CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Microsoft Patch Tuesday, January 2015

Happy New Year and welcome to the first Microsoft Patch Tuesday of 2015. This year's January release is twice the size last year's with eight bulletins total. One is rated "Critical" and the other seven are marked "Important".

The month's release is notable for patching two vulnerabilities released as zero days by Google. Both vulnerabilities were privilege elevation vulnerabilities in Windows. Google released the first vulnerability on December 29 and the second one on January 11 complete with Proof of Concept (PoC) exploit code.

Why didn't Google wait until today to release the vulnerability details? The vulnerabilities were disclosed under Google's new Project Zero vulnerability disclosure policy. The policy dictates that a vendor will get 90 days to patch a vulnerability after Google discloses it to them. If the vendor doesn't have a patch or workaround ready in that time Google will automatically disclose.

This process is generally known as Coordinated Vulnerability Disclosure, where an organization works closely with a vendor to make sure that security vulnerabilities are patched before criminals exploit them. It's important for Google, as the organization reporting the vulnerability, to be flexible and understand the difficulties of patch development. Bugs embedded deep in an operating system's architecture will take longer to patch than a minor filtering issue in an application. As Microsoft notes in their response to the disclosure, "Responding to security vulnerabilities can be a complex, extensive and time-consuming process."

Still, 90 days should be more than enough time to fix all but the most difficult bugs. If there is a reason to not have a fix in 90 days, it better be a good and very detailed reason with a new deadline set in cement. There's an important reason for these disclosure deadlines. If the "good guys" are finding this vulnerability, there's good reason to think that criminals have found it too. Sometimes sticking to your deadlines is the only way to light a fire under an organization and actually get them to take the vulnerability seriously.

In the end Coordinated Vulnerability Disclosure should be just that; Coordinated. Unfortunately what should be a collaboration between the vendor and the disclosing organization often ends up being a power struggle with one side or the other pushing a little too hard.

MS15-001

Important
CVE-2015-0002
Vulnerability in Windows AppCompatCache could allow Elevation of Privilege

This security update resolves a vulnerability in Microsoft Windows that could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could bypass existing permission checks that are performed during cache modification in the Microsoft Windows Application Compatibility component and execute arbitrary code with elevated privileges.

More details can be found here: https://code.google.com/p/google-security-research/issues/detail?id=118

 

MS15-002
Critical
CVE-2015-0014
Vulnerability in Windows Telnet Service Could Cause Remote Code Execution

This security update resolves a vulnerability in Microsoft Windows that could allow remote code execution if an attacker sends specially crafted packets to an affected Windows server. By default, Telnet is not installed on any affected operating system releases. Only customers who manually install this service are likely to be vulnerable.

 

MS15-003
Important
CVE-2015-0004
Vulnerability in Windows User Profile Service could allow Elevation of Privilege

This security update resolves a vulnerability in the Microsoft Windows that could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. A local attacker who successfully exploited this vulnerability could run arbitrary code on a target system with elevated privileges. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.

More details can be found here: https://code.google.com/p/google-security-research/issues/detail?id=123

 

MS15-004
Important
CVE-2015-0016
Vulnerability in Windows Components Could Allow Elevation of Privilege

This security update resolves a vulnerability in Microsoft Windows that could allow elevation of privilege if an attacker convinces a user to run a specially crafted application. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

 

MS15-005
Important
CVE-2015-0006
Vulnerability in NLA Could Allow Security Feature Bypass

This security update resolves a vulnerability in Microsoft Windows that could allow security feature bypass by unintentionally relaxing the firewall policy and/or configuration of certain services. An attacker on the same network as the victim could spoofs responses to DNS and LDAP traffic initiated by the victim.

 

MS15-006
Important
CVE-2015-0001
Vulnerability in WER could Allow Security Feature Bypass

A security feature bypass vulnerability exists in Windows Error Reporting (WER) that allows administrative users to view the memory contents of processes protected by "Protected Process Light." "Protected Process Light" inhibits debugging of critical system processes by arbitrary users on the system, even administrative users. An attacker who successfully exploited this vulnerability could access the memory of a running process protected by "Protected Process Light."

"Protected Process Light" is designed to help mitigate attack scenarios where a malicious user already has administrative access and is trying to gather additional credentials in order to facilitate lateral attacks against other systems.

 

MS15-007
Important
CVE-2015-0015
Vulnerability in Network Policy Server RADIUS Could Cause Denial of Service

This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service on an Internet Authentication Service (IAS) or Network Policy Server (NPS) if an attacker sends specially crafted username strings to the IAS or NPS. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights; however, it could prevent RADIUS authentication on the IAS or NPS.

 

MS15-008
Important
CVE-2015-0011
Vulnerabilities in Windows Kernel Mode Drivers Could Allow Elevation of Privilege

An elevation of privilege vulnerability exists in the WebDAV kernel-mode driver (mrxdav.sys) when it fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability could bypass impersonation-level security and gain elevated privileges on a targeted system. This could allow them to intercept WebDAV requests for files from any server (including corporate SharePoint sites) and redirect those file requests to return any, potentially malicious, files of the attacker's choosing. The update addresses the vulnerability by correcting how the Windows kernel-mode driver validates impersonation levels.

Latest SpiderLabs Blogs

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog boxes into its malware loader to make it more convincing to phishing targets during a Red Team...

Read More

The Secret Cipher: Modern Data Loss Prevention Solutions

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Far too many organizations place Data Loss Prevention (DLP) and Data...

Read More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

Overview A command injection vulnerability has been discovered in the GlobalProtect feature within Palo Alto Networks PAN-OS software for specific versions that have distinct feature configurations...

Read More