Lucene search

K
kasperskyKaspersky LabKLA11315
HistorySep 11, 2018 - 12:00 a.m.

KLA11315 Multiple vulnerabilities in Microsoft Developer Tools

2018-09-1100:00:00
Kaspersky Lab
threats.kaspersky.com
808

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.373 Low

EPSS

Percentile

97.2%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in System.IO.Pipelines can be exploited remotely via specially crafted requests to cause denial of service.
  2. A denial of service vulnerability in OData can be exploited remotely via specially crafted requests to cause denial of service.
  3. A remote code execution vulnerability in .NET Framework can be exploited remotely via specially crafted file to execute arbitrary code.
  4. A spoofing vulnerability in Azure IoT SDK can be exploited remotely to spoof user interface.

Original advisories

CVE-2018-8409

CVE-2018-8269

CVE-2018-8421

CVE-2018-8479

Exploitation

Public exploits exist for this vulnerability.

Related products

Microsoft-.NET-Framework

Microsoft-Azure

CVE list

CVE-2018-8269 warning

CVE-2018-8479 high

CVE-2018-8409 warning

CVE-2018-8421 critical

KB list

4457128

4457056

4457028

4457131

4457132

4457025

4457054

4457044

4457034

4457037

4457027

4457045

4457029

4457142

4457030

4457043

4457055

4457035

4457138

4457036

4457042

4457033

4457026

4457053

4457038

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft.Data.OData.NET Core 2.1ASP.NET Core 2.1System.IO.PipelinesMicrosoft .NET Framework 2.0 Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2Microsoft .NET Framework 3.5Microsoft .NET Framework 3.5.1Microsoft .NET Framework 4.5.2Microsoft .NET Framework 4.6Microsoft .NET Framework 4.7.2Microsoft .NET Framework 4.7.1/4.7.2ASP.NET Core 2.2Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 4.7/4.7.1/4.7.2C SDK for Azure IoT

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.4 High

AI Score

Confidence

High

0.373 Low

EPSS

Percentile

97.2%