Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0045 Microsoft Patch Tuesday update for Developer Tools for February 2021 10 February 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: .NET Microsoft .NET Framework Microsoft Visual Studio Package Manager Configurations PsExec Visual Studio Code Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Privileged Data -- Existing Account Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-26701 CVE-2021-26700 CVE-2021-24112 CVE-2021-24111 CVE-2021-24105 CVE-2021-1733 CVE-2021-1721 CVE-2021-1639 OVERVIEW Microsoft has released its monthly security patch update for the month of February 2021. This update resolves 8 vulnerabilities across the following products: [1] .NET 5.0 .NET Core 2.1 .NET Core 3.1 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 4.7.2 Microsoft .NET Framework 4.8 Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) Microsoft Visual Studio 2019 version 16.8 Package Manager Configurations PsExec Visual Studio Code Visual Studio Code - npm-script Extension IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2021-1639 Remote Code Execution Important CVE-2021-1721 Denial of Service Important CVE-2021-1733 Elevation of Privilege Important CVE-2021-24105 Remote Code Execution Important CVE-2021-24111 Denial of Service Important CVE-2021-24112 Remote Code Execution Critical CVE-2021-26700 Remote Code Execution Important CVE-2021-26701 Remote Code Execution Critical MITIGATION Microsoft recommends updating the software to the latest available version available on the Microsoft Update Catalog. [1]. REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYCNT2eNLKJtyKPYoAQgiRQ//bUBcD3MMFyj6CwwGJ2JErpeCPr4B07Zr qTqnLZl79oUoYvrM/RA33NJ4AkE/FBJ8YM/WhgwlLJe3mEAG9brAdQ/5emO387aG M4sQGpE8ZD2A1V+GlKodQiyvaelOm5OIzQ/8+B0iaYc5aatUAqZmxL6smsiN0F3n vrwMzBklEsGpphcinHa4fNRyt2SJHjGvDuTFN3dQcbpo81j1fioFEHPxWqdGE8rn /l1Lq9vk7JtILqjyzAB7jBJqBg9nY3pahdYKgbG4abrjWyg4sjIpAP6B6lUH+qKF gqHRw55rgGVAyCpu3UKG3CfSwH/77aCbzdnZFQHvmbg1Yh33Ps5NCI1ckEcYRdjP gb9D/BVsXTb/Li3aH9KbYB8VrjCqz9/nmNy8cMfy+7c6TpBLfUHI3lsevagHmZe0 5KBI306ue5Zq2sT+1rqY2lCZHjqWede2y77arJ97dgTeEIM1f6xcp/CXoj0AKAiR gf49dK4PDJk/f9OXB3kFJsYJR/gjpcWRrswbJ0MkUjuDwr6jtk4Ep8QpNPEcV8DK UtPjVe06L+ATg1LveE9g8foOVXS3cblqMkXtilB1NA+B9rh5EBhFvGiQtpvVFeao R0VvzNMREGC0fPqGSMrF/1XhuNL4W+ugtFN4EXYZT99DEvXLtSb0Rh5EVUpiCDw8 67wF3uQNr6o= =a/d6 -----END PGP SIGNATURE-----