The December 2018 Security Update Review
December 11, 2018 | Dustin ChildsDecember is here and with it comes the latest in security offerings from Adobe and Microsoft. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month.
Adobe Patches for December 2018
Adobe got an early start on the December release by shipping their patch for Flash on December 5. The patch actually addresses two CVEs, but only one – CVE-2018-15982 – is listed as being under active attack. The attack involves an embedded Flash SWF within a Microsoft Office document. The use-after-free exploit allows the attacker to execute code at the level of the logged on user. The document is spread through spear phishing campaigns, so remember the importance of good email practices. Flash exploitation had been on the decline since browsers are doing more to block Flash content. However, exploit writers have shifted their techniques to embedding Flash in Office docs to take advantage of vulnerabilities in the media player.
Today, Adobe released a massive update for Acrobat and Reader covering 87 CVEs. A total of 39 of these came through the ZDI program. The security bulletin also acknowledges ZDI researcher Abdul-Aziz Hariri for his defense-in-depth contributions to hardening JavaScript API restrictions bypasses and for his contributions to mitigate the Onix Indexing attack surface. None of these CVEs are noted as being under active attack. All but one of these are listed as Important in severity, with the exception being a lone Moderate CVE. About half of these CVEs cover Out-Of-Bounds (OOB) read bugs, but the patch also corrects UAFs, OOB writes, security feature bypasses, buffer errors, heap overflows, integer overflows, and an untrusted pointer dereference. This is the second Reader patch of this magnitude in 2018. It will be interesting to see if the volume continues in 2019.
Microsoft Patches for December 2018
Microsoft closes out 2018 with a relatively small release of 39 security patches and one advisory covering Internet Explorer (IE), Edge, ChackraCore, Microsoft Windows, Office and Microsoft Office Services and Web Apps, and the .NET Framework. Of these 39 CVEs, 9 are listed as Critical and 30 are rated Important in severity. A total of five of these CVEs came through the ZDI program. One of these bugs is listed as publicly known at the time of release and one of these is reported as being actively exploited.
Let’s take a closer look at some of the more interesting patches for this month, starting with the issue currently under active attack:
- CVE-2018-8611 – Win32k Elevation of Privilege Vulnerability
For the third month in a row, December has a Win32K (kernel-mode drivers) elevation of privilege vulnerability listed as currently under active attack. And, as was the case in previous months, this bug was reported by researchers at Kaspersky Labs, indicating this bug is being used in malware. Again, this is likely being used in targeted attacks in combination with other bugs.
- CVE-2018-8626 – Windows DNS Server Heap Overflow Vulnerability
This corrects a bug in the Windows DNS server that could allow an attacker to execute code in the context of the LocalSystem Account. While it doesn’t have permissions to everything, it has plenty. Exploiting this vulnerability is as easy as sending a specially crafted request to an affected DNS server. Since DNS servers are designed to handle requests, there’s no other real defense beyond applying the patch. If you’re running DNS servers in your enterprise, definitely prioritize this one.
- CVE-2018-8540 – .NET Framework Remote Code Injection Vulnerability
This patch addresses a Critical-rated RCE in the .NET Framework that could allow an attacker to take control of a system if they passed specific input to an application utilizing susceptible .NET methods. It’s not clear if .NET applications need to be recompiled after this patch is applied, but that’s often the case to be fully protected from input validation bugs.
- CVE-2018-8634 – Microsoft Text-To-Speech Remote Code Execution Vulnerability
This patch is interesting for a couple of different reasons. First, newer functionalities like text-to-speech have a somewhat unknown attack surface. This isn’t the first text-to-speech related bug – Android had one a few years ago – but it’s certainly not often seen. Secondly, Microsoft doesn’t state a sample exploit scenario, but since generating speech requires an HTTP POST request to the Speech service, it’s possible this could be remotely accessible if your application is network facing. Either way, if you employ text-to-speech, don’t overlook this patch.
Here’s the full list of CVEs released by Microsoft for December 2018.
CVE | Title | Severity | Public | Exploited | XI - Latest | XI - Older | Type |
CVE-2018-8611 | Windows Kernel Elevation of Privilege Vulnerability | Important | No | Yes | 1 | 0 | EoP |
CVE-2018-8517 | .NET Framework Denial Of Service Vulnerability | Important | Yes | No | 3 | 3 | DoS |
CVE-2018-8540 | .NET Framework Remote Code Injection Vulnerability | Critical | No | No | 2 | 2 | RCE |
CVE-2018-8583 | Chakra Scripting Engine Memory Corruption Vulnerability | Critical | No | No | 1 | N/A | RCE |
CVE-2018-8617 | Chakra Scripting Engine Memory Corruption Vulnerability | Critical | No | No | 1 | N/A | RCE |
CVE-2018-8618 | Chakra Scripting Engine Memory Corruption Vulnerability | Critical | No | No | 1 | N/A | RCE |
CVE-2018-8624 | Chakra Scripting Engine Memory Corruption Vulnerability | Critical | No | No | 1 | N/A | RCE |
CVE-2018-8626 | Windows DNS Server Heap Overflow Vulnerability | Critical | No | No | 2 | 2 | RCE |
CVE-2018-8629 | Chakra Scripting Engine Memory Corruption Vulnerability | Critical | No | No | 1 | N/A | RCE |
CVE-2018-8631 | Internet Explorer Memory Corruption Vulnerability | Critical | No | No | 1 | 1 | RCE |
CVE-2018-8634 | Microsoft Text-To-Speech Remote Code Execution Vulnerability | Critical | No | No | 1 | 1 | RCE |
CVE-2018-8477 | Windows Kernel Information Disclosure Vulnerability | Important | No | No | 1 | 1 | Info |
CVE-2018-8514 | Remote Procedure Call runtime Information Disclosure Vulnerability | Important | No | No | 2 | 2 | Info |
CVE-2018-8580 | Microsoft SharePoint Information Disclosure Vulnerability | Important | No | No | 3 | 3 | Info |
CVE-2018-8587 | Microsoft Outlook Remote Code Execution Vulnerability | Important | No | No | 1 | 1 | RCE |
CVE-2018-8595 | Windows GDI Information Disclosure Vulnerability | Important | No | No | 1 | 1 | Info |
CVE-2018-8596 | Windows GDI Information Disclosure Vulnerability | Important | No | No | 1 | 1 | Info |
CVE-2018-8597 | Microsoft Excel Remote Code Execution Vulnerability | Important | No | No | 1 | 1 | RCE |
CVE-2018-8598 | Microsoft Excel Information Disclosure Vulnerability | Important | No | No | 2 | 2 | Info |
CVE-2018-8599 | Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability | Important | No | No | 1 | 1 | EoP |
CVE-2018-8604 | Microsoft Exchange Server Tampering Vulnerability | Important | No | No | 2 | 2 | Tampering |
CVE-2018-8612 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | Important | No | No | 1 | 1 | DoS |
CVE-2018-8619 | Internet Explorer Remote Code Execution Vulnerability | Important | No | No | 1 | 1 | RCE |
CVE-2018-8621 | Windows Kernel Information Disclosure Vulnerability | Important | No | No | N/A | 1 | Info |
CVE-2018-8622 | Windows Kernel Information Disclosure Vulnerability | Important | No | No | N/A | 1 | Info |
CVE-2018-8625 | Windows VBScript Engine Remote Code Execution Vulnerability | Important | No | No | 1 | 1 | RCE |
CVE-2018-8627 | Microsoft Excel Information Disclosure Vulnerability | Important | No | No | 2 | 2 | Info |
CVE-2018-8628 | Microsoft PowerPoint Remote Code Execution Vulnerability | Important | No | No | 1 | 1 | RCE |
CVE-2018-8635 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Important | No | No | 3 | 3 | EoP |
CVE-2018-8636 | Microsoft Excel Remote Code Execution Vulnerability | Important | No | No | 2 | 2 | RCE |
CVE-2018-8637 | Win32k Information Disclosure Vulnerability | Important | No | No | 1 | 1 | Info |
CVE-2018-8638 | DirectX Information Disclosure Vulnerability | Important | No | No | 1 | 1 | Info |
CVE-2018-8639 | Win32k Elevation of Privilege Vulnerability | Important | No | No | 1 | 1 | EoP |
CVE-2018-8641 | Win32k Elevation of Privilege Vulnerability | Important | No | No | 1 | 1 | EoP |
CVE-2018-8643 | Scripting Engine Memory Corruption Vulnerability | Important | No | No | 1 | 1 | RCE |
CVE-2018-8649 | Windows Denial of Service Vulnerability | Important | No | No | N/A | N/A | DoS |
CVE-2018-8650 | Microsoft Office SharePoint XSS Vulnerability | Important | No | No | N/A | N/A | XSS |
CVE-2018-8651 | Microsoft Dynamics NAV Cross Site Scripting Vulnerability | Important | No | No | 2 | 2 | XSS |
CVE-2018-8652 | Windows Azure Pack Cross Site Scripting Vulnerability | Important | No | No | N/A | N/A | XSS |
Although a smaller overall set of patches, browser-related bugs make up about 25% of the total release. This includes the VBScript bugs that act like browser bugs since they have the same exploit scenario (browse and own) as the web browsers. Interestingly, these are list as Important severity instead of Critical. According to Microsoft’s severity classification guide, client systems get Critical ratings for “Network Worms, or unavoidable common browsing/use scenarios where client is compromised without warnings or prompts.” Perhaps these Important-rated bugs pop some warning not clearly stated in the vulnerability description.
Another quarter of this release is related to the Office and Office SharePoint group of applications. The most interesting is likely the patch for Outlook due to the proliferation of phishing-related attacks (see above). Fortunately, the Preview Pane is not an attack vector for this bug. And, before you say “I’d never fall for that!” – imagine an attack that combined this with the bug from ZDI-18-1355 that allows you to impersonate any user. Suddenly, that spreadsheet labelled “executive_pay.xlsx” from $bossname becomes pretty tempting. Speaking of Exchange, there’s an additional Tampering bug in this month’s release, too. That sort of attack scenario shows how bugs that don’t directly lead to code execution can still be tremendously impactful.
This month also sees several patches for the kernel and kernel-mode drivers, including DirectX. ZDI research Fritz Sands recently blogged about kernel elevation through DirectX, which shows how broad this attack surface can be. Rounding out this month’s patches are a few more information disclosure and security feature bypass bugs in Windows components and a few cross-site scripting (XSS) bugs in Microsoft Dynamics, SharePoint, and Windows Azure Pack.
Finally, the only advisory for December is Microsoft’s version of the previously discussed Adobe patch for Flash in Internet Explorer.
Looking Ahead
The next patch Tuesday falls on January 8 of 2019, and we’ll return with details and patch analysis then. Until then, happy patching and may all your reboots be smooth and clean!