Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 69 vulnerabilities that were fixed in 7 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 7 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. (CVE-2018-0824)
A security feature bypass vulnerability exists in Windows Scripting Host which could allow an attacker to bypass Device Guard. (CVE-2018-0854)
A remote code execution vulnerability exists in the way that Windows handles objects in memory. (CVE-2018-8136)
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. (CVE-2018-0958)
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. (CVE-2018-0959,CVE-2018-0961)
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. (CVE-2018-8124)
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. (CVE-2018-8129, CVE-2018-8132)
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. (CVE-2018-8134)
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. (CVE-2018-8164)
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL)
driver improperly handles objects in memory. (CVE-2018-8165)
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. (CVE-2018-8166)
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS)
driver improperly handles objects in memory. (CVE-2018-8167)
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. (CVE-2018-8897, CVE-2018-8127,CVE-2018-8141, CVE-2018-8170,CVE-2018-8142)
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. (CVE-2018-1035)
The following are actively exploited in the wild
CVE 2018-8174, a remote code execution vulnerability in the VBScript Engine.
CVE 2018:8120, a privilege escalation vulnerability in Win32k.
Note: CVE-2018-0963 has been addressed for Windows 10 1709 only in May Updates.
QID Detection Logic (Authenticated):
Operating Systems: Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This QID checks for following file versions %windir%\System32\Win32k.sys for all affected OS except Windows 10 and Windows 16:
The patch version of 6.0.6002.24344 (KB4131188)
The patch version of 6.1.7601.24093 (KB4103712 or KB4103718)
The patch version of 6.2.9200.22413 (KB4103726 or KB4103730)
The patch version of 6.3.9600.18979 (KB4103725 or KB4103715)
This QID checks for following file versions %windir%\System32\Win32kfull.sys for Windows 10 and Windows 16:
The patch version of 10.0.10240.17861 (KB4103716)
The patch version of 10.0.14393.2248 (KB4103723)
The patch version of 10.0.15063.1088 (KB4103731 )
The patch version of 10.0.16299.431 (KB4103727)
The patch version of 10.0.17134.48 (KB4103721)
This QID checks for following files and its versions for Windows 2008 SP2:
The patch version of %windir%\System32\Clfs.sys 6.0.6002.24361 (KB4130944)
The patch version of %windir%\System32\drivers\Vmms.exe 6.0.6002.24362 (KB4094079)
The patch version of %windir%\system32\Advapi32.dll 6.0.6002.24367 (KB4134651)
The patch version of %windir%\System32\Comsvcs.dll 2001.12.6932.24363 (KB4101477)
The patch version of %windir%\System32\Hhsetup.dll 6.0.6002.24396 (KB4130956)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4093107
KB4093112
KB4093119
KB4094079
KB4101477
KB4103712
KB4103715
KB4103716
KB4103718
KB4103721
KB4103723
KB4103725
KB4103726
KB4103727
KB4103730
KB4103731
KB4130944
KB4130956
KB4131188
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11). The security updated is rated Moderate for for Internet Explorer 9 (IE 9) and Internet Explorer 10 (IE 10) and Critical for Internet Explorer 11 (IE 11). The most severe of the vulnerabilities could allow remote code execution.
KB Articles associated with the Update:
1) 4103718
2) 4103768
3) 4103725
4) 4103723
5) 4103716
6) 4103731
7) 4103727
8) 4103721
9) 4103730
QID Detection Logic (Authenticated):
Operating Systems: Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This QID checks for the file version of %windir%\System32\mshtml.dll
The following KBs are checked:
The patch version is 11.0.9600.18978 (KB4103718 or KB4103725 or KB4103768)
The patch version is 11.0.10240.17861 (KB4103716)
The patch version is 11.0.14393.2248 (KB4103723)
The patch version is 11.0.15063.1088 (KB4103731)
The patch version is 11.0.16299.431 (KB4103727)
The patch version is 11.0.17134.48(KB4103727)
The patch version is 10.0.9200.22435 (KB4103730 or KB4103768)
The patch version is 9.0.8112.21219 (KB4103768)
1) Remote Code Execution
2) Information Disclosure
3) Security Feature Bypass
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide
KB Articles associated with the update:
1) KB4103723
2) KB4103716
3) KB4103731
4) KB4103727
5) KB4103721
Note: CVE-2018-0993 has been addressed for Windows 10 1507 only in May Updates. For remaining Windows versions please refer to April 2018 updates
QID Detection Logic (Authenticated):
Operating Systems: Windows 10 (1507, 1607, 1703, 1709 and 1803) and Windows Server 2016
This QID checks for the file version of %windir%\System32\edgehtml.dll
The following KBs are checked:
The patch version is 11.0.10240.17861 (KB4103716)
The patch version is 11.0.14393.2248 (KB4103723)
The patch version is 11.0.15063.1088 (KB4103731)
The patch version is 11.0.16299.431 (KB4103727)
The patch version is 11.0.17134.48(KB4103727)
1) Remote Code Execution
2) Information Disclosure
2) Security Feature Bypass
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide
A Denial of Service vulnerability exists when .NET, and .NET core, improperly process XML documents. (CVE-2018-0765)
KB4095512,KB4095513,KB4095514,KB4095515,KB4095517,KB4095518,KB4095519,KB4095872,KB4095873,KB4095874,KB4095875,KB4095876,KB4096235,KB4096236,KB4096237,KB4096416,KB4096417,KB4096418,KB4096494,KB4096495,KB4103716,KB4103721,KB4103723,KB4103727,KB4103731 are covered in this QID
This security update is rated Important for supported versions of Microsoft .NET Framework.
QID Detection Logic (Authenticated):
This QID checks for the vulnerable file version of system.security.dll
Patches:
The following are links for downloading patches to fix these vulnerabilities:
.NET Framework May 2018
QID Detection Logic:
Operating Systems: Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This authenticated QID checks for the file version of %windir%\System32\Macromed\Flash\Flash.ocx for file versions lesser than 29.0.0.171.
KB Articles associated with this update are: ADV180008
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4103729
This security updates contain following KBs:
KB2899590
KB3114889
KB3162075
KB3172436
KB4018308
KB4018327
KB4018381
KB4018382
KB4018383
KB4018388
KB4018390
KB4018393
KB4018396
KB4018398
KB4018399
KB4022130
KB4022135
KB4022137
KB4022139
KB4022141
KB4022142
KB4022145
KB4022146
KB4022150
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected office system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2018(Office)
KB Articles associated with this update are: KB4092041, KB4091243
Affected Versions:
Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 21
Microsoft Exchange Server 2013 Service Pack 1
Microsoft Exchange Server 2013 Cumulative Update 19
Microsoft Exchange Server 2016 Cumulative Update 8
Microsoft Exchange Server 2016 Cumulative Update 9
Microsoft Exchange Server 2013 Cumulative Update 20
QID Detection Logic:
File versions of bin\Exsetup.exe file are checked:
MS Exchange 2010: 14.3.399.2
MS Exchange 2013 - SP1: 15.0.847.62
MS Exchange 2013 - CU19 and CU20: 15.0.1365.7
MS Exchange 2016 - CU8 and CU9: 15.1.1415.7, 15.1.1466.8
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4091243
KB4092041
These new vulnerability checks are included in Qualys vulnerability signature 2.4.325-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.