Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT Security Bulletin
ASB-2020.0006
Security update for Microsoft Windows
15 January 2020
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Windows
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Increased Privileges -- Remote with User Interaction
Denial of Service -- Remote/Unauthenticated
Provide Misleading Information -- Remote with User Interaction
Access Confidential Data -- Remote/Unauthenticated
Reduced Security -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-0644 CVE-2020-0643 CVE-2020-0642
CVE-2020-0641 CVE-2020-0639 CVE-2020-0638
CVE-2020-0637 CVE-2020-0636 CVE-2020-0635
CVE-2020-0634 CVE-2020-0633 CVE-2020-0632
CVE-2020-0631 CVE-2020-0630 CVE-2020-0629
CVE-2020-0628 CVE-2020-0627 CVE-2020-0626
CVE-2020-0625 CVE-2020-0624 CVE-2020-0623
CVE-2020-0622 CVE-2020-0621 CVE-2020-0620
CVE-2020-0617 CVE-2020-0616 CVE-2020-0615
CVE-2020-0614 CVE-2020-0613 CVE-2020-0612
CVE-2020-0611 CVE-2020-0610 CVE-2020-0609
CVE-2020-0608 CVE-2020-0607 CVE-2020-0601
Member content until: Friday, February 14 2020
Comment: This bulletin contains CVE-2020-0601, a code-signing spoof, which has
been widely reported in the news. This bulletin also contains 3 critical
unauthenticated access to RDP vulnerabilities:
CVE-2020-0609, CVE-2020-0610 and CVE-2020-0611.
OVERVIEW
Microsoft has released its monthly security patch update for the month of
January 2020.
This update resolves 36 vulnerabilities across the following products: [1]
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server
Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
IMPACT
Microsoft has given the following details regarding these vulnerabilities.
Details Impact Severity
CVE-2020-0601 Spoofing Important
CVE-2020-0607 Information Disclosure Important
CVE-2020-0608 Information Disclosure Important
CVE-2020-0609 Remote Code Execution Critical
CVE-2020-0610 Remote Code Execution Critical
CVE-2020-0611 Remote Code Execution Critical
CVE-2020-0612 Denial of Service Important
CVE-2020-0613 Elevation of Privilege Important
CVE-2020-0614 Elevation of Privilege Important
CVE-2020-0615 Information Disclosure Important
CVE-2020-0616 Denial of Service Important
CVE-2020-0617 Denial of Service Important
CVE-2020-0620 Elevation of Privilege Important
CVE-2020-0621 Security Feature Bypass Important
CVE-2020-0622 Information Disclosure Important
CVE-2020-0623 Elevation of Privilege Important
CVE-2020-0624 Elevation of Privilege Important
CVE-2020-0625 Elevation of Privilege Important
CVE-2020-0626 Elevation of Privilege Important
CVE-2020-0627 Elevation of Privilege Important
CVE-2020-0628 Elevation of Privilege Important
CVE-2020-0629 Elevation of Privilege Important
CVE-2020-0630 Elevation of Privilege Important
CVE-2020-0631 Elevation of Privilege Important
CVE-2020-0632 Elevation of Privilege Important
CVE-2020-0633 Elevation of Privilege Important
CVE-2020-0634 Elevation of Privilege Important
CVE-2020-0635 Elevation of Privilege Important
CVE-2020-0636 Elevation of Privilege Important
CVE-2020-0637 Information Disclosure Important
CVE-2020-0638 Elevation of Privilege Important
CVE-2020-0639 Information Disclosure Important
CVE-2020-0641 Elevation of Privilege Important
CVE-2020-0642 Elevation of Privilege Important
CVE-2020-0643 Information Disclosure Important
CVE-2020-0644 Elevation of Privilege Important
MITIGATION
Microsoft recommends updating the software with the version made available
on the Microsoft Update Catalogue for the following Knowledge Base articles.[1].
KB4534297, KB4534310, KB4534293, KB4534309, KB4534271
KB4534273, KB4534306, KB4534314, KB4534288, KB4528760
KB4534303, KB4534276, KB4534312, KB4534283
REFERENCES
[1] Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=8UaX
-----END PGP SIGNATURE-----