Lucene search

K
kasperskyKaspersky LabKLA50317
HistoryJun 13, 2023 - 12:00 a.m.

KLA50317 Multiple vulnerabilities in Microsoft Developer Tools

2023-06-1300:00:00
Kaspersky Lab
threats.kaspersky.com
61
microsoft developer tools
vulnerabilities
denial of service
privilege escalation
arbitrary code execution
security bypass
information disclosure
spoofing
public exploits
nuget
visual studio
.net framework
devops server
yarp
windows update

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.01

Percentile

84.0%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Out of bounds memory access vulnerability in Git can be exploited to cause denial of service and gain privileges.
  2. Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  3. An information disclosure vulnerability in Visual Studio can be exploited remotely to obtain sensitive information.
  4. An elevation of privilege vulnerability in .NET, .NET Framework, and Visual Studio can be exploited remotely to gain privileges.
  5. A remote code execution vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
  6. A denial of service vulnerability in .NET and Visual Studio can be exploited remotely to cause denial of service.
  7. An elevation of privilege vulnerability in .NET and Visual Studio can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in .NET, .NET Framework, and Visual Studio can be exploited remotely to execute arbitrary code.
  9. A remote code execution vulnerability in .NET and Visual Studio can be exploited remotely to execute arbitrary code.
  10. A spoofing vulnerability in Azure DevOps Server can be exploited remotely to spoof user interface.
  11. A remote code execution vulnerability in .NET Framework can be exploited remotely to execute arbitrary code.
  12. A spoofing vulnerability in Visual Studio Code can be exploited remotely to spoof user interface.
  13. Stack buffer overflow vulnerability in Autodesk® FBX® can be exploited remotely to obtain sensitive information.
  14. A remote code execution vulnerability in NuGet Client can be exploited remotely to execute arbitrary code.
  15. A denial of service vulnerability in Yet Another Reverse Proxy (YARP) can be exploited remotely to cause denial of service.
  16. A denial of service vulnerability in Sysinternals Process Monitor for Windows can be exploited remotely to cause denial of service.
  17. A denial of service vulnerability in .NET, .NET Framework, and Visual Studio can be exploited remotely to cause denial of service.
  18. Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2023-29007

CVE-2023-33139

CVE-2023-24936

CVE-2023-27909

CVE-2023-32030

CVE-2023-32032

CVE-2023-25815

CVE-2023-24895

CVE-2023-24897

CVE-2023-33126

CVE-2023-29011

CVE-2023-21565

CVE-2023-29326

CVE-2023-33144

CVE-2023-33135

CVE-2023-27910

CVE-2023-29337

CVE-2023-33141

CVE-2023-29353

CVE-2023-25652

CVE-2023-29331

CVE-2023-27911

CVE-2023-33128

CVE-2023-21569

CVE-2023-29012

Exploitation

Public exploits exist for this vulnerability.

Related products

Microsoft-.NET-Framework

Microsoft-Visual-Studio

Microsoft-Windows

Microsoft-Azure

CVE list

CVE-2023-25815 warning

CVE-2023-29007 critical

CVE-2023-25652 critical

CVE-2023-29012 critical

CVE-2023-29011 critical

CVE-2023-33139 high

CVE-2023-24936 critical

CVE-2023-27909 critical

CVE-2023-32030 critical

CVE-2023-32032 high

CVE-2023-24895 critical

CVE-2023-24897 critical

CVE-2023-33126 high

CVE-2023-21565 high

CVE-2023-29326 critical

CVE-2023-33144 high

CVE-2023-33135 high

CVE-2023-27910 critical

CVE-2023-29337 high

CVE-2023-33141 critical

CVE-2023-29353 high

CVE-2023-29331 critical

CVE-2023-27911 critical

CVE-2023-33128 high

CVE-2023-21569 high

KB list

5027230

5027219

5026454

5027798

5027533

5027539

5027532

5025792

5027119

5026455

5027797

5027540

5027123

5026610

5027537

5027534

5027544

5027543

5027536

5027531

5027541

5027538

5027542

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • NuGet 6.3.2Microsoft Visual Studio 2013 Update 5Microsoft Visual Studio 2015 Update 3Microsoft .NET Framework 3.5 AND 4.8Microsoft .NET Framework 3.5 AND 4.8.1Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2Microsoft Visual Studio 2022 version 17.5NuGet 6.0.4Microsoft .NET Framework 3.5 and 4.6.2Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)NuGet 6.4.1Microsoft .NET Framework 4.8Azure DevOps Server 2020.1.2.NET 6.0Microsoft Visual Studio 2022 version 17.0NuGet 6.2.3Microsoft .NET Framework 4.6.2Microsoft Visual Studio 2022 version 17.2Microsoft .NET Framework 2.0 Service Pack 2YARP 2.0Microsoft .NET Framework 3.0 Service Pack 2Windows Sysinternals Process MonitorNuGet 6.5.0Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)Microsoft Visual Studio 2022 version 17.6Microsoft .NET Framework 3.5.1Microsoft .NET Framework 3.5Microsoft .NET Framework 3.5 AND 4.7.2NuGet 6.6.0Sysinternals SuiteMicrosoft Visual Studio 2022 version 17.4.NET 7.0Visual Studio Code

References

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.01

Percentile

84.0%