763.1339
KB4565539 - 6.1.7601.24557
KB4565537 - 6.2.9200.23084
KB4565511 - 10.0.14393.3808
KB4565535 - 6.2.9200.23084
KB4565529 - 6.0.6003.20881
KB4565483 - 10.0.18362.959
KB4565541 - 6.3.9600.19761
KB4565540 - 6.3.9600.19761
KB4565508 - 10.0.16299.1992
KB4565536 - 6.0.6003.20881
KB4565513 - 10.0.10240.18638
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
Microsoft has released Servicing Stack security updates for Windows 8.1, Windows 7, Windows 10,Windows Server 2008,Windows Server 2012,Windows Server 2016,Windows Server 2019.
QID Detection Logic (Authenticated):
This authenticated QID will check for file version of CbsCore.dll
Patches:
The following are links for downloading patches to fix these vulnerabilities:
ADV990001
The KB Articles associated with the update:
KB4558998
KB4565483
KB4565489
KB4565503
KB4565508
KB4565511
KB4565513
QID Detection Logic:Authenticated
This QID checks for the file version of edgehtml.dll
Please refer to the CVE-2020-1462 for more information pertaining to these vulnerabilities.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1433
CVE-2020-1462
Affected Software:
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Microsoft Visual Studio 2019 version 16.6 (includes 16.0 - 16.5)
Microsoft Visual Studio 2019 version 16.0
Microsoft Visual Studio 2015 Update 3
QID Detection Logic: Authenticated
This QID detects vulnerable versions of Microsoft Visual Studio by checking file version of devenv.exe.
NOTE: Microsoft Visual Studio 2015 Update 3 is only prone to CVE-2020-1393.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1147 Windows
CVE-2020-1393 Windows
CVE-2020-1416 Windows
KB4565489,KB4565508,KB4565627,KB4565628,KB4565630,KB4565631,KB4565633,KB4566466,KB4566467,KB4566468,KB4566469,KB4566516,KB4566517,KB4566518,KB4566519,KB4566520 kbs and .Net Core are covered. This security update is rated Critical for supported versions of Microsoft .NET Framework and .NET Core.
.NET Framework 2.0, 3.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 and 4.8
Any .NET Core 2.1 application running on .NET Core 2.1.19 or lower
.Any .NET Core 3.1 application running on .NET Core 3.1.5 or lower
Any .NET 5 application running on .NET 5 Preview 6 or lower
QID Detection Logic (Authenticated):
- Checks for vulnerable version of System.data.dll for .Net Framework
- Checks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1147
Affected Software:
Microsoft Forefront Endpoint Protection 2010
Microsoft Security Essentials
Microsoft System Center 2012 Endpoint Protection
Microsoft System Center 2012 R2 Endpoint Protection
Microsoft System Center Endpoint Protection
Windows Defender
QID Detection Logic (Authenticated):
The authenticated check looks for vulnerable version of file C:\WINDOWS\System32\MpSigStub.exe
MpSigStub.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1461
QID Detection Logic (Authenticated):
This QID checks for the file version of dns.exe.
NOTE: Detection is not checking for workaround, as long as device is missing the patch regardless of workaround mitigation status, this QID will flag.
QID Detection Logic (Unauthenticated):
This QID compares the self-reported DNS banner version with patched versions to detect if the patch is installed
The following versions of dns.exe with their corresponding KBs are verified:
KB4565537 - 6.2.9200.23084
KB4565511 - 10.0.14393.3808
KB4565535 - 6.2.9200.23084
KB4565524 - 6.1.7601.24557
KB4565536 - 6.0.6003.20885
KB4565541 - 6.3.9600.19759
KB4565539 - 6.1.7601.24557
KB4565529 - 6.0.6003.20885
KB4565540 - 6.3.9600.19759
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows(DNS)
These new vulnerability checks are included in Qualys vulnerability signature 2.4.937-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.