Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Patch Tuesday, January 2019

Historically January has been a relatively light month for Patch Tuesday, but those days may be over. For January 2019, Microsoft is releasing 48 CVEs along with the standard Adobe Flash advisory. Microsoft rates 7 of the 48 CVEs as "Critical", 40 CVEs as "Important" and one CVE as "Moderate".

The Chakra Scripting Engine is back with its monthly appearance on the "Critical" list as is the MS Edge web browser. Two "Critical" vulnerabilities to look out for are Remote Code Execution (RCE) flaws in the Windows DHCP client and the Windows Hyper-V cloud platform. DHCP allows computers to automatically receive important networking configuration, like a network address when they boot up. An attacker could exploit this by setting up a malicious DHCP server that could spread malware across the network as systems boot up requesting network information from the DHCP server. Luckily there is no public exploit for this vulnerability yet. There also is no exploit for the vulnerability in Hyper-V which is good since these systems are often placed in environments with untrusted public access.

On the "Important" list of CVEs are a lot of the usual suspects like the .NET framework, MS Exchange Server, SharePoint, and the Office suite. Reappearing on the patch list after disappearing for some time is the old Jet Database Engine with multiple RCE vulnerabilities. The Jet Database Engine is an older database backend that has since been superseded by the Microsoft Desktop Engine (MSDE) and SQL Server Express. There are still plenty of old databases still using Jet though, so you may want to check your legacy infrastructure and services.

So now's the time to brush off the cobwebs of 2018 and jump into 2019 with a reboot. Get to patching and stay safe out there!



Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2019-0539, CVE-2019-0567, CVE-2019-0568
Remote Code Execution

Microsoft Edge Memory Corruption Vulnerability
Remote Code Execution

Windows DHCP Client Remote Code Execution Vulnerability
Remote Code Execution

Windows Hyper-V Remote Code Execution Vulnerability
CVE-2019-0550, CVE-2019-0551
Remote Code Execution

January 2019 Adobe Flash Security Update
Remote Code Execution



.NET Framework Information Disclosure Vulnerability
Information Disclosure

ASP.NET Core Denial of Service Vulnerability
CVE-2019-0548, CVE-2019-0564
Denial of Service

Internet Explorer Remote Code Execution Vulnerability
Remote Code Execution

Jet Database Engine Remote Code Execution Vulnerability
CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584
Remote Code Execution

Microsoft Edge Elevation of Privilege Vulnerability
Elevation of Privilege

Microsoft Exchange Information Disclosure Vulnerability
Information Disclosure

Microsoft Exchange Memory Corruption Vulnerability
Remote Code Execution

Microsoft Office Information Disclosure Vulnerability
Information Disclosure

Microsoft Office SharePoint XSS Vulnerability
CVE-2019-0556, CVE-2019-0557, CVE-2019-0558

Microsoft Outlook Information Disclosure Vulnerability
Information Disclosure

Microsoft SharePoint Elevation of Privilege Vulnerability
Elevation of Privilege

Microsoft Visual Studio Information Disclosure Vulnerability
Information Disclosure

Microsoft Windows Elevation of Privilege Vulnerability
Elevation of Privilege

Microsoft Word Information Disclosure Vulnerability
Information Disclosure

Microsoft Word Remote Code Execution Vulnerability
Remote Code Execution

Microsoft XmlDocument Elevation of Privilege Vulnerability
Elevation of Privilege

Windows COM Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Data Sharing Service Elevation of Privilege Vulnerability
CVE-2019-0571, CVE-2019-0572, CVE-2019-0573, CVE-2019-0574
Elevation of Privilege

Windows Kernel Information Disclosure Vulnerability
CVE-2019-0536, CVE-2019-0549, CVE-2019-0554, CVE-2019-0569
Information Disclosure

Windows Runtime Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Subsystem for Linux Information Disclosure Vulnerability
Information Disclosure



Visual Studio Remote Code Execution Vulnerability
Remote Code Execution

Latest SpiderLabs Blogs

Welcome to Adventures in Cybersecurity: The Defender Series

I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), and as a result, I’ve had the time to put some effort into a blog series that hopefully will entertain and inform you...

Read More

Trustwave SpiderLabs: Insights and Solutions to Defend Educational Institutions Against Cyber Threats

Security teams responsible for defending educational institutions at higher education and primary school levels often find themselves facing harsh lessons from threat actors who exploit the numerous...

Read More

Breakdown of Tycoon Phishing-as-a-Service System

Just weeks after Trustwave SpiderLabs reported on the Greatness phishing-as-a-service (PaaS) framework, SpiderLabs’ Email Security team is tracking another PaaS called Tycoon Group.

Read More