Lucene search

K
kasperskyKaspersky LabKLA11485
HistoryMay 14, 2019 - 12:00 a.m.

KLA11485 Multiple vulnerabilities in Microsoft Developer Tools

2019-05-1400:00:00
Kaspersky Lab
threats.kaspersky.com
21

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

68.0%

Detect date:

05/14/2019

Severity:

High

Description:

Multiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, gain privileges, bypass security restrictions, obtain sensitive information.

Affected products:

Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
.NET Core 2.2
.NET Core 1.1
Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 3.5
Microsoft .NET Framework 4.7.2
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.8
.NET Core 2.1
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 2.0 Service Pack 2
.NET Core 1.0
Nuget 5.0.2
Microsoft .NET Framework 4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.7.1/4.7.2
Microsoft .NET Framework 4.6.2
ASP.NET Core 2.2
ASP.NET Core 2.1
Microsoft Azure Active Directory Connect
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Microsoft Visual Studio 2017 version 15.0
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows Server, version 1903 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Microsoft Visual Studio 2015 Update 3
Windows Server 2019
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 for x64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Microsoft Visual Studio 2019 version 16.0
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Azure DevOps Server 2019
Team Foundation Server 2018 Update 3.2
Team Foundation Server 2017 Update 3.1
Team Foundation Server 2018 Update 1.2
Team Foundation Server 2015 Update 4.2
Windows Server 2016 (Server Core installation)
Windows 10 Version 1709 for x64-based Systems
PowerShell Core 6.1
Windows Server 2019 (Server Core installation)
PowerShell Core 6.2
Windows Server, version 1803 (Server Core Installation)
Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2019-0864
CVE-2019-0979
CVE-2019-0727
CVE-2019-0820
CVE-2019-0976
CVE-2019-1000
CVE-2019-0982
CVE-2019-0980
CVE-2019-0733
CVE-2019-0872
CVE-2019-0971
CVE-2019-0981

Impacts:

OSI

Related products:

Microsoft .NET Framework

CVE-IDS:

CVE-2019-07277.2High
CVE-2019-07334.6Warning
CVE-2019-08205.0Warning
CVE-2019-09762.1Warning
CVE-2019-09815.0Warning
CVE-2019-09825.0Warning
CVE-2019-10003.5Warning
CVE-2019-09719.0Critical
CVE-2019-09793.5Warning
CVE-2019-09805.0Warning
CVE-2019-08642.1Warning
CVE-2019-08723.5Warning

Microsoft official advisories:

KB list:

4499179
4499181
4499167
4494440
4499154
4489639
4499405
4499408
4495616
4498964
4495620
4498963
4499407
4499409
4498961
4499406
4498962
4495610
4495613
4495611

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

68.0%