Архив метки: PGM

Традиционный аудио/видео эпизод по итогам июльского Microsoft Patch Tuesday

Традиционный аудио/видео эпизод по итогам июльского Microsoft Patch Tues­day. В этом месяце получилось и уязвимости разобрать, и доработать Vul­ris­tics. 😇 В августе буду в основном всякими образовательными инициативами заниматься. 🤫 Следите за обновлениями. 🙂

——

Hel­lo every­one! This episode will be about Microsoft Patch Tues­day for July 2023, includ­ing vul­ner­a­bil­i­ties that were added between June and July Patch Tues­days.

Vul­ris­tics improve­ments
00:11 Works faster
01:31 Microsoft ADVs
02:45 Com­ments Table

TOP
04:09 Remote Code Exe­cu­tion – Microsoft Office (CVE-2023–36884)
05:06 Secu­ri­ty Fea­ture Bypass – Win­dows SmartScreen (CVE-2023–32049)
05:48 Secu­ri­ty Fea­ture Bypass – Microsoft Out­look (CVE-2023–35311)
06:37 Ele­va­tion of Priv­i­lege – Win­dows Error Report­ing Ser­vice (CVE-2023–36874)
07:16 Ele­va­tion of Priv­i­lege – Win­dows MSHTML Plat­form (CVE-2023–32046)

Oth­er RCEs
08:10 Remote Code Exe­cu­tion – Win­dows Active Direc­to­ry Cer­tifi­cate Ser­vices (AD CS) (CVE-2023–35350)
09:01 Remote Code Exe­cu­tion – Microsoft Mes­sage Queu­ing (CVE-2023–32057, CVE-2023–35309)
09:44 Remote Code Exe­cu­tion – Win­dows Rout­ing and Remote Access Ser­vice (RRAS) (CVE-2023–35365, CVE-2023–35366, CVE-2023–35367)
10:24 Remote Code Exe­cu­tion – Win­dows Layer‑2 Bridge Net­work Dri­ver (CVE-2023–35315)
10:57 Remote Code Exe­cu­tion – Microsoft Share­Point (CVE-2023–33134, CVE-2023–33157, CVE-2023–33159, CVE-2023–33160)
11:42 Remote Code Exe­cu­tion – Win­dows Prag­mat­ic Gen­er­al Mul­ti­cast (PGM) (CVE-2023–35297)

🎞 Video
🎞 Video2 (for Rus­sia)
📘 Blog­post
🗒 Vul­ris­tics report

Выпустил эпизод про июньский Microsoft Patch Tuesday

Выпустил эпизод про июньский Microsoft Patch Tues­day. В целом, совпало с первыми впечатлениями, но добавил спуфинг в OneNote и подсветил уязвимости с "Proof-of-Con­cept Exploit" в CVSS Tem­po­ral. Ну и добавил деталей, как обычно.

———

Hel­lo every­one! This episode will be about Microsoft Patch Tues­day for June 2023, includ­ing vul­ner­a­bil­i­ties that were added between May and June Patch Tues­days. This time there were only 3 vul­ner­a­bil­i­ties used in attacks or with a pub­lic exploit. And only one of them is more or less rel­e­vant.

TOP of the Vul­ris­tics report
00:38 Mem­o­ry Cor­rup­tion – Microsoft Edge (CVE-2023–3079)
01:12 Remote Code Exe­cu­tion – GitHub (CVE-2023–29007)
01:40 Spoof­ing – Microsoft OneNote (CVE-2023–33140)

02:01 10 vul­ner­a­bil­i­ties CVSS Tem­po­ral Met­rics "Proof-of-Con­cept Exploit"

No exploits or signs of exploita­tion in the wild
03:10 Remote Code Exe­cu­tion – Win­dows Prag­mat­ic Gen­er­al Mul­ti­cast (PGM) (CVE-2023–29363, CVE-2023–32014, CVE-2023–32015)
04:02 Remote Code Exe­cu­tion – Microsoft Exchange (CVE-2023–32031, CVE-2023–28310)
05:27 Ele­va­tion of Priv­i­lege – Microsoft Share­Point (CVE-2023–29357)

🎞 Video
🎞 Video2 (for Rus­sia)
📘 Blog­post
🗒 Vul­ris­tics report

Выпустил эпизод про майский Microsoft Patch Tuesday

Выпустил эпизод про майский Microsoft Patch Tues­day. Первые впечатления оказались вполне верными. Добавил ещё 4 уязвимости, которые выглядят многообещающе, расширил описание и указал на пару странностей в EPSS.

———

Hel­lo every­one! This episode will be about Microsoft Patch Tues­day for May 2023, includ­ing vul­ner­a­bil­i­ties that were added between April and May Patch Tues­days. As usu­al, I use my open source Vul­ris­tics project to analyse and pri­or­i­tize vul­ner­a­bil­i­ties. I took the com­ments about the vul­ner­a­bil­i­ties from the Qualys, Ten­able, Rapid7, ZDI Patch Tues­day reviews. It's been a long time since we've had such tiny Patch Tues­day. 57 CVEs, includ­ing CVEs appeared dur­ing the month. And only 38 with­out them! 😄

Urgent
00:45 Mem­o­ry Cor­rup­tion – Microsoft Edge (CVE-2023–2033)

Crit­i­cal
01:17 Secu­ri­ty Fea­ture Bypass – Secure Boot (CVE-2023–24932)
02:55 Mem­o­ry Cor­rup­tion – Microsoft Edge (CVE-2023–2136)

High
03:11 Remote Code Exe­cu­tion – Win­dows OLE (CVE-2023–29325)
04:20 Ele­va­tion of Priv­i­lege – Win­dows Win32k (CVE-2023–29336)
05:19 Remote Code Exe­cu­tion – Win­dows Net­work File Sys­tem (CVE-2023–24941)
06:07 Remote Code Exe­cu­tion – Win­dows Prag­mat­ic Gen­er­al Mul­ti­cast (PGM) (CVE-2023–24943)
06:58 Remote Code Exe­cu­tion – Win­dows Light­weight Direc­to­ry Access Pro­to­col (LDAP) (CVE-2023–28283)
07:31 Remote Code Exe­cu­tion – Microsoft Share­Point (CVE-2023–24955)

🎞 Video
🎞 Video2 (for Rus­sia)
📘 Blog­post
🗒 Vul­ris­tics report