Microsoft Patch Tuesday, August 2023 Security Update Review
2023-8-9 04:35:59 Author: blog.qualys.com(查看原文) 阅读量:32 收藏

Microsoft has released its August edition of Patch Tuesday. This month’s updates have addressed 89 security vulnerabilities in multiple products, features, and roles.

Microsoft Patch Tuesday for August 2023

Microsoft has addressed two zero-day publicly exploited vulnerabilities fixed in this month’s updates. Six of these 89 vulnerabilities are rated as Critical and 68 as Important. Microsoft has addressed 12 vulnerabilities related to Microsoft Edge (Chromium-based) in this month’s Patch Tuesday Edition.

Microsoft has also included two Defense in Depth Updates for Microsoft Office (ADV230003) and Memory Integrity System Readiness Scan Tool (ADV230004).

Microsoft Patch Tuesday, August edition includes updates for vulnerabilities in Microsoft Office and Components, .NET Core, .NET Framework, ASP.NET and Visual Studio, Azure Arc, Azure DevOps, Microsoft Windows Codecs Library, SQL Server, Windows Kernel, Windows LDAP – Lightweight Directory Access Protocol, Windows Message Queuing, Windows Mobile Device Management, Windows Projected File System, and more.

Microsoft has fixed several flaws in multiple software, including Denial of Service (DoS), Elevation of Privilege (EoP), Information Disclosure, Remote Code Execution (RCE), Security Feature Bypass, and Spoofing.

The August 2023 Microsoft vulnerabilities are classified as follows:

Vulnerability CategoryQuantitySeverities
Spoofing Vulnerability12Important: 12
Denial of Service Vulnerability8Important: 8
Elevation of Privilege Vulnerability18Important: 18
Information Disclosure Vulnerability10Important: 10
Security Feature Bypass Vulnerability4Important: 3
Remote Code Execution Vulnerability23Critical: 6
Important: 17

Zero-day Vulnerabilities Patched in August Patch Tuesday Edition

CVE-2023-36884: Windows Search Remote Code Execution Vulnerability

Microsoft released OS updates in the last month’s edition to address the vulnerability. In this month’s updates, Microsoft has released an additional Defense in Depth Update (ADV230003) to stop the attack chain used in the exploitation of the vulnerability.

Microsoft has updated the title from Office and Windows HTML Remote Code Execution Vulnerability to Windows Search Remote Code Execution Vulnerability in this month’s update.

An attacker may exploit the vulnerability in an email or instant message attack scenario by sending a specially crafted file. An attacker may pass plant a malicious file evading Mark of the Web (MOTW) defenses which can result in code execution on the victim system.

CVE-2023-38180: .NET and Visual Studio Denial of Service Vulnerability

The vulnerability may allow an attacker to perform a denial-of-service attack on a target system in a low-complexity attack without special privileges.

Microsoft has not provided any additional information regarding the vulnerability in the latest advisory.

Other Critical Severity Vulnerabilities Patched in August Patch Tuesday Edition

CVE-2023-29328, CVE-2023-29330: Microsoft Teams Remote Code Execution Vulnerability

An attacker is required to trick a user into joining a Teams meeting set up by them. It would allow the attacker to perform remote code execution in the context of the victim user. A successful remote attack performed by an attacker would enable them to access and alter user information. The attacker requires no privileges to perform the exploit.

CVE-2023-36910, CVE-2023-36911, & CVE-2023-35385: Microsoft Message Queuing Remote Code Execution Vulnerability

Message Queuing (MSMQ) is a protocol developed by Microsoft to ensure reliable communication between Windows computers across different networks, even when a host is temporarily not connected (by maintaining a message queue of undelivered messages).

To exploit this vulnerability, an attacker must send a specially crafted malicious MSMQ packet to an MSMQ server. An unauthenticated attacker may perform remote code execution on the target server by successfully exploiting the vulnerability.

CVE-2023-36895: Microsoft Outlook Remote Code Execution Vulnerability

To exploit the vulnerability, an attacker must convince a victim to download and open a specially crafted file from a website, leading to a local computer attack.

Microsoft Release Summary

This month’s release notes cover multiple Microsoft product families and products/versions affected, including, but not limited to, Memory Integrity System Readiness Scan Tool, Microsoft Exchange Server, Microsoft Teams, Windows Kernel, Windows Message Queuing, Windows Projected File System, Windows Reliability Analysis Metrics Calculation Engine, Windows Fax and Scan Service, Windows HTML Platform, ,Windows Bluetooth A2DP driver ,Microsoft Dynamics, .NET Core, ASP.NET and Visual Studio, Azure HDInsights, Azure DevOps, .NET Framework, Reliability Analysis Metrics Calculation Engine, Microsoft WDAC OLE DB provider for SQL, Windows Group Policy, Tablet Windows User Interface, ASP.NET, Windows Common Log File System Driver, Windows System Assessment Tool, Windows Cloud Files Mini Filter Driver, Windows Wireless Wide Area Network Service, Windows Cryptographic Services, Windows Hyper-V, Windows Smart Card, Dynamics Business Central Control, SQL Server, Microsoft Windows Codecs Library, Windows Defender, Azure Arc, ASP .NET, Windows LDAP – Lightweight Directory Access Protocol, and Windows Mobile Device Management.

Other Microsoft Vulnerability Highlights

  • CVE-2023-35359 is an elevation of privilege vulnerability that may allow an attacker to gain SYSTEM privileges. An attacker with local access to the targeted machine and the user may create folders and performance traces on the device with restricted privileges that normal users have by default.
  • CVE-2023-36900 is an elevation of privilege vulnerability in the Windows Common Log File System Driver. Successful exploitation of the vulnerability may allow an attacker to gain SYSTEM privileges.
  • CVE-2023-35380, CVE-2023-35382, and CVE-2023-35386 are elevation of privilege vulnerabilities in the Windows Kernel. Successful exploitation of the vulnerabilities may allow an attacker to gain SYSTEM privileges.
  • CVE-2023-35384 is a security feature bypass vulnerability in the Windows HTML Platforms. To exploit the vulnerability, an attacker must send the user a malicious file and convince them to open it. The vulnerability arises when the MSHTML platform fails to validate the correct Security Zone of requests for specific URLs. An attacker may exploit this to cause a user to access a URL in a less restricted Internet Security Zone than intended.
  • CVE-2023-35388 and CVE-2023-38182 are remote code execution vulnerabilities affecting Microsoft Exchange Server. To exploit these vulnerabilities, the attacker must be authenticated with LAN access and have credentials for a valid Exchange user. On successful exploitation, an attacker may perform remote code execution via a PowerShell remoting session.

EVALUATE Vendor-Suggested Mitigation with Policy Compliance (PC)

Qualys Policy Compliance’s Out-of-the-Box Mitigation or Compensatory Controls reduce the risk of a vulnerability being exploited because the remediation (fix/Patch) cannot be done now; these security controls are not recommended by any industry standards such as CIS, DISA-STIG.

Qualys Policy Compliance team releases these exclusive controls based on Vendor-suggested Mitigation/Workaround.

Mitigation refers to a setting, common configuration, or general best-practice existing in a default state that could reduce the severity of the exploitation of a vulnerability.

A workaround is a method, sometimes used temporarily, for achieving a task or goal when the usual or planned method isn’t working. Information technology often uses a workaround to overcome hardware, programming, or communication problems. Once a problem is fixed, a workaround is usually abandoned.

The following Qualys Policy Compliance Control IDs (CIDs) and System Defined Controls (SDC) have been updated to support Microsoft recommended mitigation(s) for this Patch Tuesday:

CVE-2023-35378: Windows Projected File System Elevation of Privilege Vulnerability

This vulnerability has a CVSS:3.1 7.0 / 6.1

Policy Compliance Control IDs (CIDs):

11511 List of installed features on the system

CVE-2023-35385, CVE-2023-36910, & CVE-2023-36911: Microsoft Message Queuing Remote Code Execution Vulnerability

This vulnerability has a CVSS:3.1 9.8 / 8.5

Policy Compliance Control IDs (CIDs):

4030 Status of the ‘Windows Message Queuing Service’

14916 Status of Windows Services

14297 Status of the open network connections and listening ports (Qualys Agent only)

The following QQL will return a posture assessment for the CIDs for this Patch Tuesday:

control.id: [4030,14916,14297,11511]

Qualys Custom Assessment and Remediation (CAR) can be leveraged to execute mitigation steps provided by MSRC on vulnerable assets.

The next Patch Tuesday falls on September 12, and we’ll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the ‘This Month in Vulnerabilities and Patches webinar.’

Qualys Monthly Webinar Series

The Qualys Research team hosts a monthly webinar series to help our existing customers leverage the seamless integration between Qualys Vulnerability Management Detection Response (VMDR) and Qualys Patch Management. Combining these two solutions can reduce the median time to remediate critical vulnerabilities.

During the webcast, we will discuss this month’s high-impact vulnerabilities, including those that are part of this month’s Patch Tuesday alert. We will walk you through the necessary steps to address the key vulnerabilities using Qualys VMDR and Qualys Patch Management.


Join the webinar

This Month in Vulnerabilities & Patches


文章来源: https://blog.qualys.com/vulnerabilities-threat-research/patch-tuesday/2023/08/08/microsoft-patch-tuesday-august-2023-security-update-review
如有侵权请联系:admin#unsafe.sh