This webpage was generated automatically; to view the article in its initial site you may follow the link below:
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2020-034
if you wish to delete this article from our website please reach out to us
CVE Identifier
Summary
Fundamental Score
Source
CVE-2020-1595
A vulnerability allowing remote code execution is present in Microsoft SharePoint where API endpoints are not adequately secured against harmful data input. An adversary who successfully leverages the flaw could execute arbitrary commands in the context of the SharePoint application pool and the SharePoint server farm account.
To exploit this vulnerability, a user must interact with a vulnerable API on a compromised version of SharePoint using specially crafted inputs.
The security patch resolves the vulnerability by rectifying the manner in which SharePoint processes deserialization of untrusted data.
9.9
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595
CVE-2020-1210
A remote code execution weakness is present in Microsoft SharePoint when the application fails to verify the source markup of an application package. An assailant who successfully harnesses the vulnerability may execute arbitrary code within the context of the SharePoint application pool and the SharePoint server farm account.
To exploit this vulnerability, a user must upload a specially crafted SharePoint application package to a vulnerable version of SharePoint.
The security patch remedies the vulnerability by adjusting how SharePoint verifies the source markup of application packages.
9.9
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1210
CVE-2020-16875
A remote code execution flaw exists within Microsoft Exchange server attributed to inadequate validation of cmdlet parameters.
An assailant who successfully takes advantage of this flaw could execute arbitrary code under the context of the System user. To exploit this vulnerability, an authenticated user in a specific Exchange role needs to be compromised.
The security patch rectifies the flaw by modifying how Microsoft Exchange processes cmdlet parameters.
9.1
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875
CVE-2020-1129
A remote code execution vulnerability is present in the manner in which the Microsoft Windows Codecs Library manages objects in memory. An attacker who successfully leverages this vulnerability may gain access to data that further endangers the user’s system.
Exploitation of this flaw necessitates that a program processes a specifically crafted image file.
The update resolves the weakness by amending how the Microsoft Windows Codecs Library processes objects in memory.
8.8
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1129
CVE-2020-0922
A vulnerability permitting remote code execution is present in the manner Microsoft COM for Windows manages objects in memory. An assailant who successfully exploits this vulnerability may execute arbitrary code on an impacted system.
For exploiting the vulnerability, a user would need to open a specially tailored file or induce the target to navigate to a website containing harmful JavaScript.
The security update resolves the vulnerability by rectifying how Microsoft COM for Windows handles objects in memory.
8.8
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922
CVE-2020-1453
A vulnerability for remote code execution exists in Microsoft SharePoint when the application fails to validate the source markup of an application package. An assailant who successfully utilizes the vulnerability could execute arbitrary code within the context of the SharePoint application pool along with the SharePoint server farm account.
To exploit this vulnerability, a user must upload a specially designed SharePoint application package to an impacted version of SharePoint.
The security patch resolves the vulnerability by fixing the manner in which SharePoint validates the source markup of application packages.
8.6
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1453
CVE-2020-1452
A vulnerability for remote code execution exists in Microsoft SharePoint when the application fails to check the source markup of an application package. An assailant who successfully utilized the vulnerability could execute arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.
Utilizing this vulnerability requires that a user uploads a custom SharePoint application package to a compromised version of SharePoint.
The security update rectifies the vulnerability by amending how SharePoint validates the source markup of application packages.
“`html
8.6
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1452
CVE-2020-1200
A vulnerability allowing remote code execution exists in Microsoft SharePoint when the application fails to validate the source markup of an application package. An assailant who successfully leveraged this weakness could execute arbitrary code within the context of the SharePoint application pool and the SharePoint server farm account.
For this vulnerability to be exploited, a user must upload a specially designed SharePoint application package to an affected version of SharePoint.
The security patch remedies the vulnerability by correcting the manner in which SharePoint verifies the source markup of application packages.
8.6
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200
CVE-2020-1460
A remote code execution flaw is present in Microsoft SharePoint Server due to its inability to adequately recognize and filter untrusted ASP.Net web controls. An authenticated assailant who successfully takes advantage of the vulnerability could utilize a specially designed page to execute actions within the security framework of the SharePoint application pool process.
To leverage the vulnerability, an authenticated individual has to design and execute a specially crafted page on a vulnerable version of Microsoft SharePoint Server.
The security patch resolves the vulnerability by amending how Microsoft SharePoint Server manages the processing of created content.
8.6
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460
CVE-2020-1576
A remote code execution vulnerability is found in Microsoft SharePoint when the software neglects to validate the source markup of an application package. Successfully exploiting this weakness allows an attacker to execute arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.
Gaining unauthorized access to this vulnerability necessitates that a user uploads a specifically crafted SharePoint application package onto an impacted version of SharePoint.
The security enhancement resolves the weakness by modifying how SharePoint verifies the source markup of application packages.
8.5
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1576
CVE-2020-1285
A remote code execution flaw exists in the manner in which the Windows Graphics Device Interface (GDI) manages objects in memory. An adversary who successfully exploited this flaw could gain control over the impacted system. An attacker could consequently install applications; access, modify, or erase data; or generate new accounts with full user privileges. Individuals whose accounts are set up with limited user privileges on the device may experience less impact than those operating with administrative user privileges.
There are numerous methods an attacker might use to leverage this vulnerability:
-
In a browser-based attack scenario, an adversary could establish a specially designed site aimed at exploiting the vulnerability and persuade users to visit it. An attacker wouldn’t have the means to compel users to view the content they control. Instead, they would need to persuade users to undertake certain actions, commonly by convincing them to open an email attachment or click on a link in an email or instant message.
-
In a document-sharing attack scenario, an attacker may present a specially crafted file that is configured to exploit the vulnerability, and then persuade users to open that document.
The security enhancement resolves the weakness by modifying how the Windows GDI handles objects in memory.
“`html
8.4
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1285
CVE-2020-0997
There exists a remote code execution vulnerability when the Windows Camera Codec Pack inaccurately processes objects in memory. An attacker who manages to exploit this vulnerability could execute arbitrary code in the context of the current user. If the current user has administrative privileges, the attacker might gain control of the affected system. This could enable the attacker to install software, access, modify, or erase data; or establish new accounts with full user permissions. Users whose accounts are set up with limited permissions could be less affected than those operating with administrative rights.
To exploit the vulnerability, a user must open a specifically crafted file using an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker might exploit the vulnerability by sending the specifically crafted file to the user and persuading them to open it. In a web-based attack scenario, an attacker could host a site (or make use of a compromised site that accepts or hosts user-supplied content) containing a specifically crafted file aimed at exploiting the vulnerability. An attacker cannot force users to visit the site; rather, they must convince users to click on a link, often through an incentive in an email or instant message, and then persuade them to open the specially crafted file.
The security patch resolves the vulnerability by modifying how the Windows Camera Codec Pack manages objects in memory.
7.8
“““html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0997
CVE-2020-1252
A vulnerability for remote code execution is present when Windows inadequately processes objects held in memory. For an attacker to exploit this vulnerability, they must persuade a user to execute a specially designed application.
If an attacker successfully exploited this flaw, they could run arbitrary code and seize control of the compromised system. This could allow the attacker to install software, view, alter, or delete data, or create new user accounts with full rights.
The updates mitigate the vulnerability by refining how Windows manages objects in memory.
7.8
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1252
CVE-2020-16874
A vulnerability concerning remote code execution arises within Visual Studio due to improper handling of objects in memory. An attacker who effectively exploits this flaw could execute arbitrary code within the context of the current user. Should the user be logged in with administrative privileges, the attacker could gain control over the affected system. Thereafter, an attacker could install applications, access, change, or eliminate data, or establish new accounts with comprehensive user rights. Users whose accounts have been set up to possess limited user rights…
“`on the platform might experience reduced effects compared to individuals who function with administrative user permissions.
To take advantage of the flaw, a perpetrator would need to persuade a user to open a specifically designed file using an affected version of Visual Studio.
The patch resolves the vulnerability by modifying how Visual Studio manages objects within memory.
7.8
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16874
CVE-2020-1593
A remote code execution vulnerability is present when Windows Media Audio Decoder inadequately manages objects. An attacker who effectively exploited the vulnerability might gain control over an affected system.
There are various methods through which an attacker could exploit the vulnerability, such as persuading a user to open a specifically crafted document or convincing them to access a malicious website.
The security patch fixes the vulnerability by rectifying how Windows Media Audio Decoder manages objects.
7.6
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1593
CVE-2020-1508
A remote code execution vulnerability occurs when Windows Media Audio Decoder inadequately manages objects. An attacker who successfully capitalizes on the vulnerability could seize control of an affected system.
There are various methods through which an attacker could exploit the vulnerability, such as persuading a user to open a specially crafted document or prompting a user to navigate to a malicious site.
The security patch resolves the vulnerability by rectifying how Windows Media Audio Decoder manages objects.
7.6
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1508
CVE-2020-0908
A remote code execution vulnerability
“`
arises when the Windows Text Service Module mishandles memory. An attacker who effectively leverages the vulnerability could achieve execution on an affected system.
An attacker could create a specifically designed website aimed at taking advantage of the vulnerability via Microsoft Edge (Chromium-based), and then persuade a user to visit this website. The attacker might also exploit compromised sites and those that allow user-supplied content or advertisements by integrating specially crafted material capable of exploiting the vulnerability. Nonetheless, in all scenarios, an attacker cannot compel users to view the content under their control. Instead, an attacker must persuade users to act, generally through enticing messages in emails or Instant Messenger, or by encouraging them to open an email attachment.
The security patch rectifies the vulnerability by modifying how the Windows Text Service Module manages memory.
7.5
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0908
CVE-2020-1319
A remote code execution vulnerability is present in the manner Microsoft Windows Codecs Library manages objects in memory. An attacker who successfully exploits this vulnerability could seize control of the impacted system. The attacker could subsequently install applications; view, modify, or delete information; or establish new accounts with complete user privileges.
To exploit this vulnerability, a program must process a specifically crafted image file.
The update remedies the vulnerability by amending how the Microsoft Windows Codecs Library manages objects within memory.
7.3
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1319
CVE-2020-16857
A remote code execution flaw is present in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11. An assailant who successfully exploited this flaw could obtain remote code execution through server-side script execution on the compromised server.
An authenticated attacker with authority to import and export data could leverage this flaw by transmitting a specially crafted file to an at-risk Dynamics server.
The security patch addresses the flaw by amending how Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11 processes user input.
7.1
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16857
CVE-2020-16862
A remote code execution flaw is present in Microsoft Dynamics 365 (on-premises) due to the server inadequately sanitizing web requests to an affected Dynamics instance. A perpetrator who successfully exploited this flaw could execute arbitrary code in the SQL service account’s context. An authenticated malicious actor could take advantage of this vulnerability by dispatching a specially tailored request to a compromised Dynamics server. The security update rectifies the flaw by amending how Microsoft Dynamics 365 (on-premises) verifies and sanitizes user inputs.
7.1
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16862
CVE-2020-1172
A remote code execution weakness exists in how the ChakraCore scripting engine manages objects in memory. This vulnerability has the potential to corrupt memory in a manner that allows an attacker to execute arbitrary code within the context of the current user. A successful exploitation of this flaw grants an attacker the same user privileges as the active user.
If the active user is logged in with administrative rights, an attacker who successfully exploits this vulnerability could gain control over the compromised system. This control would enable the attacker to install software; view, modify, or erase data; or establish new accounts with complete user rights.
The security update rectifies the vulnerability by altering how the ChakraCore scripting engine processes objects in memory.
4.2
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1172
CVE-2020-1057
A remote code execution flaw exists in the manner that the ChakraCore scripting engine manages objects in memory. The flaw could compromise memory in such a manner that an attacker could carry out arbitrary code within the current user’s context. An attacker who effectively exploited the flaw could achieve the same rights as the active user.
If the current user is logged in with administrative user permissions, an attacker who successfully exploited this vulnerability might seize control of an affected system. The attacker could then install applications; observe, modify, or erase data; or create new accounts with complete user privileges.
The security patch addresses the vulnerability by altering how the ChakraCore scripting engine manages objects in memory.
4.2
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057
CVE-2020-0878
A remote code execution vulnerability is present in the manner that Microsoft browsers interact with objects in memory. This flaw may corrupt memory in such a way that it enables an attacker to run arbitrary code in the current user’s context. An adversary who successfully exploits this vulnerability could obtain the same user privileges as the ongoing user. If the current user is logged in with administrative rights, the perpetrator might hijack control of an affected device. Consequently, an attacker could proceed to install applications; view, modify, or erase data; or create new accounts with full user privileges.
An attacker could establish a carefully designed website aimed at exploiting the flaw via Microsoft browsers, then persuade a user to access this site. The perpetrator might also leverage compromised sites or those that permit user-generated content or advertisements, integrating specially crafted content to exploit the vulnerability. Nonetheless, in every scenario, the attacker would lack the means to compel users to view the content controlled by them. Rather, an attacker would need to persuade users to engage, typically through bait in emails or instant messages, or by prompting them to open an email attachment.
The security update mitigates the vulnerability by altering how Microsoft browsers manage objects in memory.
4.2
This page was programmatically generated; to read the article in its authentic location, you can follow the link below:
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2020-034
and if you wish to remove this article from our website, please contact us