Data
Events
Data: CASIE
Negative Trigger
Microsoft
rolled out
Vulnerability-related.PatchVulnerability
60
patches
for
its
Patch
Tuesday
release
,
impacting
19
critical
flaws
and
39
important
flaws
.
Microsoft
has rolled out
Vulnerability-related.PatchVulnerability
its
August
Patch
Tuesday
fixes
,
addressing
Vulnerability-related.PatchVulnerability
19
critical
vulnerabilities
,
including
fixes
for
two
zero-day
vulnerabilities
that
are
under
active
attack
.
Overall
,
the
company
patched
Vulnerability-related.PatchVulnerability
a
total
of
60
flaws
,
spanning
Microsoft
Windows
,
Edge
,
Internet
Explorer
(
IE
)
,
Office
,
.NET
Framework
,
ChakraCore
,
Exchange
Server
,
Microsoft
SQL
Server
and
Visual
Studio
.
Of
those
,
19
were
critical
,
39
were
rated
important
,
one
was
moderate
and
one
was
rated
low
in
severity
.
The
patch
release
includes
two
exploited
flaws
,
CVE-2018-8373
and
CVE-2018-8414
,
which
were
previously
disclosed
Vulnerability-related.DiscoverVulnerability
by
researchers
.
The
first
zero-day
,
CVE-2018-8373
,
could
result
in
remote
code-execution
(
RCE
)
and
grants
the
same
privileges
as
a
logged-in
user
,
including
administrative
rights
.
The
vulnerability
exists in
Vulnerability-related.DiscoverVulnerability
IE
9
,
10
and
11
,
impacting
Vulnerability-related.DiscoverVulnerability
all
Windows
operating
systems
from
Server
2008
to
Windows
10
.
Meanwhile
,
CVE-2018-8414
also
enables
RCE
with
the
privileges
of
the
logged-in
user
,
and
exists on
Vulnerability-related.DiscoverVulnerability
Windows
10
versions
1703
and
newer
,
as
well
as
Server
1709
and
Server
1803
.
“
The
two
zero-day
vulnerabilities
are
…
publicly
disclosed
Vulnerability-related.DiscoverVulnerability
and
exploited
Vulnerability-related.DiscoverVulnerability
,
”
said
Chris
Goettl
,
director
of
product
management
,
security
,
for
Ivanti
,
in
an
email
.
“
CVE-2018-8373
is
a
vulnerability
that
exists in
Vulnerability-related.DiscoverVulnerability
the
way
that
the
scripting
engine
handles
objects
in
memory
in
Internet
Explorer
.
CVE-2018-8414
code-execution
vulnerability
exists
Vulnerability-related.DiscoverVulnerability
when
the
Windows
Shell
does
not
properly
validate
file
paths.
”
Microsoft
also
issued
Vulnerability-related.PatchVulnerability
fixes
for
security
issues
that
don
’
t
impact
Windows
,
but
the
company
thought
they
were
important
enough
to
package
into
its
OS
updates
,
dubbed
advisories
.
Microsoft
’
s
Patch
Tuesday
comes
after
the
company
found
itself
in
hot
water
last
month
after
its
new
update
model
caused
stability
issues
for
Windows
operating
systems
and
applications
,
particularly
in
July
.
The
model
irked
customers
so
much
that
enterprise
patching
veteran
Susan
Bradley
wrote
an
open
letter
to
Microsoft
executives
expressing
the
“
dissatisfaction
your
customers
have
with
the
updates
released
Vulnerability-related.PatchVulnerability
for
Windows
desktops
and
servers
in
recent
months
.
”
Juniper
Networks
has released
Vulnerability-related.PatchVulnerability
its
first
cluster
of
security
updates
for
2019
,
with
the
patches
addressing
Vulnerability-related.PatchVulnerability
vulnerabilities
in
various
products
developed
by
the
US
networking
equipment
firm
.
Among
the
19
security
advisories
released
on
Wednesday
is
a
critical
bug
impacting
Vulnerability-related.DiscoverVulnerability
Junos
OS
,
the
FreeBSD-based
operating
system
used
in
Juniper
’
s
routers
.
CVE-2019-0006
affects
Vulnerability-related.DiscoverVulnerability
Junos
OS
versions
14.1X53
,
15.1
,
15.1X53
,
where
it
was found
Vulnerability-related.DiscoverVulnerability
that
a
specially
crafted
HTTP
packet
could
crash
the
fxpc
daemon
or
could
potentially
lead
to
remote
code
execution
(
RCE
)
.
Also
marked
as
critical
is
CVE-2019-0007
,
which
addresses
Vulnerability-related.PatchVulnerability
a
vulnerability
in
vMX
series
virtual
routers
running
Junos
OS
15.1
.
“
The
vMX
series
software
uses
a
predictable
IP
ID
Sequence
Number
,
”
said
Juniper
.
“
This
leaves
the
system
as
well
as
clients
connecting
through
the
device
susceptible
to
a
family
of
attacks.
”
Patches
have also been released
Vulnerability-related.PatchVulnerability
for
eight
vulnerabilities
in
the
libxml2
software
library
that
impact
Vulnerability-related.DiscoverVulnerability
Junos
OS
.
Eight
additional
security
updates
have been released
Vulnerability-related.PatchVulnerability
by
Juniper
that
feature
mitigations
for
high-level
impact
bugs
,
while
a
further
six
deal
with
less
severe
flaws
.
Multiple
vulnerabilities
were also discovered
Vulnerability-related.DiscoverVulnerability
in
Juniper
’
s
Advanced
Threat
Prevention
(
ATP
)
cloud
security
service
.
And
finally
,
Juniper
said
nearly
40
vulnerabilities
have been resolved
Vulnerability-related.PatchVulnerability
in
the
Junos
Space
Network
Management
Platform
18.3R1
and
18.4R1
by
upgrading
Vulnerability-related.PatchVulnerability
third
party
components
or
fixing
Vulnerability-related.PatchVulnerability
internally
discovered
security
vulnerabilities
.
Commenting
on
the
advisories
,
the
National
Cybersecurity
and
Communications
Integration
Center
(
NCCIC
)
,
said
:
“
Users
and
administrators
should
review
Juniper
’
s
Security
Advisories
webpage
and
apply
the
necessary
updates
.
”
The
technical
details
of
security
vulnerabilities
impacting
Vulnerability-related.DiscoverVulnerability
the
Nvidia
Video
and
an
Android
driver
have been revealed
Vulnerability-related.DiscoverVulnerability
by
Zimperium
,
which
acquired
the
flaws
as
part
of
an
exploit
acquisition
program
.
On
Tuesday
,
Zimperium
zLabs
researchers
published
Vulnerability-related.DiscoverVulnerability
a
blog
post
detailing
the
security
flaws
,
two
escalation
of
privilege
bugs
found
Vulnerability-related.DiscoverVulnerability
within
the
NVIDIA
Video
driver
and
MSM
Thermal
driver
.
The
Nvidia
bug
,
CVE-2016-2435
,
impacts
Vulnerability-related.DiscoverVulnerability
Android
6.0
on
the
Nexus
9
handset
.
The
problem
arises
Vulnerability-related.DiscoverVulnerability
when
attackers
craft
an
application
to
tamper
with
read/write
memory
values
and
force
privilege
escalation
.
The
second
security
flaw
,
CVE-2016-2411
,
involves
Vulnerability-related.DiscoverVulnerability
a
Qualcomm
power
management
kernel
driver
,
the
MSM
Thermal
driver
,
in
Android
version
6
.
If
an
attacker
crafts
a
malicious
application
,
they
can
give
themselves
root
access
through
an
internal
bug
in
the
driver
,
leading
to
privilege
escalation
.
These
bugs
are well documented
Vulnerability-related.DiscoverVulnerability
,
known
Vulnerability-related.DiscoverVulnerability
,
and
for
the
most
part
security
updates
have been issued
Vulnerability-related.PatchVulnerability
.
However
,
Zimperium
says
Vulnerability-related.DiscoverVulnerability
that
making
the
technical
details
available
of
these
so-called
Vulnerability-related.DiscoverVulnerability
``
N-day
''
flaws
is
important
and
can
act
as
a
catalyst
to
boost
the
speed
of
patch
production
and
to
iron
out
problems
arriving
between
a
patch
being created
Vulnerability-related.PatchVulnerability
and
vendors
distributing
Vulnerability-related.PatchVulnerability
the
update
in
good
time
.
In
February
,
Zimperium
launched
Vulnerability-related.DiscoverVulnerability
an
N-day
acquisition
program
which
is
only
interested
in
known
security
problems
,
rather
than
unknown
and
unpatched
zero-days
.
Over
the
next
year
,
the
exploit
purchaser
is
budgeting
a
total
of
$
1.5
million
to
pick
up
the
details
on
these
exploits
.
Once
a
bug
has been discovered
Vulnerability-related.DiscoverVulnerability
and
a
fix
is being worked on
Vulnerability-related.PatchVulnerability
,
an
N-day
exploit
indicates
a
time
of
one
or
more
days
in
which
user
systems
can
be
compromised
until
a
security
update
is issued
Vulnerability-related.PatchVulnerability
.
``
By
focusing
on
N-days
,
or
patched
vulnerabilities
,
Zimperium
is
applying
pressure
on
the
mobile
ecosystem
to
re-think
how
and
when
users
receive
Vulnerability-related.PatchVulnerability
security
updates
,
''
the
company
said
at
the
time
.
``
[
The
]
program
will
reward
the
hard
work
of
researchers
who
would
n't
otherwise
receive
compensation
for
an
N-day
exploit
.
''
Microsoft
has released
Vulnerability-related.PatchVulnerability
an
emergency
security
update
to
patch
Vulnerability-related.PatchVulnerability
below-reported
crazy
bad
remote
code
execution
vulnerability
in
its
Microsoft
Malware
Protection
Engine
(
MMPE
)
that
affects
Vulnerability-related.DiscoverVulnerability
Windows
7
,
8.1
,
RT
and
10
computers
,
as
well
as
Windows
Server
2016
operating
systems
.
Google
Project
Zero
's
security
researchers
have discovered
Vulnerability-related.DiscoverVulnerability
another
critical
remote
code
execution
(
RCE
)
vulnerability
in
Microsoft
’
s
Windows
operating
system
,
claiming
that
it
is
something
truly
bad
.
Tavis
Ormandy
announced
during
the
weekend
that
he
and
another
Project
Zero
researcher
Natalie
Silvanovich
discovered
Vulnerability-related.DiscoverVulnerability
``
the
worst
Windows
remote
code
[
execution
vulnerability
]
in
recent
memory
.
This
is
crazy
bad
.
Report
on
the
way
.
''
Ormandy
did
not
provide
Vulnerability-related.DiscoverVulnerability
any
further
details
of
the
Windows
RCE
bug
,
as
Google
gives
a
90-day
security
disclosure
deadline
to
all
software
vendors
to
patch
Vulnerability-related.PatchVulnerability
their
products
and
disclose
Vulnerability-related.DiscoverVulnerability
it
to
the
public
.
This
means
the
details
of
the
new
RCE
vulnerability
in
Windows
will
likely
be disclosed
Vulnerability-related.DiscoverVulnerability
in
90
days
from
now
even
if
Microsoft
fails
to
patch
Vulnerability-related.PatchVulnerability
the
issue
.
However
,
Ormandy
later
revealed
Vulnerability-related.DiscoverVulnerability
some
details
of
the
Windows
RCE
flaw
,
clarifying
that
:
The
vulnerability
they
claimed
to
have discovered
Vulnerability-related.DiscoverVulnerability
works
against
default
Windows
installations
.
The
attacker
does
not
need
to
be
on
the
same
local
area
network
(
LAN
)
as
the
victim
,
which
means
vulnerable
Windows
computers
can
be
hacked
remotely
.
The
attack
is
``
wormable
,
''
capability
to
spread
itself
.
Despite
not
even
releasing
any
technical
details
on
the
RCE
flaw
,
some
IT
professionals
working
for
corporates
have
criticized
the
Google
Project
Zero
researcher
for
making
the
existence
of
the
vulnerability
public
,
while
Twitter
's
infosec
community
is
happy
with
the
work
.
``
If
a
tweet
is
causing
panic
or
confusion
in
your
organization
,
the
problem
is
n't
the
tweet
,
the
problem
is
your
organization
,
''
Project
Zero
researcher
Natalie
Silvanovich
tweeted
.
This
is
not
the
first
time
when
Google
's
security
researchers
have discovered
Vulnerability-related.DiscoverVulnerability
flaws
in
Microsoft
’
s
products
.
Most
recently
in
February
,
Google
researchers
disclosed
Vulnerability-related.DiscoverVulnerability
the
details
of
an
unpatched
vulnerability
impacting
Vulnerability-related.DiscoverVulnerability
Microsoft
's
Edge
and
Internet
Explorer
browsers
.
Microsoft
released
Vulnerability-related.PatchVulnerability
a
patch
as
part
of
its
next
Patch
Tuesday
but
criticized
Google
for
making
all
details
public
,
exposing
millions
of
its
Windows
users
at
risk
of
being
hacked
.
Microsoft
has
not
yet
responded
to
the
latest
claims
,
but
the
company
has
its
May
2017
Patch
Tuesday
scheduled
tomorrow
,
May
9
,
so
hopefully
,
it
will
include
a
security
patch
to
resolve
Vulnerability-related.PatchVulnerability
this
issue
.
Researchers
say
Vulnerability-related.DiscoverVulnerability
several
Motorola
handset
models
are vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
critical
kernel
command
line
injection
flaw
that
could
allow
a
local
malicious
application
to
execute
arbitrary
code
on
the
devices
.
The
two
affected
Motorola
models
are
the
Moto
G4
and
Moto
G5
.
The
warnings
Vulnerability-related.DiscoverVulnerability
come
from
Aleph
Research
which
said
Vulnerability-related.DiscoverVulnerability
it
found
Vulnerability-related.DiscoverVulnerability
the
vulnerability
on
up-to-date
handsets
running
the
latest
Motorola
Android
bootloader
.
Motorola
said
patches
to
fix
Vulnerability-related.PatchVulnerability
the
vulnerability
in
both
devices
are
expected
this
month
.
“
Exploiting
the
vulnerability
allows
the
adversary
to
gain
an
unrestricted
root
shell
.
(
And
more
!
)
,
”
wrote
Roee
Hay
,
manager
of
Aleph
Research
.
He
said
Vulnerability-related.DiscoverVulnerability
vulnerable
versions
of
the
Motorola
Android
bootloader
allow
for
a
kernel
command-line
injection
attack
.
The
vulnerability
(
CVE-2016-10277
)
is
the
same
one
found
Vulnerability-related.DiscoverVulnerability
by
Aleph
Research
earlier
this
year
and
fixed
Vulnerability-related.PatchVulnerability
by
Google
in
May
,
impacting
Vulnerability-related.DiscoverVulnerability
the
Nexus
6
Motorola
bootloader
.
“
By
exploiting
the
vulnerability
,
a
physical
adversary
or
one
with
authorized
USB
fastboot
access
to
the
device
could
break
the
secure/verified
boot
mechanism
,
allowing
him
to
gain
unrestricted
root
privileges
,
and
completely
own
the
user
space
by
loading
a
tampered
or
malicious
image
,
”
wrote
Hay
.
Despite
the
fact
the
vulnerability
had been patched
Vulnerability-related.PatchVulnerability
for
the
Nexus
6
,
Hay
said
the
Moto
G4
and
G5
were still vulnerable
Vulnerability-related.DiscoverVulnerability
to
the
same
kernel
command
line
injection
flaw
.
“
In
the
previous
blog
post
,
we
suggested
that
CVE-2016-10277
could
affect
Vulnerability-related.DiscoverVulnerability
other
Motorola
devices
.
After
receiving
a
few
reports
on
Twitter
that
this
was
indeed
the
case
we
acquired
a
couple
of
Motorola
devices
,
updated
to
the
latest
available
build
we
received
over-the-air
,
”
the
researcher
wrote
on
Wednesday
.
Motorola
told
Threatpost
via
a
statement
that
,
“
A
patch
will
begin
rolling out
Vulnerability-related.PatchVulnerability
for
Moto
G5
within
the
next
week
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
The
patch
for
Moto
G4
is
planned
to
start deployment
Vulnerability-related.PatchVulnerability
at
the
end
of
the
month
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
”
Researchers
were
able
to
trigger
the
vulnerability
on
the
Moto
devices
by
abusing
the
Motorola
bootloader
download
functionality
in
order
to
swap
in
their
own
malicious
initramfs
(
initial
RAM
file
system
)
at
a
known
physical
address
,
named
SCRATCH_ADDR
.
“
We
can
inject
a
parameter
,
named
initrd
,
which
allows
us
to
force
the
Linux
kernel
to
populate
initramfs
into
rootfs
from
a
specified
physical
address
,
”
the
researcher
wrote
.
Next
,
using
malicious
initramfs
to
load
into
a
customized
boot
process
they
were
able
to
gain
root
shell
access
to
the
device
.
Hay
’
s
research
into
the
Motorola
bootloaders
began
in
January
when
he
identified
Vulnerability-related.DiscoverVulnerability
a
high-severity
vulnerability
(
CVE-2016-8467
)
impacting
Vulnerability-related.DiscoverVulnerability
Nexus
6/6P
handsets
.
That
separate
vulnerability
allowed
attackers
to
change
the
bootmode
of
the
device
,
giving
access
to
hidden
USB
interfaces
.
Google
fixed
Vulnerability-related.PatchVulnerability
the
issue
by
hardening
the
bootloader
and
restricting
it
from
loading
custom
bootmodes
.
“
Just
before
Google
released
Vulnerability-related.PatchVulnerability
the
patch
,
we
had discovered
Vulnerability-related.DiscoverVulnerability
a
way
to
bypass
it
on
Nexus
6
,
”
Hay
said
in
May
of
the
second
CVE-2016-10277
vulnerability
.
In
an
interview
with
Hay
by
Threatpost
he
said
Vulnerability-related.DiscoverVulnerability
,
“
Yes
,
they
are
both
bootloader
vulnerabilities
.
The
CVE-2016-10277
can
be
considered
a
generalization
of
CVE-2016-8467
,
but
with
a
much
stronger
impact
,
”
he
said
Vulnerability-related.DiscoverVulnerability
.
Researchers
say
Vulnerability-related.DiscoverVulnerability
several
Motorola
handset
models
are vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
critical
kernel
command
line
injection
flaw
that
could
allow
a
local
malicious
application
to
execute
arbitrary
code
on
the
devices
.
The
two
affected
Motorola
models
are
the
Moto
G4
and
Moto
G5
.
The
warnings
Vulnerability-related.DiscoverVulnerability
come
from
Aleph
Research
which
said
Vulnerability-related.DiscoverVulnerability
it
found
Vulnerability-related.DiscoverVulnerability
the
vulnerability
on
up-to-date
handsets
running
the
latest
Motorola
Android
bootloader
.
Motorola
said
patches
to
fix
Vulnerability-related.PatchVulnerability
the
vulnerability
in
both
devices
are
expected
this
month
.
“
Exploiting
the
vulnerability
allows
the
adversary
to
gain
an
unrestricted
root
shell
.
(
And
more
!
)
,
”
wrote
Roee
Hay
,
manager
of
Aleph
Research
.
He
said
Vulnerability-related.DiscoverVulnerability
vulnerable
versions
of
the
Motorola
Android
bootloader
allow
for
a
kernel
command-line
injection
attack
.
The
vulnerability
(
CVE-2016-10277
)
is
the
same
one
found
Vulnerability-related.DiscoverVulnerability
by
Aleph
Research
earlier
this
year
and
fixed
Vulnerability-related.PatchVulnerability
by
Google
in
May
,
impacting
Vulnerability-related.DiscoverVulnerability
the
Nexus
6
Motorola
bootloader
.
“
By
exploiting
the
vulnerability
,
a
physical
adversary
or
one
with
authorized
USB
fastboot
access
to
the
device
could
break
the
secure/verified
boot
mechanism
,
allowing
him
to
gain
unrestricted
root
privileges
,
and
completely
own
the
user
space
by
loading
a
tampered
or
malicious
image
,
”
wrote
Hay
.
Despite
the
fact
the
vulnerability
had been patched
Vulnerability-related.PatchVulnerability
for
the
Nexus
6
,
Hay
said
the
Moto
G4
and
G5
were still vulnerable
Vulnerability-related.DiscoverVulnerability
to
the
same
kernel
command
line
injection
flaw
.
“
In
the
previous
blog
post
,
we
suggested
that
CVE-2016-10277
could
affect
Vulnerability-related.DiscoverVulnerability
other
Motorola
devices
.
After
receiving
a
few
reports
on
Twitter
that
this
was
indeed
the
case
we
acquired
a
couple
of
Motorola
devices
,
updated
to
the
latest
available
build
we
received
over-the-air
,
”
the
researcher
wrote
on
Wednesday
.
Motorola
told
Threatpost
via
a
statement
that
,
“
A
patch
will
begin
rolling out
Vulnerability-related.PatchVulnerability
for
Moto
G5
within
the
next
week
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
The
patch
for
Moto
G4
is
planned
to
start deployment
Vulnerability-related.PatchVulnerability
at
the
end
of
the
month
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
”
Researchers
were
able
to
trigger
the
vulnerability
on
the
Moto
devices
by
abusing
the
Motorola
bootloader
download
functionality
in
order
to
swap
in
their
own
malicious
initramfs
(
initial
RAM
file
system
)
at
a
known
physical
address
,
named
SCRATCH_ADDR
.
“
We
can
inject
a
parameter
,
named
initrd
,
which
allows
us
to
force
the
Linux
kernel
to
populate
initramfs
into
rootfs
from
a
specified
physical
address
,
”
the
researcher
wrote
.
Next
,
using
malicious
initramfs
to
load
into
a
customized
boot
process
they
were
able
to
gain
root
shell
access
to
the
device
.
Hay
’
s
research
into
the
Motorola
bootloaders
began
in
January
when
he
identified
Vulnerability-related.DiscoverVulnerability
a
high-severity
vulnerability
(
CVE-2016-8467
)
impacting
Vulnerability-related.DiscoverVulnerability
Nexus
6/6P
handsets
.
That
separate
vulnerability
allowed
attackers
to
change
the
bootmode
of
the
device
,
giving
access
to
hidden
USB
interfaces
.
Google
fixed
Vulnerability-related.PatchVulnerability
the
issue
by
hardening
the
bootloader
and
restricting
it
from
loading
custom
bootmodes
.
“
Just
before
Google
released
Vulnerability-related.PatchVulnerability
the
patch
,
we
had discovered
Vulnerability-related.DiscoverVulnerability
a
way
to
bypass
it
on
Nexus
6
,
”
Hay
said
in
May
of
the
second
CVE-2016-10277
vulnerability
.
In
an
interview
with
Hay
by
Threatpost
he
said
Vulnerability-related.DiscoverVulnerability
,
“
Yes
,
they
are
both
bootloader
vulnerabilities
.
The
CVE-2016-10277
can
be
considered
a
generalization
of
CVE-2016-8467
,
but
with
a
much
stronger
impact
,
”
he
said
Vulnerability-related.DiscoverVulnerability
.