Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 62 vulnerabilities that were fixed in 5 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 5 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
- Microsoft Outlook Security Feature Bypass Vulnerability (CVE-2017-11774). - Microsoft Office SharePoint XSS Vulnerability (CVE-2017-11775). - Microsoft Outlook Information Disclosure Vulnerability (CVE-2017-11776). - Microsoft Office SharePoint XSS Vulnerability (CVE-2017-11777). - Skype for Business Elevation of Privilege Vulnerability (CVE-2017-11786) - Microsoft Office SharePoint XSS Vulnerability (CVE-2017-11820) - Microsoft Office Remote Code Execution Vulnerability (CVE-2017-11825) - Microsoft Office Memory Corruption Vulnerability (CVE-2017-11826)
This security updates contain following KBs:
KB2553338
KB2837599
KB2920723
KB3172524
KB3172531
KB3213623
KB3213627
KB3213630
KB3213647
KB3213648
KB3213659
KB4011068
KB4011162
KB4011170
KB4011178
KB4011180
KB4011185
KB4011194
KB4011196
KB4011217
KB4011222
KB4011231
KB4011232
KB4011236
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update October 2017
KB Articles associated with the update:
1) KB4041676
2) KB4041689
3) KB4041691
Affected version are Microsoft Edge on all Windows 10 versions and Windows Server 2016.
QID Detection Logic (Authenticated):
Operating Systems: All versions of Windows 10 and Windows Server 2016
This QID checks for the file version of %windir%\System32\edgehtml.dll
The following KBs are checked:
The patch version is 11.0.10240.17643 (KB4042895)
The patch version is 11.0.10586.1176 (KB4041689)
The patch version is 11.0.14393.1770 (KB4041691)
The patch version is 11.0.15063.674 (KB4041676)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide
An elevation of privilege vulnerability exists when Skype for Business fails to properly handle specific authentication requests. An authenticated attacker who successfully exploited this vulnerability could steal an authentication hash that can be reused elsewhere. The attacker could then take any action that the user had permissions for, causing possible outcomes that could vary between users.
Affected Products:
Microsoft Lync 2013 Service Pack 1
Skype for Business 2016
KB Articles associated with this update: 4011159, 4011179
QID Detection Logic:
This authenticated QID detects file versions of Microsoft Lync and Skype for Business (lync.exe) lesser than 16.0.4600.1000 (KB4011159) and 15.0.4971.1000 (KB4011179)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4011159 Windows
KB4011179 Windows
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11). The security updated is rated Moderate for for Internet Explorer 9 (IE 9) and Internet Explorer 10 (IE 10) and Critical for Internet Explorer 11 (IE 11).
The Security Update addresses the vulnerabilities by fixing:
1) The update addresses the vulnerability by modifying how Internet Explorer handles objects in memory. (CVE-2017-11790)
2) The update addresses the vulnerability by modifying how the scripting engines objects in memory. (CVE-2017-11793)
3) The update addresses the vulnerability by modifying how the scripting engines objects in memory. (CVE-2017-11810)
4) The update addresses the vulnerability by modifying how Internet Explorer handles objects in memory. (CVE-2017-11813)
5) The update addresses the vulnerability by modifying how Internet Explorer handles objects in memory. (CVE-2017-11813)
KB Articles associated with the Update:
1) 4041681
2) 4040685
3) 4041689
4) 4041693
5) 4041691
6) 4042895
7) 4041676
8) 4041690
QID Detection Logic (Authenticated):
Operating Systems: Windows XP Embedded, Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This QID checks for the file version of %windir%\System32\mshtml.dll
The following KBs are checked:
The patch version is 8.0.6001.23992(KB4040685)
The patch version is 9.0.8112.21061 (KB4040685)
The patch version is 10.0.9200.22277 (KB4040685 or KB4041690)
The patch version is 11.0.9600.18817 (KB4041681 or KB4040685 or KB4041693)
The patch version is 11.0.10240.17643 (KB4042895)
The patch version is 11.0.10586.1176 (KB4041689)
The patch version is 11.0.14393.1770 (KB4041691)
The patch version is 11.0.15063.674 (KB4041676)
1) Remote Code Execution
3) Information Disclosure
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide
A denial of service vulnerability exists in the Microsoft SMB
when an attacker sends specially crafted requests to the server. (CVE-2017-11781)
An elevation of privilege vulnerability exists in the default Windows SMB Server configuration which allows anonymous users to remotely access certain named pipes that are also configured to allow anonymous access to users who are logged on locally. (CVE-2017-11782)
An elevation of privilege vulnerability exists when Windows improperly handles calls to ALPC
. (CVE-2017-11783)
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. (CVE-2017-11762)
A remote code execution vulnerability exists in the way that the Microsoft SMBv1
server handles certain requests. (CVE-2017-11780)
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. (CVE-2017-11763)
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2017-11765)
A remote code execution vulnerability exists in the way that certain Windows components handle the loading of DLL files. (CVE-2017-11769)
A remote code execution vulnerability exists when Windows Search handles objects in memory. (CVE-2017-11771)
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel ASLR bypass. (CVE-2017-11785)
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. (CVE-2017-11814, CVE-2017-11817)
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. (CVE-2017-11815)
An information disclosure vulnerability exists in the way that the GDI
handles objects in memory, allowing an attacker to retrieve information from a targeted system. (CVE-2017-11816)
An Security Feature bypass vulnerability exists in Microsoft Windows storage when it fails to validate an integrity-level check. (CVE-2017-11818)
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. (CVE-2017-11819)
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. (CVE-2017-11823)
An elevation of privilege vulnerability exists when the Windows Update Delivery Optimization does not properly enforce file share permissions. (CVE-2017-11829)
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. (CVE-2017-8689)
A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system. (CVE-2017-8717, CVE-2017-8718)
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory via the Microsoft Windows Text Services Framework. (CVE-2017-8727)
Vulnerability in TPM could allow Security Feature Bypass. (CVE-2017-15361)
KRACK Attack man in the middle vulnerability. (CVE-2017-13080)
KB Articles associated with the Update:
KB4041689
KB4041693
KB4038793
KB4041687
KB4041690
KB4041679
KB4038786
KB4041691
KB4042895
KB4041676
KB4042723
KB4042122
KB4041681
KB4041678
KB4042120
KB4042067
KB4041995
KB4041671
KB4042121
KB4041944
KB4042007
KB4042123
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4038792
These new vulnerability checks are included in Qualys vulnerability signature 2.4.159-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.