National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - August 2023


0 user ratings
2023-08-20 16:01:47
milo
Red Team (CNA)

 - archive -- 
ASP.NET zero-day vuln. Teams malicious meetings. MSMQ critical RCE. Patches & a makeover for last month's unpatched zero-day vuln.

Patch Tuesday - August 2023

Microsoft is addressing 86 vulnerabilities this August Patch Tuesday, including one zero-day vulnerability, as well as five critical remote code execution (RCE) vulnerabilities, and 12 browser vulnerabilities. An unpatched zero-day malicious document vulnerability from July also receives Windows OS updates and clarification in August.

ASP.NET: zero-day denial of service in Kestrel web server

The lone zero-day vulnerability patched this month is CVE-2023-38180, a denial of service (DoS) vulnerability in .NET , ASP.NET Core 2.1, and recent versions of Visual Studio. Microsoft is aware of in-the-wild exploitation. While the only impact noted is availability, administrators responsible for web apps built on ASP.NET are well-advised to patch as soon as possible. The cross-platform Kestrel web server is included in ASP.NET Core, and contains protections so that it can detect and disconnect a potentially malicious client. However, Kestrel will sometimes fail to disconnect the client, leading to denial of service. Microsoft notes that mitigating factors may include a reverse proxy or Web Application Firewall (WAF), since these are designed to detect and mitigate HTTP-based attacks.

Teams: critical RCE on joining malicious meeting

Potentially of greater concern are a pair of Microsoft Teams critical remote code execution (RCE) vulnerabilities. While the CVSS base score of 8.8 is at the top end of NVD’s High severity, Microsoft assesses both CVE-2023-29328 and CVE-2023-29330 as Critical on its own proprietary severity rating, and the advisories make clear why that is: both vulnerabilities allow an attacker to execute code in the context of anyone who joins a Teams meeting set up by the attacker. This affects Teams on all platforms: Windows Desktop, macOS, iOS, and Android. Given how widely Teams is used not just within organizations, but for collaboration outside of the organization in contexts requiring a level of trust of third parties not known to participants  – pre-sales calls, scoping calls, industry association calls and so on – these vulnerabilities surely deserve immediate remediation attention.

Windows MSMQ: critical RCE

The Windows Message Queuing Service is once again the site of multiple critical RCE vulnerabilities this month. CVE-2023-36910, CVE-2023-36911, and CVE-2023-35385 all come with a CVSSv3 base score of 9.8, reflecting the serious potential impact, lack of privileges required, and low attack complexity. One mitigating factor: the Microsoft Message Queueing Service must be enabled and listening on port 1801 for an asset to be vulnerable, and the Message Queueing Service is not installed by default. As Rapid7 has noted previously, however, a number of applications – including Microsoft Exchange – may quietly introduce MSMQ as part of their own installation routine.

Outlook, or perhaps Word: critical maldoc arbitrary code execution

Rounding out the August critical RCE vulnerabilities, CVE-2023-36895 describes a flaw in Microsoft Outlook where an attacker who can convince a user to open a specially-crafted malicious file will be able to execute code in the context of the victim. However, although the advisory describes CVE-2023-36895 as an Outlook vulnerability, linked KB articles for Microsoft Installer versions of Office (e.g.  KB5002464 for Office 2016) describe a security update for Word. At time of writing, it isn't clear whether this is because the vulnerable code is in a shared Office component, or whether this apparent discrepancy is an oversight.

Patch Tuesday watchers will be familiar with Microsoft’s clarification that this type of exploit is sometimes referred to as arbitrary code execution (ACE) since the attack is local – a malicious document opened on the asset – even if the attacker is remote. With no known public disclosure, no known exploitation in the wild, and Microsoft assessing that exploitation is less likely, this is hopefully a case of patch-and-forget.

July unpatched zero-day: revised and patched in August

One month ago, on Patch Tuesday July 2023, Microsoft published a zero-day vulnerability for which they provided no patch, leaving many defenders understandably concerned. Exploitation of CVE-2023-36884 requires that the user opens a malicious document crafted by an attacker, and as Rapid7 noted at the time of publication, Microsoft did provide several mitigation strategies. Happily, the August 2023 Windows updates bring relief from CVE-2023-36884 in the form of patches for every current version of Windows: from Windows 11 and Server 2022 all the way back to Windows Server 2008 for 32-bit Systems Service Pack 2. These patches supersede last month’s mitigation advice, but at least some of those mitigation strategies remain generally applicable.

The advisory for CVE-2023-36884 has been radically updated today with a new title (Windows Search Remote Code Execution Vulnerability) in place of the previous title (Office and Windows HTML Remote Code Execution Vulnerability). Microsoft now states that the vulnerability is in fact a Windows Search security bypass involving a Mark of the Web (MOTW) removal leading to code execution on the victim system. Microsoft has also released a complementary non-CVE advisory ADV230003 with the latest defense-in-depth advice for Microsoft Office administrators; Microsoft claims that following the defense-in-depth advice will stop the attack chain leading to exploitation of CVE-2023-36884, and thus potentially also protect against other as-yet-unknown vulnerabilities. However, defenders should consider that other attack chains may exist which do not involve Office at all.

Exchange: critical elevation of privilege

Exploitation of CVE-2023-21709 allows an attacker to authenticate as a different user. Exchange admins should note that additional remediation actions must be taken after patching. Although the CVSSv3 base score is a Critical-ranked 9.8, Microsoft's proprietary severity scale assesses this vulnerability as Important rather than Critical, since exploitation involves brute-forcing passwords, and strong passwords are challenging to brute force.

Summary Charts

Patch Tuesday - August 2023
Message Queueing and Exchange again.
Patch Tuesday - August 2023
Remote Code Execution covers a broad range of exploits.
Patch Tuesday - August 2023
A typical distribution of CVSSv3 base scores.
Patch Tuesday - August 2023
This heatmap shows distribution of vulnerabilities, rather than risk.

Summary Tables

Azure vulnerabilities
























































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38176Azure Arc-Enabled Servers Elevation of Privilege VulnerabilityNoNo7
CVE-2023-35394Azure HDInsight Jupyter Notebook Spoofing VulnerabilityNoNo4.6
CVE-2023-36877Azure Apache Oozie Spoofing VulnerabilityNoNo4.5
CVE-2023-35393Azure Apache Hive Spoofing VulnerabilityNoNo4.5
CVE-2023-38188Azure Apache Hadoop Spoofing VulnerabilityNoNo4.5
CVE-2023-36881Azure Apache Ambari Spoofing VulnerabilityNoNo4.5

Azure Developer Tools vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36869Azure DevOps Server Spoofing VulnerabilityNoNo6.3

Browser vulnerabilities


































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38157Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilityNoNo6.5
CVE-2023-4078Chromium: CVE-2023-4078 Inappropriate implementation in ExtensionsNoNoN/A
CVE-2023-4077Chromium: CVE-2023-4077 Insufficient data validation in ExtensionsNoNoN/A
CVE-2023-4076Chromium: CVE-2023-4076 Use after free in WebRTCNoNoN/A
CVE-2023-4075Chromium: CVE-2023-4075 Use after free in CastNoNoN/A
CVE-2023-4074Chromium: CVE-2023-4074 Use after free in Blink Task SchedulingNoNoN/A
CVE-2023-4073Chromium: CVE-2023-4073 Out of bounds memory access in ANGLENoNoN/A
CVE-2023-4072Chromium: CVE-2023-4072 Out of bounds read and write in WebGLNoNoN/A
CVE-2023-4071Chromium: CVE-2023-4071 Heap buffer overflow in VisualsNoNoN/A
CVE-2023-4070Chromium: CVE-2023-4070 Type Confusion in V8NoNoN/A
CVE-2023-4069Chromium: CVE-2023-4069 Type Confusion in V8NoNoN/A
CVE-2023-4068Chromium: CVE-2023-4068 Type Confusion in V8NoNoN/A

Developer Tools vulnerabilities
























































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35390.NET and Visual Studio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36899ASP.NET Elevation of Privilege VulnerabilityNoNo7.5
CVE-2023-38180.NET and Visual Studio Denial of Service VulnerabilityYesNo7.5
CVE-2023-38178.NET Core and Visual Studio Denial of Service VulnerabilityNoNo7.5
CVE-2023-36873.NET Framework Spoofing VulnerabilityNoNo7.4
CVE-2023-35391ASP.NET Core SignalR and Visual Studio Information Disclosure VulnerabilityNoNo7.1

Developer Tools Microsoft Office vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36897Visual Studio Tools for Office Runtime Spoofing VulnerabilityNoNo8.1

ESU vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35379Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36876Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege VulnerabilityNoNo7.1

Exchange Server vulnerabilities
























































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-21709Microsoft Exchange Server Elevation of Privilege VulnerabilityNoNo9.8
CVE-2023-38181Microsoft Exchange Server Spoofing VulnerabilityNoNo8.8
CVE-2023-38185Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35368Microsoft Exchange Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-35388Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8
CVE-2023-38182Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8

Microsoft Dynamics vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38167Microsoft Dynamics Business Central Elevation Of Privilege VulnerabilityNoNo7.2
CVE-2023-35389Microsoft Dynamics 365 On-Premises Remote Code Execution VulnerabilityNoNo6.5

Microsoft Office vulnerabilities









































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-29328Microsoft Teams Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-29330Microsoft Teams Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-36891Microsoft SharePoint Server Spoofing VulnerabilityNoNo8
CVE-2023-36892Microsoft SharePoint Server Spoofing VulnerabilityNoNo8
CVE-2023-36895Microsoft Outlook Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36865Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36866Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35372Microsoft Office Visio Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35371Microsoft Office Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36896Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-36890Microsoft SharePoint Server Information Disclosure VulnerabilityNoNo6.5
CVE-2023-36894Microsoft SharePoint Server Information Disclosure VulnerabilityNoNo6.5
CVE-2023-36893Microsoft Outlook Spoofing VulnerabilityNoNo6.5

SQL Server vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38169Microsoft OLE DB Remote Code Execution VulnerabilityNoNo8.8

System Center vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-38175Microsoft Windows Defender Elevation of Privilege VulnerabilityNoNo7.8

Windows vulnerabilities


































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-35387Windows Bluetooth A2DP driver Elevation of Privilege VulnerabilityNoNo8.8
CVE-2023-38186Windows Mobile Device Management Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35382Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35386Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38154Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36904Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36898Tablet Windows User Interface Application Core Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-38170HEVC Video Extensions Remote Code Execution VulnerabilityNoNo7.8
CVE-2023-35378Windows Projected File System Elevation of Privilege VulnerabilityNoNo7
CVE-2023-36905Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityNoNo5.5
CVE-2023-36914Windows Smart Card Resource Management Server Security Feature Bypass VulnerabilityNoNo5.5
CVE-2023-35384Windows HTML Platforms Security Feature Bypass VulnerabilityNoNo5.4

Windows ESU vulnerabilities















































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2023-36910Microsoft Message Queuing Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-36911Microsoft Message Queuing Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-35385Microsoft Message Queuing Remote Code Execution VulnerabilityNoNo9.8
CVE-2023-35381Windows Fax Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-36882Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2023-36903Windows System Assessment Tool Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35359Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-35380Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-36900Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2023-38184Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityNoNo7.5
CVE-2023-35383Microsoft Message Queuing Information Disclosure VulnerabilityNoNo7.5
CVE-2023-36912Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2023-38172Microsoft Message Queuing Denial of Service VulnerabilityNoNo7.5
CVE-2023-36913Microsoft Message Queuing Information Disclosure VulnerabilityNoNo6.5
CVE-2023-36909Microsoft Message Queuing Denial of Service VulnerabilityNoNo6.5
CVE-2023-35376Microsoft Message Queuing Denial of Service VulnerabilityNoNo6.5
CVE-2023-38254Microsoft Message Queuing Denial of Service VulnerabilityNoNo6.5
CVE-2023-35377Microsoft Message Queuing Denial of Service VulnerabilityNoNo6.5
CVE-2023-36908Windows Hyper-V Information Disclosure VulnerabilityNoNo5.7
CVE-2023-36889Windows Group Policy Security Feature Bypass VulnerabilityNoNo5.5
CVE-2023-36906Windows Cryptographic Services Information Disclosure VulnerabilityNoNo5.5
CVE-2023-36907Windows Cryptographic Services Information Disclosure VulnerabilityNoNo5.5
CVE-2023-20569AMD: CVE-2023-20569 Return Address PredictorNoNoN/A



Source: Rapid7
Source Link: https://blog.rapid7.com/2023/08/08/patch-tuesday-august-2023/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.