Today’s VERT Alert addresses Microsoft’s October 2018 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-800 on Wednesday, October 10th.
This vulnerability, a privilege escalation in Win32k’s handling of objects in memory, has been exploited in the wild. According to ZDNet, the exploit has been used by a nation-state cyber-espionage group known as FruityArmor.
Microsoft has rated this as a 1 on the Exploitability Index (Exploitation More Likely) on their latest Windows release, while active exploitation has been detected on older releases.
This vulnerability can be exploited when a user opens a malicious Microsoft JET Database Engine file and Microsoft has acknowledged that it was publicly disclosed. The vulnerability was resolved by changing how the Microsoft JET Database Engine handles objects in memory.
Microsoft has rated this as a 2 on the Exploitability Index (Exploitation Less Likely).
This publicly disclosed vulnerability could allow an authenticated attacker to escalate their privileges via a flaw in how the Windows Kernel handles objects in memory.
Microsoft has rated this as a 1 on the Exploitability Index (Exploitation More Likely).
The final publicly disclosed vulnerability this month involves the way that objects are accessed in memory when using the Azure IoT Hub Device Client SDK with the MQTT protocol. An attacker could execute code in the context of the current user.
Microsoft has rated this as a 2 on the Exploitability Index (Exploitation Less Likely)
In addition to the Microsoft vulnerabilities included in the October Security Guidance, a security advisory was also made available.
Microsoft has released a defense in depth update for Microsoft Office. Microsoft has not included specifics but all versions from Office 2010 forward received this enhancement.
While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis.
TAG |
CVE COUNT |
CVES |
WINDOWS HYPER-V |
2 |
CVE-2018-8489, CVE-2018-8490 |
SQL SERVER |
3 |
CVE-2018-8527, CVE-2018-8532, CVE-2018-8533 |
MICROSOFT WINDOWS DNS |
1 |
CVE-2018-8320 |
MICROSOFT EXCHANGE SERVER |
3 |
CVE-2018-8265, CVE-2018-8448, CVE-2010-3190 |
MICROSOFT WINDOWS |
4 |
CVE-2018-8333, CVE-2018-8411, CVE-2018-8506, CVE-2018-8493 |
MICROSOFT JET DATABASE ENGINE |
1 |
CVE-2018-8423 |
MICROSOFT EDGE |
4 |
CVE-2018-8473, CVE-2018-8509, CVE-2018-8512, CVE-2018-8530 |
MICROSOFT GRAPHICS COMPONENT |
4 |
CVE-2018-8453, CVE-2018-8484, CVE-2018-8486, CVE-2018-8472 |
MICROSOFT SCRIPTING ENGINE |
6 |
CVE-2018-8500, CVE-2018-8503, CVE-2018-8505, CVE-2018-8510, CVE-2018-8511, CVE-2018-8513 |
DEVICE GUARD |
1 |
CVE-2018-8492 |
MICROSOFT XML CORE SERVICES |
1 |
CVE-2018-8494 |
WINDOWS SHELL |
2 |
CVE-2018-8413, CVE-2018-8495 |
INTERNET EXPLORER |
2 |
CVE-2018-8460, CVE-2018-8491 |
AZURE |
1 |
CVE-2018-8531 |
WINDOWS KERNEL |
2 |
CVE-2018-8330, CVE-2018-8497 |
MICROSOFT OFFICE |
5 |
CVE-2018-8432, CVE-2018-8427, CVE-2018-8501, CVE-2018-8502, CVE-2018-8504 |
WINDOWS MEDIA PLAYER |
2 |
CVE-2018-8481, CVE-2018-8482 |
MICROSOFT OFFICE SHAREPOINT |
4 |
CVE-2018-8480, CVE-2018-8488, CVE-2018-8518, CVE-2018-8498 |
WINDOWS – LINUX |
1 |
CVE-2018-8329 |