{"uuid": "ca2a7a09-72a2-4109-afa2-06b5fd49ebb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-0886", "type": "seen", "source": "https://t.me/information_security_channel/14189", "content": "Microsoft Patches Over Dozen Critical Browser Flaws\nhttp://feedproxy.google.com/~r/Securityweek/~3/oyJUlBj0sng/microsoft-patches-over-dozen-critical-browser-flaws\n\nMicrosoft\u2019s Patch Tuesday updates for March 2018 fix a total of 75 vulnerabilities, including more than a dozen critical flaws affecting the company\u2019s Edge and Internet Explorer web browsers.\nAll the security holes rated critical this month affect the web browsers. A vast majority of the issues have been described as remote code execution flaws that exist due to the way browser scripting engines handle objects in memory.\nThe only critical vulnerability that cannot be exploited for arbitrary code execution can lead to disclosure of information that can be leveraged to further hack the targeted system.\nTwo of the flaws patched by Microsoft have been publicly disclosed before patches became available, but they are only rated as \u201cimportant,\u201d and there is no evidence of malicious exploitation. These bugs are a denial-of-service (DoS) issue in ASP.NET and a privilege escalation in Exchange.\nThe Zero Day Initiative (ZDI) pointed out that the Exchange vulnerability exists in the Outlook Web Access (OWA) component and it can be exploited for phishing attacks.\nAnother interesting privilege escalation flaw affects the Windows installer and it allows an authenticated attacker to run arbitrary code with elevated permissions.\n\u201cAt first glance, this doesn\u2019t seem very crucial since an attacker would need the ability to run programs on a target system to exploit this vulnerability,\u201d ZDI said in a blog post (https://www.thezdi.com/blog/2018/3/13/the-march-2018-security-update-review). \u201cHowever, this type of bug is often used by malware authors to \u201cpiggyback\u201d their malicious code on top of innocuous code. It\u2019s always easier to convince someone to install \u2018GreatNewGame.exe\u2019 instead of \u2018EvilMalware.exe\u2019.\u201d\nAnother noteworthy vulnerability is CVE-2018-0886, a remote code execution bug affecting the Credential Security Support Provider (CredSSP) protocol. In addition to applying Microsoft\u2019s patch, users also need to make some settings changes in order to fully mitigate potential attacks.\nMicrosoft\u2019s latest security updates also patch vulnerabilities in Hyper-V, Access, Identity Manager, SharePoint, and Windows. The company has also updated the Flash Player components present in its products to address a couple of flaws fixed on Tuesday by Adobe.\nRelated: Microsoft Patches Zero-Day Vulnerability in Office (https://www.securityweek.com/microsoft-patches-zero-day-vulnerability-office)\nRelated: Microsoft Patches Critical Vulnerability in Malware Protection Engine (https://www.securityweek.com/microsoft-patches-critical-vulnerability-malware-protection-engine)\nRelated: Microsoft Patches Office Zero-Day Used to Deliver Malware (https://www.securityweek.com/microsoft-patches-office-zero-day-used-deliver-malware)", "creation_timestamp": "2018-03-13T22:02:40.000000Z"}