Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Patch Tuesday, January 2019

Historically January has been a relatively light month for Patch Tuesday, but those days may be over. For January 2019, Microsoft is releasing 48 CVEs along with the standard Adobe Flash advisory. Microsoft rates 7 of the 48 CVEs as "Critical", 40 CVEs as "Important" and one CVE as "Moderate".

The Chakra Scripting Engine is back with its monthly appearance on the "Critical" list as is the MS Edge web browser. Two "Critical" vulnerabilities to look out for are Remote Code Execution (RCE) flaws in the Windows DHCP client and the Windows Hyper-V cloud platform. DHCP allows computers to automatically receive important networking configuration, like a network address when they boot up. An attacker could exploit this by setting up a malicious DHCP server that could spread malware across the network as systems boot up requesting network information from the DHCP server. Luckily there is no public exploit for this vulnerability yet. There also is no exploit for the vulnerability in Hyper-V which is good since these systems are often placed in environments with untrusted public access.

On the "Important" list of CVEs are a lot of the usual suspects like the .NET framework, MS Exchange Server, SharePoint, and the Office suite. Reappearing on the patch list after disappearing for some time is the old Jet Database Engine with multiple RCE vulnerabilities. The Jet Database Engine is an older database backend that has since been superseded by the Microsoft Desktop Engine (MSDE) and SQL Server Express. There are still plenty of old databases still using Jet though, so you may want to check your legacy infrastructure and services.

So now's the time to brush off the cobwebs of 2018 and jump into 2019 with a reboot. Get to patching and stay safe out there!

 

Critical

Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2019-0539, CVE-2019-0567, CVE-2019-0568
Remote Code Execution

Microsoft Edge Memory Corruption Vulnerability
CVE-2019-0565
Remote Code Execution

Windows DHCP Client Remote Code Execution Vulnerability
CVE-2019-0547
Remote Code Execution

Windows Hyper-V Remote Code Execution Vulnerability
CVE-2019-0550, CVE-2019-0551
Remote Code Execution

January 2019 Adobe Flash Security Update
ADV190001
Remote Code Execution

 

Important

.NET Framework Information Disclosure Vulnerability
CVE-2019-0545
Information Disclosure

ASP.NET Core Denial of Service Vulnerability
CVE-2019-0548, CVE-2019-0564
Denial of Service

Internet Explorer Remote Code Execution Vulnerability
CVE-2019-0541
Remote Code Execution

Jet Database Engine Remote Code Execution Vulnerability
CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584
Remote Code Execution

Microsoft Edge Elevation of Privilege Vulnerability
CVE-2019-0566
Elevation of Privilege

Microsoft Exchange Information Disclosure Vulnerability
CVE-2019-0588
Information Disclosure

Microsoft Exchange Memory Corruption Vulnerability
CVE-2019-0586
Remote Code Execution

Microsoft Office Information Disclosure Vulnerability
CVE-2019-0560
Information Disclosure

Microsoft Office SharePoint XSS Vulnerability
CVE-2019-0556, CVE-2019-0557, CVE-2019-0558
Spoofing

Microsoft Outlook Information Disclosure Vulnerability
CVE-2019-0559
Information Disclosure

Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2019-0562
Elevation of Privilege

Microsoft Visual Studio Information Disclosure Vulnerability
CVE-2019-0537
Information Disclosure

Microsoft Windows Elevation of Privilege Vulnerability
CVE-2019-0543
Elevation of Privilege

Microsoft Word Information Disclosure Vulnerability
CVE-2019-0561
Information Disclosure

Microsoft Word Remote Code Execution Vulnerability
CVE-2019-0585
Remote Code Execution

Microsoft XmlDocument Elevation of Privilege Vulnerability
CVE-2019-0555
Elevation of Privilege

Windows COM Elevation of Privilege Vulnerability
CVE-2019-0552
Elevation of Privilege

Windows Data Sharing Service Elevation of Privilege Vulnerability
CVE-2019-0571, CVE-2019-0572, CVE-2019-0573, CVE-2019-0574
Elevation of Privilege

Windows Kernel Information Disclosure Vulnerability
CVE-2019-0536, CVE-2019-0549, CVE-2019-0554, CVE-2019-0569
Information Disclosure

Windows Runtime Elevation of Privilege Vulnerability
CVE-2019-0570
Elevation of Privilege

Windows Subsystem for Linux Information Disclosure Vulnerability
CVE-2019-0553
Information Disclosure

 

Moderate

Visual Studio Remote Code Execution Vulnerability
CVE-2019-0546
Remote Code Execution

Latest SpiderLabs Blogs

Ukrainian Intelligence Claims Successful Compromise of the Russian Ministry of Defense

On March 4, 2024, the Telegram channel of the Main Directorate of Intelligence of the Ministry of Defense of Ukraine (GUR) was updated with assertions that they executed a successful cyberattack...

Read More

Cost Management Tips for Cyber Admins

As anyone who has filled out an expense report can tell you, cost management is everyone's responsibility. Organizations must apply a careful balance of budget planning and expenditures that are in...

Read More

Resurgence of BlackCat Ransomware

Updated March 8: Based on our experience, we believe that BlackCat's claim of shutting down due to law enforcement pressure is a hoax. We anticipate their return under a new guise or brand after...

Read More