KLA11358
Multiple vulnerabilities in Microsoft Development Tools
Обновлено: 04/12/2018
CVSS
6.3
Дата обнаружения
13/11/2018
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities were found in Microsoft Development Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, perform cross-site scripting attacks.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  2. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  3. A tampering vulnerability in .NET Core can be exploited remotely via specially crafted files to spoof user interface;
  4. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  5. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  6. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  7. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  8. A remote code execution vulnerability in Microsoft PowerShell can be exploited via specially crafted files to execute arbitrary code;
  9. A cross-site-scripting (XSS) vulnerability in Team Foundation Server can be exploited remotely via specially crafted request to perform cross-site scripting attacks;
  10. A remote code execution vulnerability in Team Foundation Server can be exploited via specially crafted files to execute arbitrary code;
  11. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  12. A tampering vulnerability in Microsoft PowerShell can be exploited remotely via specially crafted application to spoof user interface;
  13. A cross-site-scripting (XSS) vulnerability in Azure App Services can be exploited remotely via specially crafted request to perform cross-site scripting attacks;
  14. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
Пораженные продукты

ChakraCore
Microsoft Edge
.NET Core 2.1
Windows 8.1 for 32-bit systems
Windows 10 Version 1703 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows Server 2019
Microsoft.PowerShell.Archive 1.2.2.0
Windows Server 2019 (Server Core installation)
Windows 10 Version 1803 for ARM64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1709 for 64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 8.1 for x64-based systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2012
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1703 for 32-bit Systems
PowerShell Core 6.0
Windows 7 for x64-based Systems Service Pack 1
Windows 10 Version 1803 for x64-based Systems
Windows Server, version 1709 (Server Core Installation)
Windows Server 2016
PowerShell Core 6.1
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows Server 2012 R2
Windows 10 Version 1607 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows RT 8.1
Windows Server, version 1803 (Server Core Installation)
Windows 10 Version 1809 for 32-bit Systems

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2018-8588
CVE-2018-8557
CVE-2018-8416
CVE-2018-8555
CVE-2018-8556
CVE-2018-8542
CVE-2018-8543
CVE-2018-8256
CVE-2018-8602
CVE-2018-8529
CVE-2018-8541
CVE-2018-8415
CVE-2018-8600
CVE-2018-8551
Оказываемое влияние
?
ACE 
[?]

SUI 
[?]
Связанные продукты
Microsoft .NET Framework
ChakraCore
CVE-IDS

CVE-2018-8588
CVE-2018-8557
CVE-2018-8542
CVE-2018-8556
CVE-2018-8543
CVE-2018-8541
CVE-2018-8555
CVE-2018-8551
CVE-2018-8415
CVE-2018-8256
CVE-2018-8416
CVE-2018-8602
CVE-2018-8529
CVE-2018-8600

Microsoft official advisories
Microsoft Security Update Guide