Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0042 Microsoft Patch Tuesday update for Extended Security Update products for February 2021 10 February 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Windows 7 Windows Server 2008 Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-25195 CVE-2021-24103 CVE-2021-24102 CVE-2021-24094 CVE-2021-24088 CVE-2021-24086 CVE-2021-24083 CVE-2021-24080 CVE-2021-24078 CVE-2021-24077 CVE-2021-24074 CVE-2021-1734 CVE-2021-1727 CVE-2021-1722 OVERVIEW Microsoft has released its monthly security patch update for the month of February 2021. This update resolves 14 vulnerabilities across the following products: [1] Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2021-1722 Remote Code Execution Critical CVE-2021-1727 Elevation of Privilege Important CVE-2021-1734 Information Disclosure Important CVE-2021-24074 Remote Code Execution Critical CVE-2021-24077 Remote Code Execution Critical CVE-2021-24078 Remote Code Execution Critical CVE-2021-24080 Denial of Service Moderate CVE-2021-24083 Remote Code Execution Important CVE-2021-24086 Denial of Service Important CVE-2021-24088 Remote Code Execution Critical CVE-2021-24094 Remote Code Execution Critical CVE-2021-24102 Elevation of Privilege Important CVE-2021-24103 Elevation of Privilege Important CVE-2021-25195 Elevation of Privilege Important MITIGATION Microsoft recommends updating the software to the latest available version available on the Microsoft Update Catalog. [1]. REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYCNK5uNLKJtyKPYoAQjrxQ/+OKg90cRzFn15ZdOVlUBe457tBLSSgv8Z lHlL/AGLi6u3shnZVfZJAWeG9kiRB41BVewo8yYJtgQsniRL96pBKA4KYZMsHkxm e1byPPPQOjzW+rNNY6AtHRCeZlBptaz+/L7ZDYA1pfaJEpFaCLYYhBlx6n3FYhS8 0xYgec8Nk7vptYXQ6Y7xG11eznPFfzkbyI4PPE811pYhbdmsPv4ku3scnoR+DYGK H5ssFAPTcBWMTcyVH+DHJNb2ZkyPQOeOiKWlzbjbb25TYIUFRPatBk1ZVfR+J9Bk KaCDpzPYkqzN8PakpKq0BTGVodPPWh4nGFwar5gPg/iCw5YR+irK2mmcZ6EOzAjn 6rx817WOLfWj5hDMVSQ2hOfKU6pc4MCdMJVL7H6EBRfWfGBAdFnBnzYqCtYJnl8T MwyAwpjkJSF54Pdp/PtBrMDRTfLfto6GVJ2rNToNka2QJWbc/8zfBvd5dWXONB3u l/gkUqV+6i5GmZbOgenL/7+h2/FY3bKg/e8UWFRH0nt6bGq9zQNTLRLsalExT18c sKDDnsNqK82dXTDZcZbhkppmg4vvI/C4N4/KQqp8UHTpHbvJy95t6nISFuxzUU0z +fZd6GL39B1M9wcb+reLTokFnB+kWgiQ7Ek5UonXDoRZrFfVOVyDmgQSZUWwttdS Izhir9T3yIs= =Yftt -----END PGP SIGNATURE-----