Lucene search

K
kasperskyKaspersky LabKLA11485
HistoryMay 14, 2019 - 12:00 a.m.

KLA11485 Multiple vulnerabilities in Microsoft Developer Tools

2019-05-1400:00:00
Kaspersky Lab
threats.kaspersky.com
30

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, gain privileges, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in .NET Framework can be exploited remotely via specially crafted application to cause denial of service.
  2. A cross-site-scripting (XSS) vulnerability Azure DevOps Server and Team Foundation Server can be exploited remotely via specially crafted payload to spoof user interface.
  3. An elevation of privilege vulnerability in Diagnostic Hub Standard Collector, Visual Studio Standard Collector can be exploited remotely via specially crafted application to gain privileges.
  4. A denial of service vulnerability in .NET Framework and .NET Core can be exploited remotely via specially crafted requests to cause denial of service.
  5. A tampering vulnerability in NuGet Package Manager can be exploited remotely via IMPORTANTTHING to spoof user interface.
  6. An elevation of privilege vulnerability in Microsoft Azure AD Connect can be exploited remotely via IMPORTANTTHING to gain privileges.
  7. A denial of service vulnerability in ASP.NET Core can be exploited remotely via specially crafted requests to cause denial of service.
  8. A denial of service vulnerability in .Net Framework and .Net Core can be exploited remotely via specially crafted requests to cause denial of service.
  9. A security feature bypass vulnerability in Windows Defender Application Control can be exploited remotely via IMPORTANTTHING to bypass security restrictions.
  10. An information disclosure vulnerability in Azure DevOps Server and Team Foundation Server can be exploited remotely via specially crafted authentication to obtain sensitive information.

Original advisories

CVE-2019-0864

CVE-2019-0979

CVE-2019-0727

CVE-2019-0820

CVE-2019-0976

CVE-2019-1000

CVE-2019-0982

CVE-2019-0980

CVE-2019-0733

CVE-2019-0872

CVE-2019-0971

CVE-2019-0981

Related products

Microsoft-.NET-Framework

Microsoft-Visual-Studio

Microsoft-Windows

Microsoft-Windows-Server

Microsoft-Active-Directory

Microsoft-Windows-10

Team-Foundation-Server

Microsoft-Azure

CVE list

CVE-2019-0727 high

CVE-2019-0733 warning

CVE-2019-0820 warning

CVE-2019-0976 warning

CVE-2019-0981 warning

CVE-2019-0982 warning

CVE-2019-1000 warning

CVE-2019-0971 critical

CVE-2019-0979 warning

CVE-2019-0980 warning

CVE-2019-0864 warning

CVE-2019-0872 warning

KB list

4499179

4499181

4499167

4494440

4499154

4489639

4499405

4499408

4495616

4498964

4495620

4498963

4499407

4499409

4498961

4499406

4498962

4495610

4495613

4495611

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft .NET Framework 3.5.1Microsoft .NET Framework 4.5.2Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2.NET Core 2.2.NET Core 1.1Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2Microsoft .NET Framework 3.5Microsoft .NET Framework 4.7.2Microsoft .NET Framework 4.6Microsoft .NET Framework 4.8.NET Core 2.1Microsoft .NET Framework 3.0 Service Pack 2Microsoft .NET Framework 2.0 Service Pack 2.NET Core 1.0Nuget 5.0.2Microsoft .NET Framework 4.7/4.7.1/4.7.2Microsoft .NET Framework 4.7.1/4.7.2Microsoft .NET Framework 4.6.2ASP.NET Core 2.2ASP.NET Core 2.1Microsoft Azure Active Directory ConnectWindows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for 32-bit SystemsMicrosoft Visual Studio 2017 version 15.0Windows 10 Version 1703 for x64-based SystemsWindows 10 Version 1803 for 32-bit SystemsWindows Server, version 1903 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1809 for ARM64-based SystemsMicrosoft Visual Studio 2015 Update 3Windows Server 2019Windows 10 Version 1903 for ARM64-based SystemsWindows 10 for x64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1709 for ARM64-based SystemsWindows 10 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsMicrosoft Visual Studio 2019 version 16.0Windows 10 Version 1803 for x64-based SystemsWindows 10 Version 1703 for 32-bit SystemsAzure DevOps Server 2019Team Foundation Server 2018 Update 3.2Team Foundation Server 2017 Update 3.1Team Foundation Server 2018 Update 1.2Team Foundation Server 2015 Update 4.2Windows Server 2016 (Server Core installation)Windows 10 Version 1709 for x64-based SystemsPowerShell Core 6.1Windows Server 2019 (Server Core installation)PowerShell Core 6.2Windows Server, version 1803 (Server Core Installation)Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)

References

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.8%