Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0297 Microsoft Developer Tools updates for December 2018 12 December 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: .NET Core Azure App Service ChakraCore .NET Framework Visual Studio PowerShell Core Team Foundation Server Operating System: Windows Linux variants Mac OS Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-8629 CVE-2018-8624 CVE-2018-8618 CVE-2018-8617 CVE-2018-8599 CVE-2018-8583 CVE-2018-8540 CVE-2018-8517 Member content until: Friday, January 11 2019 OVERVIEW Microsoft has released its monthly security patch update for the month of December 2018. This update resolves 8 vulnerabilities across the following products: [1] ChakraCore Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2 Microsoft .NET Framework 4.7.1/4.7.2 Microsoft .NET Framework 4.7.2 Microsoft .NET Framework 4.7/4.7.1/4.7.2 Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2017 Microsoft Visual Studio 2017 version 15.9 IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2018-8517 Denial of Service Important CVE-2018-8540 Remote Code Execution Critical CVE-2018-8583 Remote Code Execution Critical CVE-2018-8599 Elevation of Privilege Important CVE-2018-8617 Remote Code Execution Critical CVE-2018-8618 Remote Code Execution Critical CVE-2018-8624 Remote Code Execution Critical CVE-2018-8629 Remote Code Execution Critical MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1]. KB4470637, KB4470493, KB4470492, KB4470491, KB4470630 KB4470639, KB4470638, KB4471323, KB4471321, KB4471327 KB4471324, KB4471329, KB4470640, KB4470641, KB4470500 KB4470502, KB4470622, KB4470623, KB4470602, KB4470629 KB4470600, KB4470601, KB4470499, KB4470498, KB4469516 REFERENCES [1] Security Update Guide https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXBBJBWaOgq3Tt24GAQhZWRAAkubDK2QkTL2qYGuFIvu4n+pZjGOmIq/V cxgG3CvEm6xmhp3g3R4HT83F1r2dHgegJXywt8IXkQR0/8hKn+0L7E/iw2V9BAvh lPgKmG9Pg4GVFSigEEk+ahD7QbYxqEGl1+oeFO3oysOCfUgSK06Ol+nfzZOEfeFR KiKpOdVMpjAYs1AmRD3OnKIiY7FQkLUHiMfAWeFpvrYiYAxNMEpEGH8BuzEEyAGU BtWmhFUM2opZElOH0KfxCg1QgpV+RVzdRgSkc2FeczUfalwbzqwsy24WyvznA5lb Cg+V/UIyDcrvb2UEWzjB57Jwu8abmxxEmqfDrauXBSvrPP4A/QlyWZqm35SObD8J 781pW576qPWe/sh1YuIPC2NoJ56+QWll7Bcv80ua4ndjzfKsvw4lHJR7+Yh+mjQu XQIOoRC3gjssBHogQ3gJkvvhIbGWEtDo8UevkFvX15rtUJC68Hs8JjoBOCK14A0g +lUg/ykIzpfz2EMnEFVpforHMOWhYe1UnDcup5sJM7+iQ2u+1Q3sPJCN98dvv7N6 QvUUA7BPqeaERfIZkPsqkU/gss7WxdmNwD7oaEfIDNwtgRTpLZPFzRNIuPBGKtzx lAnkV+9dgazmWBXtsceBAqvOgOfnMBzYfKu1M1WMg9rH9zweX9UsjSmz1XRTJl2J +ACQlGsr6cs= =7WNq -----END PGP SIGNATURE-----