Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 62 vulnerabilities that were fixed in 7 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 7 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
QID Detection Logic (Authenticated):
Operating Systems: Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This QID checks for the file version of %windir%\System32\Macromed\Flash\Flash.ocx
The following KBs are checked:
The patch version of 26.0.0.137 (KB4025376)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4025376
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11). The security updated is rated Moderate for for Internet Explorer 9 (IE 9) and Internet Explorer 10 (IE 10) and Critical for Internet Explorer 11 (IE 11).
The Security Update addresses the vulnerabilities by fixing:
1) The update addresses the vulnerability by fixing how Microsoft browser handles redirect requests. (CVE-2017-8592)
2) The update addresses the vulnerability by modifying how Internet Explorer handles objects in memory. (CVE-2017-8594)
3) The update addresses the vulnerability by fixing how Microsoft browser parse HTTP responses. (CVE-2017-8602)
4) The update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines objects in memory. (CVE-2017-8606)
5) The update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines objects in memory. (CVE-2017-8607)
6) The update addresses the vulnerability by modifying how Microsoft browser JavaScript scripting engines objects in memory. (CVE-2017-8608)
7) The update addresses the vulnerability by modifying how VBScript scripting engine handles objects in memory. (CVE-2017-8618)
KB Articles associated with the Update:
1)4025341
2)4025252
3)4025344
4)4025336
5)4025339
6)4025338
7)4025342
8)4025331
QID Detection Logic (Authenticated):
Operating Systems: Windows XP Embedded, Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8.1, Windows RT 8.1, Windows10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This QID checks for the file version of %windir%\System32\mshtml.dll
The following KBs are checked:
The patch version of 8.0.6001.23962(KB4025252)
The patch version of 9.0.8112.16918 (KB4025252)
The patch version of 9.0.8112.21029 (KB4025252)
The patch version of 10.0.9200.22207 (KB4025252 or KB4025331)
The patch version of 11.0.9600.18739 (KB4025341 or KB4025252 or KB4025336)
The patch version of 11.0.10240.17488 (KB4025338)
The patch version of 11.0.10586.1007 (KB4025344)
The patch version of 11.0.14393.1478 (KB4025339)
The patch version of 11.0.15063.483 (KB4025342)
1) Remote Code Execution
2) Spoofing
3) Security Feature Bypass
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide
- Microsoft Office Remote Code Execution Vulnerability(CVE-2017-0243).
- Microsoft Office Memory Corruption Vulnerability(CVE-2017-8501).
- Microsoft Office Memory Corruption Vulnerability(CVE-2017-8502).
- SharePoint Server XSS Vulnerability(CVE-2017-8569)
- Microsoft Office Remote Code Execution Vulnerability(CVE-2017-8570)
This security updates contain following KBs:
KB2880514
KB3191833
KB3191894
KB3191897
KB3191902
KB3191907
KB3203459
KB3203468
KB3203469
KB3203477
KB3212224
KB3213537
KB3213544
KB3213545
KB3213555
KB3213559
KB3213624
KB3213640
KB3213657
New KBs added in detection for CVE-2017-8571, CVE-2017-8572, CVE-2017-8663 (on 07/27/2017):
KB4011052
KB4011078
KB2956078
KB3213643
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB2880514(Microsoft Office 2007)
KB2956078 32-bit version of Outlook 2010(Microsoft Office 2010)
KB2956078 64-bit version of Outlook 2010(Microsoft Office 2010)
KB3191833(Microsoft Office 2007)
KB3191894(Microsoft Office 2007)
KB3191897(Microsoft Office 2007)
KB3191902(SharePoint Server 2010)
KB3191907 32-bit version of Excel 2010(Microsoft Office 2010)
KB3191907 64-bit version of Excel 2010(Microsoft Office 2010)
KB3203459 64-bit version of SharePoint Server 2010(Microsoft Office 2010)
KB3203468 32-bit version of Office 2010(Microsoft Office 2010)
KB3203468 64-bit version of Office 2010(Microsoft Office 2010)
KB3203469(Microsoft Office Web Apps 2010)
KB3203477 32-bit version of Excel 2016(Microsoft Office 2016)
KB3203477 64-bit version of Excel 2016(Microsoft Office 2016)
KB3213537 32-bit version of Excel 2013(Microsoft Office 2013)
KB3213537 64-bit version of Excel 2013(Microsoft Office 2013)
KB3213544(Microsoft SharePoint Server 2016)
KB3213545 32-bit version of Office 2016(Microsoft Office 2016)
KB3213545 64-bit version of Office 2016(Microsoft Office 2016)
KB3213555 32-bit version of Office 2013(Microsoft Office 2013)
KB3213555 64-bit version of Office 2013(Microsoft Office 2013)
KB3213559(Microsoft SharePoint Server 2013)
KB3213624 32-bit version of Office 2010(Microsoft Office 2010)
KB3213624 64-bit version of Office 2010(Microsoft Office 2010)
KB3213640(Microsoft Office 2010)
KB3213643 32-bit version of Outlook 2007(Microsoft Office 2007)
KB4011052 32-bit version of Outlook 2016(Microsoft Office 2016)
KB4011052 64-bit version of Outlook 2016(Microsoft Office 2016)
KB4011078 32-bit version of Outlook 2013(Microsoft Office 2013)
KB4011078 32-bit version of Outlook 2013(Microsoft Office 2013)
Mac 2011 14.7.6 update(Microsoft Office for Mac 2011)
KB Articles associated with this update are: 4018588
QID Detection Logic:
This authenticated detection works by checking for the existence of the following registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2010\SP3\KB4018588
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2013\KB4018588
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2013\SP1\KB4018588
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Exchange 2016\KB4018588
The following files are also checked:
Exsetup.exe lesser than 15.1.845.36
Exsetup.exe lesser than 15.0.1293.4
Exsetup.exe lesser than 15.0.847.55
Exsetup.exe lesser than 14.3.361.1
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4018588
The KB Articles associated with the update:
KB4025397
KB4025341
KB4025337
KB4025336
KB4025333
KB4025344
KB4025331
KB4025343
KB4025339NOTE: This KB was removed by microsoft, also is superseded by KB4025334 and later
KB4025338
KB4025342
KB4025497
KB4025877
KB4022746
KB4025398
KB4025409
KB4022748
KB4025872
KB4022914
KB4025674
KB4026061
KB4032955
KB4026059
KB4025240
KB4034879
NOTE: CVE-2017-8543 only affects Windows 10 Version 1607 and Windows 10 Version 1703 for this QID.
QID Detection Logic (Authenticated):
This QID checks for Windows 2008 SP2 through below registry key
%windir%\system32\Wdc.dll
%windir%\System32\browseui.dll
%windir%\system32\win32k.sys
%windir%\system32\Kerberos.dll
%windir%\System32\Msinfo32.exe
%windir%\System32\Wldap32.dll
%windir%\System32\drivers\netio.sys
%windir%\System32\Drivers\Http.sys
%windir%\System32\Drivers\Ntfs.sys
%ProgramFiles%\Windows NT\Accessories\wordpad.exe
%windir%\System32\Query.dll
%windir%\System32\Clfs.sys
%windir%\system32\Msxml3.dll
%windir%\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll
For Windows Server 2008 R2, Windows 7, Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2: %windir%\system32\win32k.sys
For Windows 10, Server 2016: %windir%\system32\win32kfull.sys
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4022746
KB4022748
KB4022914
KB4025240
KB4025331
KB4025333
KB4025336
KB4025337
KB4025338
KB4025339 This KB was removed by microsoft, also is superseded by KB4025334 and later
KB4025341
KB4025342
KB4025343
KB4025344
KB4025397
KB4025398
KB4025409
KB4025497
KB4025674
KB4025872
KB4025877
KB4026059
KB4026061
KB4032955
1) 4025344
2) 4025338
3) 4025339
4) 4025342
QID Detection Logic (Authenticated):
Operating Systems: All versions of Windows 10 and Windows Server 2016
This QID checks for the file version of %windir%\System32\edgehtml.dll
The following KBs are checked:
The patch version is 11.0.10586.1007 (KB4025344)
The patch version is 11.0.14393.1478 (KB4025339)
The patch version is 11.0.15063.483 (KB4025342)
The patch version is 11.0.10240.17488 (KB4025338)
1) Remote Code Execution
2) Spoofing
3) Security Feature bypass
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Edge Security Update for July 2017 Windows 10 Version 1511 for x86 and x64
Edge Security Update for July 2017 Windows 10 Version 1607 for x86 and x64
Edge Security Update for July 2017 Windows 10 Version 1703 for x86 and x64
Edge Security Update for July 2017 Windows 10 for x86 and x64
Edge Security Update for July 2017 Windows Server 2016
KB4025338,KB4025344,KB4025342,KB4025339 are covered in this QID.
This security update is rated Important for supported versions of Microsoft .NET Framework.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB4025338 Windows 10 Version 1507
KB4025339 Windows 10 Version 1607
KB4025342 Windows 10 Version 1703
KB4025344 Windows 10 Version 1511
These new vulnerability checks are included in Qualys vulnerability signature 2.4.83-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.