Microsoft Patches To Fix Two Critical Zero-Day Flaws

Microsoft finally released patches for almost 67 vulnerabilities including two critical Zero-Day flaws.

Since last year microsoft addressed 67 vulnerabilities in their products.
In which 21 of them marked as critical,42 rated as important and 4 as low severity.

https://codextech.blogspot.com/2018/05/microsofts-patches-for-two-critical-zero-day-flaws.html
Microsoft-patches-2k18

These patches provided a fix in their products including




IE Zero-Day “double kill” flaw


This Zero-Day flaw treated as most critical RCE(Remote Code Execution) flaw which is revealed by Chinese Security Researchers team



CVE-2018-8174 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Security researchers at Qihoo 360 said



We found that it is the first APT(Advanced Persistent Threat) campaign that forms its attack with an Office document embedding a newly discovered Internet Explorer 0-day exploit. As soon as anyone opens the malicious document, they get infected and give away control of their computers

Attackers can gain full gain access by sending RCE binded malicious documents so that it gives full access to attackers when user opens it.



2. CVE-2018-8120 | Win32k Elevation of Privilege Vulnerability. 

Second Zero-Day critical flaw in windows32k component.It occurs when it fails to handle objects in the memory.

An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.


To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses this vulnerability by correcting how Win32k handles objects in memory. said microsoft officials



Also read 

Common Vulnerability Exploits 2k18 
 
Android P to block apps from monitoring device network activity



Post a Comment

0 Comments