VERT 脅威アラート – 2018年10月パッチプライオリティ指標(Patch Priority Index:PPI) (英語版)


 2018.11.06  Japanブログ編集部

Tripwire の脆弱性調査チーム:VERT が月に一度の パッチプライオリティ指標(Patch Priority Index:PPI) を公開します。非常に重要な意味を持つ PPI は、日々これらのパッチにより解決される脆弱性に取り組んでいる VERT の研究員がリリースしています。

パッチプライオリティ指標の決め方は詳しい: にてご参考ください。




First on the patch priority list this month is an authentication bypass vulnerability in libssh. This vulnerability can be exploited remotely, and exploit code has recently been added to Metasploit.

Next are patches for Microsoft’s Internet Explorer, Edge and Scripting Engine. These patches resolve 11 vulnerabilities, including fixes for Memory Corruption and Security Feature Bypass vulnerabilities.

Up next are patches for Microsoft Office. Those include fixes for three remote code execution vulnerabilities, one each in Excel, PowerPoint and Word.

Next on the list are the patches for Microsoft Windows. These patches address numerous vulnerabilities across Device Guard, DirectX Graphics Kernel, Windows Kernel, MS XML, Graphics component, JET Database Engine, Windows GDI, Hyper-V, Windows Subsystem for Linux, DNS, Media Player, TCP/IP and Theme. Note that CVE-2018-8453 is a privilege escalation vulnerability in Win32k’s handling of objects in memory, and it has been exploited in the wild. According to ZDNet, the exploit has been used by a nation-state cyber-espionage group known as FruityArmor. Microsoft has rated this as a 1 on the Exploitability Index (Exploitation More Likely) on their latest Windows release, while active exploitation has been detected on older releases.

Next, users should focus on the patches for Microsoft SharePoint and Exchange Server. These patches resolve Elevation of Privilege, Insecure Library Loading and Remote Code Execution vulnerabilities.

Last on the list this month are patches for Oracle Java and Oracle Database. These patches address vulnerabilities in Java SE versions 6u201, 7u191, 8u181 and 11 along with Database Server versions,, and 18c.

To learn more about Tripwire’s Vulnerability and Exposure Research Team (VERT), click here.

libssh – Authentication Bypass CVE-2018-10933
Microsoft Internet Explorer CVE-2018-8460, CVE-2018-8491
Microsoft Edge CVE-2018-8473, CVE-2018-8509, CVE-2018-8530, CVE-2018-8512
Microsoft Scripting Engine CVE-2018-8513, CVE-2018-8510, CVE-2018-8511, CVE-2018-8503, CVE-2018-8505
Microsoft Office CVE-2018-8502, CVE-2018-8501, CVE-2018-8504
Microsoft Windows CVE-2018-8492, CVE-2018-8484, CVE-2018-8486, CVE-2018-8329, CVE-2018-8494, CVE-2018-8333, CVE-2018-8427, CVE-2018-8432, CVE-2018-8423, CVE-2018-8506, CVE-2018-8411, CVE-2018-8453, CVE-2018-8320, CVE-2018-8472, CVE-2018-8489, CVE-2018-8490, CVE-2018-8497, CVE-2018-8330, CVE-2018-8481, CVE-2018-8482, CVE-2018-8495, CVE-2018-8493, CVE-2018-8413
Microsoft SharePoint CVE-2018-8488, CVE-2018-8480, CVE-2018-8498, CVE-2018-8518
Microsoft Exchange Server CVE-2010-3190, CVE-2018-8265, CVE-2018-8448
Oracle Java CVE-2018-14048, CVE-2018-3183, CVE-2018-3180, CVE-2018-13785, CVE-2018-3139, CVE-2018-3150, CVE-2018-3214, CVE-2018-3169, CVE-2018-3211, CVE-2018-3157, CVE-2018-3209, CVE-2018-3136, CVE-2018-3149
Oracle Database CVE-2018-3259, CVE-2018-3299, CVE-2018-7489


TRIPWIRE IP360 データシート