-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2021.0045
   Microsoft Patch Tuesday update for Developer Tools for February 2021
                             10 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          .NET
                  Microsoft .NET Framework
                  Microsoft Visual Studio
                  Package Manager Configurations
                  PsExec
                  Visual Studio Code
Operating System: SUSE
Impact/Access:    Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                  Access Privileged Data          -- Existing Account      
                  Denial of Service               -- Remote/Unauthenticated
Resolution:       Patch/Upgrade
CVE Names:        CVE-2021-26701 CVE-2021-26700 CVE-2021-24112
                  CVE-2021-24111 CVE-2021-24105 CVE-2021-1733
                  CVE-2021-1721 CVE-2021-1639 

OVERVIEW

        Microsoft has released its monthly security patch update for the
        month of February 2021.
        This update resolves 8 vulnerabilities across the following products:
        [1]
         .NET 5.0
         .NET Core 2.1
         .NET Core 3.1
         Microsoft .NET Framework 4.6
         Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
         Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2
         Microsoft .NET Framework 4.7.2
         Microsoft .NET Framework 4.8
         Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
         Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
         Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
         Microsoft Visual Studio 2019 version 16.8
         Package Manager Configurations
         PsExec
         Visual Studio Code
         Visual Studio Code - npm-script Extension


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
         Details         Impact                   Severity
         CVE-2021-1639   Remote Code Execution    Important
         CVE-2021-1721   Denial of Service        Important
         CVE-2021-1733   Elevation of Privilege   Important
         CVE-2021-24105  Remote Code Execution    Important
         CVE-2021-24111  Denial of Service        Important
         CVE-2021-24112  Remote Code Execution    Critical
         CVE-2021-26700  Remote Code Execution    Important
         CVE-2021-26701  Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software to the latest available version available on the Microsoft Update Catalog. [1].


REFERENCES

        [1] Microsoft Security Update Guidance
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=a/d6
-----END PGP SIGNATURE-----