Microsoft ends four of five zero-day threats discovered in Windows 10 and Windows 2019 Server
Table of contents:
At the end of May we received news regarding security in our equipment. The person responsible for publicizing this security breach was the hacker SandboxEscaper, who had brought to light a threat that Microsoft had not yet patched its computers
"It&39;s been almost two weeks and now it seems that the Redmond firm has released a patch that corrects four of the five existing threats. Something especially important, since the patches released arrive to cover zero-day vulnerabilities (zero day)."
Four out of five
The most unique thing about SandboxEscaper is that had not been the protocol followed in these cases Instead of granting the grace period, three months, the hacker had announced to the public the existence of these vulnerabilities. The affected company, in this case Microsoft, had lost the privilege of being warned in advance and in secret to work on correcting the errors.
The truth is that against the clock and in full view of the entire world, the US company has managed to mitigate four of the five threats that had been discovered on that occasion:
Threat Name |
CVE |
Description |
---|---|---|
BearLPE |
CVE-2019-1069 |
LPE explodes in Windows Task Scheduler process |
SandboxEscape |
CVE-2019-1053 |
SandboxEscape for Internet Explorer 11 |
CVE-2019-0841-BYPASS |
CVE-2019-1064 |
Bypass patch CVE-2019-0841 |
InstallerBypass |
CVE-2019-0973 |
LPE directed to the Windows Installer folder |
Remember that these are Windows Local Privilege Escalation (LPE) security flaws CVE-2019-1069, CVE -2019-1064, CVE-2019-0973 and a vulnerability that affects Internet Explorer 11. In the case of the security bug CVE-2019-1053 that affects Internet Explorer (IE), it is a flaw that allows users to Attackers inject DLL into Microsoft browser. For its part, another of the failures is related to a previously published patch that affects a privilege defect and Windows permissions overwrite.
A fifth threat remains to be patched, but Microsoft has not had time to fix the bug as it was published by SandboxEscaper only a few years ago days. Therefore said patch is still pending to be released.
"To access the new Microsoft security patches you must use the usual method. To do this, just go to Settings > Update and Security > Windows Update Here is the importance of keeping the operating system updated."
Via | ZDNet