Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More
December's Patch Tuesday is upon us, and, as in years gone by, it's a rather light month. All told there are 35 CVEs patched, including six rated "Critical," 28 rated as "Important," and one rated "Moderate." On the shortlist of patches rated "Critical" is one for a Remote Code Execution (RCE) for Windows Hyper-V and four separate RCE vulnerabilities in Git for Visual Studio. All developers using Visual Studio should prioritize patching before any holiday vacation. Git for Visual Studio also has tampering vulnerability rated "Moderate." An attacker who successfully exploited this vulnerability could write arbitrary files and directories to virtual drive paths on a vulnerable system. Attackers could utilize this to push malware or other malicious files to a victim.
The vulnerabilities rated as “Important” are a mixed bag of Remote Code Execution, Information Disclosure, and Elevation of Privilege vulnerabilities. They affect popular client software packages like Skype and the MS Office Suite (including an RCE vulnerability in Powerpoint) as well as the Windows operating system in general.
Happy holidays and stay safe this season!
Critical
Git for Visual Studio Remote Code Execution Vulnerability
CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387
Remote Code Execution
Win32k Graphics Remote Code Execution Vulnerability
CVE-2019-1468
Remote Code Execution
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2019-1471
Remote Code Execution
Important
Microsoft Access Information Disclosure Vulnerability
CVE-2019-1400, CVE-2019-1463
Information Disclosure
Microsoft Authentication Library for Android Information Disclosure Vulnerability
CVE-2019-1487
Information Disclosure
Microsoft Defender Security Feature Bypass Vulnerability
CVE-2019-1488
Security Feature Bypass
Microsoft Excel Information Disclosure Vulnerability
CVE-2019-1464
Information Disclosure
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2019-1462
Remote Code Execution
Microsoft SQL Server Reporting Services XSS Vulnerability
CVE-2019-1332
Spoofing
Microsoft Word Denial of Service Vulnerability
CVE-2019-1461
Denial of Service
Skype for Business and Lync Spoofing Vulnerability
CVE-2019-1490
Spoofing
VBScript Remote Code Execution Vulnerability
CVE-2019-1485
Remote Code Execution
Visual Studio Live Share Spoofing Vulnerability
CVE-2019-1486
Spoofing
Win32k Elevation of Privilege Vulnerability
CVE-2019-1458
Elevation of Privilege
Win32k Information Disclosure Vulnerability
CVE-2019-1469
Information Disclosure
Windows COM Server Elevation of Privilege Vulnerability
CVE-2019-1478
Elevation of Privilege
Windows Elevation of Privilege Vulnerability
CVE-2019-1476, CVE-2019-1483
Elevation of Privilege
Windows GDI Information Disclosure Vulnerability
CVE-2019-1465, CVE-2019-1466, CVE-2019-1467
Information Disclosure
Windows Hyper-V Information Disclosure Vulnerability
CVE-2019-1470
Information Disclosure
Windows Kernel Information Disclosure Vulnerability
CVE-2019-1472, CVE-2019-1474
Information Disclosure
Windows Media Player Information Disclosure Vulnerability
CVE-2019-1480, CVE-2019-1481
Information Disclosure
Windows OLE Remote Code Execution Vulnerability
CVE-2019-1484
Remote Code Execution
Windows Printer Service Elevation of Privilege Vulnerability
CVE-2019-1477
Elevation of Privilege
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
CVE-2019-1453
Denial of Service
Remote Desktop Protocol Information Disclosure Vulnerability
CVE-2019-1489
Information Disclosure
Moderate
Git for Visual Studio Tampering Vulnerability
CVE-2019-1351
Tampering
Karl Sigler is Security Research Manager, SpiderLabs Threat Intelligence at Trustwave. Karl is a 20- year infosec veteran responsible for research and analysis of current vulnerabilities, malware and threat trends at Trustwave. Follow Karl on LinkedIn.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.