June 2017 - Microsoft Releases 15 Security Patches
Publish date: July 11, 2017
Advisory Date: JUN 14, 2017
DESCRIPTION
Microsoft addresses several vulnerabilities in its June batch of patches:
- MS08-067 | Vulnerability in Server Service Could Allow Remote Code Execution (958644)
Risk Rating: Critical
This security update resolves a vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. - MS09-050 | Vulnerabilities in SMBv2 Could Allow Remote Code Execution (975517)
Risk Rating: Critical
This security update resolves three vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service. - MS10-061 | Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290)
Risk Rating: Critical
This security update resolves a vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. - MS14-068 | Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)
Risk Rating: Critical
This security update resolves a vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. - MS17-010 | Security Update for Microsoft Windows SMB Server (4013389)
Risk Rating: Critical
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server. - MS17-013 | Security Update for Microsoft Graphics Component (4013075)
Risk Rating: Critical
This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Microsoft Lync, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. - CVE-2017-0176 | Remote Desktop Protocol Remote Code Execution Vulnerability (CVE-2017-0176 )
Risk Rating: Critical
A remote code execution vulnerability exists in Remote Desktop Protocol (RDP) if the RDP server has Smart Card authentication enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. - CVE-2017-0222| Internet Explorer Memory Corruption Vulnerability (CVE-2017-0222)
Risk Rating: Critical
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. - CVE-2017-0231 | Microsoft Browser Spoofing Vulnerability
Risk Rating: Critical
This vulnerability exists in Internet Explorer 11 and Microsoft Edge browsers. The vulnerability lies in the rendering of SmartScreen Filter. - CVE-2017-0267 - CVE-2017-0280 | Security Update for Microsoft Windows SMB (CVEs 2017-0267 through 2017-0280)
Risk Rating: Critical
Security updates exist in Microsoft Windows SMB. The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted packets to a Microsoft Server Message Block 1.0 (SMBv1) server. - CVE-2017-7269 | WebDAV Remote Code Execution Vulnerability (CVE-2017-7269)
Risk Rating: Critical
A vulnerability exists in IIS when WebDAV improperly handles objects in memory, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. - CVE-2017-8461 | Windows RPC Remote Code Execution Vulnerability (CVE-2017-8461)
Risk Rating: Critical
A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. - CVE-2017-8464 | LNK Remote Code Execution Vulnerability (CVE-2017-8464)
Risk Rating: Critical
A remote code execution exists in Microsoft Windows that could allow remote code execution if the icon of a specially crafted shortcut is displayed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. - CVE-2017-8487 | Windows olecnv32.dll Remote Code Execution Vulnerability (CVE-2017-8487)
Risk Rating: Critical
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code. - CVE-2017-8543 | Windows Search Remote Code Execution Vulnerability (CVE-2017-8543)
Risk Rating: Critical
A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. - CVE-2017-8552 | Win32k Elevation of Privilege Vulnerability
Risk Rating: Important
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using the Vulnerability Protection product or OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
Vulnerability ID | DPI Rule Number | DPI Rule Name | Release Date | Vulnerability Protection and IDF Compatibility |
CVE-2017-8529 | 1008444 | Microsoft Internet Explorer And Edge Information Disclosure Vulnerability (CVE-2017-8529) | 14-June-17 | YES |
CVE-2017-8547 | 1008446 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2017-8547) | 14-June-17 | YES |
CVE-2017-8509 | 1008441 | Microsoft Office Remote Code Execution Vulnerability (CVE-2017-8509) | 14-June-17 | YES |
CVE-2017-8464 | 1008435 | Microsoft Windows LNK Remote Code Execution Vulnerability (CVE-2017-8464) | 14-June-17 | YES |
CVE-2017-8346 | 1008428 | ImageMagick Denial Of Service Vulnerability (CVE-2017-8346) | 14-June-17 | YES |
CVE-2017-8496 | 1008439 | Microsoft Edge Memory Corruption Vulnerability (CVE-2017-8496) | 14-June-17 | YES |
CVE-2017-0215 | 1008434 | Microsoft Device Guard Code Integrity Policy Security Feature Bypass Vulnerability (CVE-2017-0215) | 14-June-17 | YES |
CVE-2017-8510 | 1008442 | Microsoft Office Remote Code Execution Vulnerability (CVE-2017-8510) | 14-June-17 | YES |
CVE-2017-8465, CVE-2017-8466, CVE-2017-8468 | 1008448 | Microsoft Windows Multiple Elevation Of Privilege Vulnerabilities (June-2017) | 14-June-17 | YES |
CVE-2017-8497 | 1008440 | Microsoft Edge Memory Corruption Vulnerability (CVE-2017-8497) | 14-June-17 | YES |
CVE-2017-8524 | 1008443 | Microsoft Internet Explorer And Edge Scripting Engine Memory Corruption Vulnerability (CVE-2017-8524) | 14-June-17 | YES |
SOLUTION
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more