The Microsoft Visual Studio Products are missing a security update. It is, therefore, affected by the following vulnerability :
A remote code execution vulnerability exists in Visual Studio software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (CVE-2019-0613)
A vulnerability exists in certain .Net Framework APIâs and Visual Studio in the way they parse URLâs. An attacker who successfully exploited this vulnerability could use it to bypass security logic intended to ensure that a user-provided URL belonged to a specific hostname or a subdomain of that hostname. This could be used to cause privileged communication to be made to an untrusted service as if it was a trusted service. To exploit the vulnerability, an attacker must provide a URL string to an application that attempts to verify that the URL belongs to a specific hostname or to a subdomain of that hostname. The application must then make an HTTP request to the attacker-provided URL either directly or by sending a processed version of the attacker-provided URL to a web browser.
(CVE-2019-0657)
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Microsoft Security Updates API. The text
# itself is copyright (C) Microsoft Corporation.
#
include("compat.inc");
if (description)
{
script_id(122133);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/06/27");
script_cve_id("CVE-2019-0613", "CVE-2019-0657");
script_bugtraq_id(106872, 106890);
script_name(english:"Security Updates for Microsoft Visual Studio Products (February 2019)");
script_summary(english:"Checks for Microsoft security updates.");
script_set_attribute(attribute:"synopsis", value:
"The Microsoft Visual Studio Products are missing a security update.");
script_set_attribute(attribute:"description", value:
"The Microsoft Visual Studio Products are missing a security
update. It is, therefore, affected by the following
vulnerability :
- A remote code execution vulnerability exists in Visual Studio
software when the software fails to check the source markup of a
file. An attacker who successfully exploited the vulnerability
could run arbitrary code in the context of the current user. If
the current user is logged on with administrative user rights, an
attacker could take control of the affected system. An attacker
could then install programs; view, change, or delete data; or
create new accounts with full user rights. Users whose accounts
are configured to have fewer user rights on the system could be
less impacted than users who operate with administrative user
rights. (CVE-2019-0613)
- A vulnerability exists in certain .Net Framework API's and Visual
Studio in the way they parse URL's. An attacker who successfully
exploited this vulnerability could use it to bypass security
logic intended to ensure that a user-provided URL belonged to a
specific hostname or a subdomain of that hostname. This could be
used to cause privileged communication to be made to an untrusted
service as if it was a trusted service. To exploit the
vulnerability, an attacker must provide a URL string to an
application that attempts to verify that the URL belongs to a
specific hostname or to a subdomain of that hostname. The
application must then make an HTTP request to the
attacker-provided URL either directly or by sending a processed
version of the attacker-provided URL to a web browser.
(CVE-2019-0657)");
# https://docs.microsoft.com/en-us/visualstudio/releasenotes/vs2017-relnotes-v15.0
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?30855885");
# https://docs.microsoft.com/en-us/visualstudio/releasenotes/vs2017-relnotes
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1d93e731");
script_set_attribute(attribute:"solution", value:
"Microsoft has released the following security updates to address this issue:
- Update 15.0 (26228.73) for Visual Studio 2017
- Update 15.9.7 for Visual Studio 2017 15.9");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0613");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/12");
script_set_attribute(attribute:"patch_publication_date", value:"2019/02/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/12");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:visual_studio");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ms_bulletin_checks_possible.nasl", "microsoft_visual_studio_installed.nbin");
script_require_keys("SMB/MS_Bulletin_Checks/Possible", "installed_sw/Microsoft Visual Studio");
script_require_ports(139, 445, "Host/patch_management_checks");
exit(0);
}
include("audit.inc");
include("misc_func.inc");
include("install_func.inc");
include("global_settings.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
get_kb_item_or_exit('installed_sw/Microsoft Visual Studio');
port = kb_smb_transport();
appname = 'Microsoft Visual Studio';
installs = get_installs(app_name:appname, exit_if_not_found:TRUE);
report = '';
foreach install (installs[1])
{
version = install['version'];
path = install['path'];
prod = install['product_version'];
# VS 2017 (15.0)
if (prod == '2017' && version =~ '^15\\.0\\.')
{
fix = '15.0.26228.73';
if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)
{
report +=
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : ' + fix +
'\n';
}
}
# VS 2017 version 15.9
# On 15.7.5, it asks to update to 15.9.7.
else if (prod == '2017' && version =~ '^15\\.[1-9]\\.')
{
fix = '15.9.28307.423';
if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)
{
report +=
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : ' + fix +
'\n';
}
}
}
if (report != '')
security_report_v4(port:port, severity:SECURITY_HOLE, extra:report);
else
audit(AUDIT_INST_VER_NOT_VULN, appname);
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | visual_studio | cpe:/a:microsoft:visual_studio |