Rewterz
Rewterz Threat Advisory – Microsoft Windows Server 2012 / Windows RT 8.1 / 8.1 Multiple Vulnerabilities
November 14, 2018
Rewterz
Rewterz Threat Advisory – CVE-2018-8256 & CVE-2018-8415 – Windows PowerShell Multiple Vulnerabilities
November 14, 2018

Rewterz Threat Advisory – Microsoft Windows Server 2019 Multiple Vulnerabilities

Multiple vulnerabilities have been reported in Microsoft Windows Server 2019 which have been addressed in an update.

 

 

IMPACT:  HIGH

 

 

PUBLISH DATE:  11-14-2018

 

 

OVERVIEW

 

 

Multiple vulnerabilities have been reported in Microsoft Windows Server 2019. Malicious people with physical access to systems can exploit these to bypass certain security restrictions. Malicious, local users may disclose sensitive information or bypass certain security restrictions to gain escalated privileges, exploiting these vulnerabilities. Malicious users may also conduct script insertion attacks to compromise a vulnerable system.

 

 

ANALYSIS

 

 

  • An error related to the Kernel Remote Procedure Call Provider driver when initializing objects in memory can be exploited for information disclosure.
  • Device Guard can be bypassed by exploiting an error within Microsoft JScript when managing COM object creation.
  • Windows Audio Service contains an error when handling objects in memory that may disclose certain memory contents.
  • An error related to the Microsoft RemoteFX Virtual GPU miniport driver when handling objects in memory can be exploited to execute arbitrary code with elevated privileges.
  • Windows Deployment Services TFTP Server contains an error when handling objects in memory which can be exploited to execute arbitrary code with elevated privileges via a specially crafted request.
  • Three different errors related to DirectX and one error related to the Win32k component when handling objects in memory can be exploited to execute arbitrary code in kernel mode.
  • An error related to BitLocker Device Encryption can be exploited to gain access to otherwise restricted data. However, successful exploitation demands physical access of device before the next system reboot.
  • An error related to the “keep nothing” option when installing from physical media can be exploited to gain otherwise restricted, local access.
  • An error related to the VBScript when handling objects in memory can be exploited to execute arbitrary code.
  • Certain input related to the Microsoft Active Directory Federation Services (AD FS) is not properly scanned before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user’s browser session in context of an affected site if malicious data is viewed.
  • An error when validating kernel signatures can be exploited to bypass certain security features and load otherwise restricted signed drivers into the kernel.
  • An error within Windows COM Aggregate Marshaler when processing interface requests can enable arbitrary code execution with multiple privileges.
  • An error when handling calls to Advanced Local Procedure Call (ALPC) can be exploited to execute arbitrary code within the security context of the local system.

 

Following CVE numbers have been assigned to the vulnerabilities found in Microsoft Windows Server 2019.

 

CVE-2018-8256

CVE-2018-8485

CVE-2018-8550

CVE-2018-8566

CVE-2018-8415

CVE-2018-8554

CVE-2018-8561

CVE-2018-8592

CVE-2018-8584

CVE-2018-8476

CVE-2018-8562

CVE-2018-8471

CVE-2018-8454

CVE-2018-8547

CVE-2018-8417

CVE-2018-8407

CVE-2018-8549

CVE-2018-8544

 

 

AFFECTED PRODUCTS

 

 

Microsoft Windows Server 2019

 

 

UPDATES

 

 

Update the following versions as suggested:

  • Windows Server 2019 (KB4467708):
  • Windows Server 2019 (Server Core installation) (KB4467708):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467708

 

  • Windows Server 2019 (KB4465664):
  • Windows Server 2019 (Server Core installation) (KB4465664):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4465664

 

If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.