Lucene search

K
mskbMicrosoftKB4489639
HistoryMay 14, 2019 - 7:00 a.m.

Description of the security update for the elevation of privilege vulnerability in Microsoft Visual Studio 2015 Update 3: May 14, 2019

2019-05-1407:00:00
Microsoft
support.microsoft.com
146

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0

Percentile

9.5%

Description of the security update for the elevation of privilege vulnerability in Microsoft Visual Studio 2015 Update 3: May 14, 2019

Applies to: All Visual Studio 2015 Update 3 editions except Build Tools

NoticeIn November 2020, the content of this article was updated to clarify the affected products, prerequisites, and restart requirements. Additionally, the update metadata in WSUS was revised to fix a Microsoft System Center Configuration Manager reporting bug.

Summary

An elevation of privilege vulnerability exists if the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector allows file deletion in arbitrary locations.

To learn more about the vulnerability, go to CVE-2019-0727.

How to obtain and install the update

Visual Studio 2015 Update 3

Method 1: Microsoft Download

The following file is available for download:DownloadDownload the hotfix package now.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Remote Tools for Visual Studio 2015 Update 3

To download the updated Remote Tools for Visual Studio 2015 Update 3, go to the following Microsoft webpage:DownloadRemote Tools for Visual Studio 2015 Update 3

More information

Prerequisites

To apply this security update, you must have both Visual Studio 2015 Update 3 and the subsequent Cumulative Servicing Release KB 3165756 installed. Typically, KB 3165756 is installed automatically when you install Visual Studio 2015 Update 3. However, in some cases, you have to install the two packages separately.

Restart requirement

We recommend that you close Visual Studio 2015 before you install this security update. Otherwise, you may have to restart the computer after you apply this security update if a file that is being updated is open or in use by Visual Studio.

Security update replacement information

This security update supersedes KB4469516.

File hash information

File name SHA1 hash SHA256 hash
vs14-kb4489639.exe 74906BE3045EE77A88FD87539FEF52CA4D4A3889 169C70C94A412C702DCB345E5DDDB534DF78B7F2573DE704B5E063ED73DD0A26

Installation verification

To check that this security update was applied correctly, follow these steps:

  1. Open the Visual Studio 2015 folder.
  2. Locate the DiagnosticHub.StandardCollector.Runtime.dll file.
  3. Verify that the file version is equal to or greater than 14.0.27533.

Information about protection, security, and support

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0

Percentile

9.5%