October 3, 2023

Microsoft patched 73 CVEs in its August Patch Tuesday release, with six rated as critical and 67 rated as important. Microsoft also released two advisories (ADV230003 and ADV230004) this month as well as a patch for a vulnerability in AMD processors (CVE-2023-20569).

This month’s patches applicable for below products

  • .NET Core
  • .NET Framework
  • ASP.NET
  • ASP.NET and Visual Studio
  • Azure Arc
  • Azure DevOps
  • Azure HDInsights
  • Dynamics Business Central Control
  • Memory Integrity System Readiness Scan Tool
  • Microsoft Dynamics
  • Microsoft Exchange Server
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Teams
  • Microsoft WDAC OLE DB provider for SQL
  • Microsoft Windows Codecs Library
  • Reliability Analysis Metrics Calculation Engine
  • Role: Windows Hyper-V
  • SQL Server
  • Tablet Windows User Interface
  • Windows Bluetooth A2DP driver
  • Windows Cloud Files Mini Filter Driver
  • Windows Common Log File System Driver
  • Windows Cryptographic Services
  • Windows Defender
  • Windows Fax and Scan Service
  • Windows Group Policy
  • Windows HTML Platform
  • Windows Kernel
  • Windows LDAP – Lightweight Directory Access Protocol
  • Windows Message Queuing
  • Windows Mobile Device Management
  • Windows Projected File System
  • Windows Reliability Analysis Metrics Calculation Engine
  • Windows Smart Card
  • Windows System Assessment Tool
  • Windows Wireless Wide Area Network Service

.NET and Visual Studio DoS Vulnerability

CVE-2023-38180 is a Denial of Service vulnerability in Microsoft Visual Studio,.NET versions 6.0 and 7.0, and ASP.NET Core 2.1. It has a CVSSv3 score of 7.5 and rated as important. This vulnerability was exploited in the wild as a zero-day. An attacker that exploits this vulnerability would be able to create a DoS condition on a vulnerable server.

Advertisements

Microsoft Message Queuing RCE Vulnerability

CVE-2023-35385, CVE-2023-36910 and CVE-2023-36911 are RCE vulnerabilities in the Microsoft Message Queuing (MSMQ) component of Windows operating systems each with a CVSSv3 score of 9.8 and a rating of critical. Microsoft rated these vulnerabilities as Exploitation Less Likely.

A remote unauthenticated attacker can exploit this vulnerability by sending malicious MSMQ packets to a vulnerable MSMQ server leading to arbitrary code execution. To exploit this flaw, the Message Queuing service needs to be enabled on the vulnerable server. Microsoft says if the service is enabled, it runs under the service name “Message Queuing” and is listening on TCP port 1801.

Microsoft Exchange Server EoP Vulnerability

CVE-2023-21709 is an EoP vulnerability in Microsoft Exchange Server with a CVSSv3 score of 9.8 and is rated as Exploitation Less Likely. An unauthenticated attacker could exploit this vulnerability by attempting to brute force the password for valid user accounts. Successful exploitation would allow an attacker to login as another user.

According to the advisory, additional steps are required in order to address this vulnerability. After applying the patch, a PowerShell script must be run. We recommend reviewing the advisory for the latest information from Microsoft to successfully remediate this vulnerability. This is the third EoP vulnerability in Microsoft Exchange Server disclosed in 2023.

The first two were disclosed as part of the January 2023 Patch Tuesday release (CVE-2023-21763, CVE-2023-21764).

Windows Kernel EoP Vulnerability

CVE-2023-35359, CVE-2023-35380, CVE-2023-35382, CVE-2023-35386, and CVE-2023-38154 are EoP vulnerabilities in the Windows Kernel. All five vulnerabilities were assigned a CVSSv3 score of 7.8 and four are rated as Exploitation More Likely, and CVE-2023-38154 rated as “Exploitation Unlikely.” A local, authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges. Four of the five vulnerabilities are attributed to researchers from Google Project Zero.

Advertisements

Microsoft Office Defense in Depth Update

Microsoft released security advisory ADV230003 as part of its August Patch Tuesday release to provide “enhanced security as a defense in depth measure.” This update is in response to the discovery of CVE-2023-36884, a security feature bypass vulnerability affecting Windows and Windows Server installations that was disclosed as part of the July 2023 Patch Tuesday release.

ADV230003 does not directly address CVE-2023-36884, it was included as part of this month’s release as it “stops the attack chain” that leads to CVE-2023-36884. Organizations are encouraged to apply the Office updates listed in the advisory and apply the latest Windows updates for August.

Microsoft also updated its advisory page for CVE-2023-36884 as part of its August Patch Tuesday, including updating the title to a “Security Feature Bypass” in Windows Search, while the CVSSv3 score was reduced to 7.5 and the severity decreased from Critical to Important. Microsoft provided patching information to address the vulnerability.

Patch Summary

CVE IDCVE TitleSeverity
CVE-2023-36895Microsoft Outlook Remote Code Execution VulnerabilityCritical
CVE-2023-29328Microsoft Teams Remote Code Execution VulnerabilityCritical
CVE-2023-29330Microsoft Teams Remote Code Execution VulnerabilityCritical
CVE-2023-35385Microsoft Message Queuing Remote Code Execution VulnerabilityCritical
CVE-2023-36911Microsoft Message Queuing Remote Code Execution VulnerabilityCritical
CVE-2023-36910Microsoft Message Queuing Remote Code Execution VulnerabilityCritical
CVE-2023-38178.NET Core and Visual Studio Denial of Service VulnerabilityImportant
CVE-2023-35390.NET and Visual Studio Remote Code Execution VulnerabilityImportant
CVE-2023-36873.NET Framework Spoofing VulnerabilityImportant
CVE-2023-38180.NET and Visual Studio Denial of Service VulnerabilityImportant
CVE-2023-36899ASP.NET Elevation of Privilege VulnerabilityImportant
CVE-2023-35391ASP.NET Core SignalR and Visual Studio Information Disclosure VulnerabilityImportant
CVE-2023-38176Azure Arc-Enabled Servers Elevation of Privilege VulnerabilityImportant
CVE-2023-36869Azure DevOps Server Spoofing VulnerabilityImportant
CVE-2023-38188Azure Apache Hadoop Spoofing VulnerabilityImportant
CVE-2023-35393Azure Apache Hive Spoofing VulnerabilityImportant
CVE-2023-35394Azure HDInsight Jupyter Notebook Spoofing VulnerabilityImportant
CVE-2023-36881Azure Apache Ambari Spoofing VulnerabilityImportant
CVE-2023-36877Azure Apache Oozie Spoofing VulnerabilityImportant
CVE-2023-38167Microsoft Dynamics Business Central Elevation Of Privilege VulnerabilityImportant
CVE-2023-35389Microsoft Dynamics 365 On-Premises Remote Code Execution VulnerabilityImportant
CVE-2023-38185Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
CVE-2023-35388Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
CVE-2023-35368Microsoft Exchange Remote Code Execution VulnerabilityImportant
CVE-2023-38181Microsoft Exchange Server Spoofing VulnerabilityImportant
CVE-2023-38182Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
CVE-2023-21709Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
CVE-2023-36897Visual Studio Tools for Office Runtime Spoofing VulnerabilityImportant
CVE-2023-36896Microsoft Excel Remote Code Execution VulnerabilityImportant
CVE-2023-35371Microsoft Office Remote Code Execution VulnerabilityImportant
CVE-2023-36893Microsoft Outlook Spoofing VulnerabilityImportant
CVE-2023-36891Microsoft SharePoint Server Spoofing VulnerabilityImportant
CVE-2023-36894Microsoft SharePoint Server Information Disclosure VulnerabilityImportant
CVE-2023-36890Microsoft SharePoint Server Information Disclosure VulnerabilityImportant
CVE-2023-36892Microsoft SharePoint Server Spoofing VulnerabilityImportant
CVE-2023-35372Microsoft Office Visio Remote Code Execution VulnerabilityImportant
CVE-2023-36865Microsoft Office Visio Remote Code Execution VulnerabilityImportant
CVE-2023-36866Microsoft Office Visio Remote Code Execution VulnerabilityImportant
CVE-2023-36882Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant
CVE-2023-20569AMD: CVE-2023-20569 Return Address PredictorImportant
CVE-2023-38170HEVC Video Extensions Remote Code Execution VulnerabilityImportant
CVE-2023-36876Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege VulnerabilityImportant
CVE-2023-36908Windows Hyper-V Information Disclosure VulnerabilityImportant
CVE-2023-38169Microsoft OLE DB Remote Code Execution VulnerabilityImportant
CVE-2023-36898Tablet Windows User Interface Application Core Remote Code Execution VulnerabilityImportant
CVE-2023-35387Windows Bluetooth A2DP driver Elevation of Privilege VulnerabilityImportant
CVE-2023-36904Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
CVE-2023-36900Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
CVE-2023-36907Windows Cryptographic Services Information Disclosure VulnerabilityImportant
CVE-2023-36906Windows Cryptographic Services Information Disclosure VulnerabilityImportant
CVE-2023-38175Microsoft Windows Defender Elevation of Privilege VulnerabilityImportant
CVE-2023-35381Windows Fax Service Remote Code Execution VulnerabilityImportant
CVE-2023-36889Windows Group Policy Security Feature Bypass VulnerabilityImportant
CVE-2023-35384Windows HTML Platforms Security Feature Bypass VulnerabilityImportant
CVE-2023-35359Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-38154Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-35382Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-35386Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-35380Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2023-38184Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityImportant
CVE-2023-36909Microsoft Message Queuing Denial of Service VulnerabilityImportant
CVE-2023-35376Microsoft Message Queuing Denial of Service VulnerabilityImportant
CVE-2023-38172Microsoft Message Queuing Denial of Service VulnerabilityImportant
CVE-2023-35383Microsoft Message Queuing Information Disclosure VulnerabilityImportant
CVE-2023-36913Microsoft Message Queuing Information Disclosure VulnerabilityImportant
CVE-2023-35377Microsoft Message Queuing Denial of Service VulnerabilityImportant
CVE-2023-38254Microsoft Message Queuing Denial of Service VulnerabilityImportant
CVE-2023-36912Microsoft Message Queuing Denial of Service VulnerabilityImportant
CVE-2023-38186Windows Mobile Device Management Elevation of Privilege VulnerabilityImportant
CVE-2023-35378Windows Projected File System Elevation of Privilege VulnerabilityImportant
CVE-2023-35379Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege VulnerabilityImportant
CVE-2023-36914Windows Smart Card Resource Management Server Security Feature Bypass VulnerabilityImportant
CVE-2023-36903Windows System Assessment Tool Elevation of Privilege VulnerabilityImportant
CVE-2023-36905Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityImportant
ADV230004Memory Integrity System Readiness Scan Tool Defense in Depth UpdateModerate
CVE-2023-38157Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilityModerate
ADV230003Microsoft Office Defense in Depth UpdateModerate

Leave a Reply

%d bloggers like this: