Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 77 vulnerabilities that were fixed in 12 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 12 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB4464561
KB4464551
KB4464567
KB4464564
KB4464549
KB4464573
KB4464536
KB4464556
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected office system.
Note: for Office Click to Run , This QID only support "Semi-Annual Channel 1808" at this time.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2019
Affected Software:
Azure DevOps Server 2019 Patch 2
Team Foundation Server 2015 Update 4.2
Team Foundation Server 2017 Update 3.1
Team Foundation Server 2018 Update 1.2
Team Foundation Server 2018 Update 3.2
QID Detection Logic:
This authenticated QID locates file versions via the HKLM\Software\Microsoft\TeamFoundationServer registry key. The following files are checked:
TFS 2015 Update 4.2 Patch 1 - Microsoft.TeamFoundation.Framework.Server.dll - 14.114.28829.0
TFS 2017 Update 3.1 Patch 5 - Microsoft.TeamFoundation.Framework.Server.dll - 15.117.28826.0
TFS 2018 Update 1.2 Patch 4 - Microsoft.TeamFoundation.Server.WebAccess.Admin.dll - 16.122.28826.4
TFS 2018 Update 3.2 Patch 4 - Microsoft.TeamFoundation.WorkItemTracking.Web.dll - 16.131.28826.3
Azure DevOps Server 2019 Patch 2 - Microsoft.TeamFoundation.Server.WebAccess.VersionControl.dll - 17.143.28826.2
Patches:
The following are links for downloading patches to fix these vulnerabilities:
May Security Release
A remote unauthenticated attacker can exploit this vulnerability by issuing specially crafted requests to the .NET Core application.
QID Detection Logic (Authenticated):
This QID checks for the vulnerable version of Microsoft.AspNetCore.App and Microsoft.AspNetCore.All
NOTE: Marking this QID as deprecated as the affected file doesn't contains valid information about version, also in most cases it doesn't get installed with default installation type.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
ASP.NET 2.1.11
ASP.NET 2.2.5
The security update addresses the vulnerability by correcting how SQL Server Analysis Services enforces permissions.
Affected Software:
Microsoft SQL Server 2017 CU 14
Microsoft SQL Server 2017 CU 14 GDR
QID Detection Logic:
This authenticated QID checks for vulnerable MSSQL versions lesser than
Knowledge base articles:
KB4494352
KB4494351
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2019-0819
The KB Articles associated with the update:
KB4499179
KB4499154
KB4494440
KB4499171
KB4499167
KB4499181
KB4499165
KB4499151
KB4499158
KB4494441
QID Detection Logic:
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB4494441 - 10.0.17763.503
KB4499179 - 10.0.16299.1146
KB4494440 - 10.0.14393.2969
KB4499154 - 10.0.10240.18215
KB4499171 - 6.2.9200.22753
KB4499181 - 10.0.15063.1805
KB4499158 - 6.2.9200.22753
KB4499151 - 6.3.9600.19358
KB4499165 - 6.3.9600.19358
KB4499167 - 10.0.17134.765
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
QID Detection Logic (Authenticated):
Operating Systems: Windows 10 RTM, Windows 10 Version 1607/Server 2016, Windows 10 Version 1703, Windows 10 1709/Windows Server, version 1709, Windows 10 1803/Windows Server, version 1803, Windows 10 1809/Server 2019.
This QID checks for following file versions %windir%\WinSxS\*microsoft-windows-servicingstack*\CbsCore.dll:
The patch version of 10.0.10240.18210 (KB4498353)
The patch version of 10.0.14393.2963 (KB4498947)
The patch version of 10.0.15063.1802 (KB4500640)
The patch version of 10.0.17763.503 (KB4499728)
This QID checks for following file versions %windir%\WinSxS\*microsoft-windows-servicingstack*\wcp.dll:
The patch version of 10.0.16299.1143 (KB4500641)
The patch version of 10.0.17134.760 (KB4497398)
Note: The QID currently does not support Windows 10 1903/Windows Server, version 1903.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4497398
KB4498353
KB4498947
KB4499728
KB4500109
KB4500640
KB4500641
This security update is rated Important for supported versions of Microsoft .NET Framework and .NET Core.
QID Detection Logic (Authenticated):
This QID checks for the vulnerable file version of system.dll for .Net Framework
This QID checks for the vulnerable file version of dotnet.dll for .net core sdk
This QID checks for the vulnerable version of Microsoft.NETCore.App under default directory for .version file.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
.NET CORE 2.1
.NET CORE 2.2
The KB Articles associated with the update:
KB4497936
KB4499154
KB4499181
KB4499167
KB4494441
KB4499179
KB4494440
QID Detection Logic:
This QID checks for the file version of edgehtml.dll
The following versions of edgehtml.dll with their corresponding KBs are verified:
KB4494441 - 11.0.17763.503
KB4499179 - 11.0.16299.1146
KB4494440 - 11.0.14393.2969
KB4499154 - 11.0.10240.18215
KB4499181 - 11.0.15063.1805
KB4499167 - 11.0.17134.765
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
KB Articles associated with this update is: KB4489639
Affected Software:
Microsoft Visual Studio 2017 version 15.0
Microsoft Visual Studio 2015 Update 3
Microsoft Visual Studio 2017 version 15.9
Microsoft Visual Studio 2019 version 16.0
QID Detection Logic:
This QID detects vulnerable versions of Microsoft Visual Studio by reviewing the file version of devenv.exe or StandardCollector.Service.exe on all instances of Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2019-0727
The KB Articles associated with the update:
KB4499179
KB4499149
KB4494440
KB4499154
KB4497936
KB4499171
KB4499181
KB4499151
KB4498206
KB4499167
KB4499164
KB4494441
QID Detection Logic:
This QID checks for the file version of Mshtml.dll
The following versions of Mshtml.dll with their corresponding KBs are verified:
KB4498206 - 10.0.9200.22750 , 9.0.8112.21333 , 11.0.9600.19354
KB4499164 - 11.0.9600.19355
KB4494441 - 11.0.17763.503
KB4499149 - 9.0.8112.21334
KB4499179 - 11.0.16299.1146
KB4494440 - 11.0.14393.2969
KB4499167 - 11.0.17134.765
KB4499154 - 11.0.10240.18215
KB4499171 - 10.0.9200.22752
KB4499181 - 11.0.15063.1805
KB4499151 - 11.0.9600.19355
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
Affected Versions:
Windows 8 Embedded, Windows 10 Version 1803, Windows Server 2016, Windows 10 Version 1709, Windows 10 Version 1809, Windows 10 Version 1703, Windows 10 Version 1607, Windows 10, Windows Server 2012 R2, Windows 8.1, Windows RT 8.1, Windows Server 2019 and Windows Server 2012 with Adobe Flash Player version prior to 32.0.0.192.
QID Detection Logic:
This authenticated QID will flag if file version of %windir%\System32\Macromed\Flash\Flash.ocx is less than or equal to 32.0.0.192.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4497932 Windows
Affected Software:
Microsoft Dynamics CRM 2015 (on-premises) version 7.0
Microsoft Dynamics 365 (on-premises) version 8.2
Microsoft Dynamics 365 (on-premises) version 9.0
QID Detection Logic:
This QID detects vulnerable versions by checking if the version of Microsoft.Crm.Setup.Server.exe is lesser than:
Microsoft Dynamics CRM 2015 (on-premises) version 7.0 - 7.0.3.147
Microsoft Dynamics 365 (on-premises) version 8.2 - 8.2.6.19
Microsoft Dynamics 365 (on-premises) version 9.0 - 9.0.4.5
Knowledge base articles:
KB4494412
KB4498363
KB4499386
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2019-1008
These new vulnerability checks are included in Qualys vulnerability signature 2.4.603-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.