Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ The December 2020 Security Update Review

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š The December 2020 Security Update Review


๐Ÿ’ก Newskategorie: Hacking
๐Ÿ”— Quelle: thezdi.com

December is upon us and with it comes the latest security offerings from Adobe and Microsoft. Take a break from your regularly scheduled activities and join us as we review the details of security patches for this month.

Adobe Patches for December 2020

Adobe kicked off their December patch release with four CVEs fixed with updates for Adobe Prelude, Experience Manager, and Lightroom. The patch forย Preludeย fixes a Critical-rated uncontrolled search path vulnerability that could lead to remote code execution. Theย Experience Managerย patch addresses a cross-site scripting (XSS) bug and an information disclosure bug caused by a blind server-side request forgery. The update forย Lightroomย addresses a Critical-rated uncontrolled search path element vulnerability that could lead to arbitrary code execution. None of these bugs are listed as publicly known or under active attack at the time of release.

Interestingly, Adobe also noted they will be releasing an update for Acrobat and Reader at some point this week. This blog will be updated once they do.

Microsoft Patches for December 2020

For December, Microsoft released patches to correct 58 CVEs and one new advisory in Microsoft Windows, Edge (EdgeHTML-based), ChakraCore, Microsoft Office and Office Services and Web Apps, Exchange Server, Azure DevOps, Microsoft Dynamics, Visual Studio, Azure SDK, and Azure Sphere. December is historically a light month of patches from Microsoft and this remains true for 2020. It also brings their CVE total to 1,250 for the year. It will be interesting to see if these trends continue in 2021.

Of these 58 patches, nine are rated as Critical, 46 are rated as Important, and three are rated Moderate in severity. A total of six of these bugs came through the ZDI program. None of the bugs patched this month are listed as publicly known or under active attack at the time of release. Letโ€™s begin take a closer look at some of the more severe bugs in this release, starting with the bug found by multiple researchers:

-ย ย ย ย ย ย ย CVE-2020-17132ย - Microsoft Exchange Remote Code Execution Vulnerability
This is one of several Exchange code execution bugs, and it is credited to three different researchers. This implies the bug was somewhat easy to find, and other researchers are likely to find the root cause, too. Microsoft doesnโ€™t provide an attack scenario here but does note that the attacker needs be authenticated. This indicates that if you take over someoneโ€™s mailbox, you can take over the entire Exchange server. With all of the other Exchange bugs, definitely prioritize your Exchange test and deployment.

-ย ย ย ย ย ย ย CVE-2020-17121ย - Microsoft SharePoint Remote Code Execution Vulnerability
Originally reported through the ZDI program, this patch corrects a bug that could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.ย Similar bugsย patched earlier this year received quite a bit of attention. We suspect this one will, too.

-ย ย ย ย ย ย ย CVE-2020-17095ย - Hyper-V Remote Code Execution Vulnerability
This patch corrects a bug that could allow an attacker to escalate privileges from code execution in a Hyper-V guest to code execution on the Hyper-V host by passing invalid vSMB packet data. It appears that no special permissions are needed on the guest OS to exploit this vulnerability. This bug also has the highest CVSS score (8.5) for the release. However, if Microsoft is wrong about the attack complexity, this could rate as high as 9.9.ย 

-ย ย ย ย ย ย ย CVE-2020-16996ย - Kerberos Security Feature Bypass Vulnerability
This patch corrects a security feature bypass (SFB) bug in Kerberos, but thanks to Microsoftโ€™s decision to remove executive summaries and only provide a CVSS score, we donโ€™t know what specific features are being bypassed. We do know this impacts Kerberos Resource-Based Constrained Delegation (RBCD), as Microsoft has released guidance on managing the deployment of RBCD/Protected User changes in a new KB article. This likely helps to protect against RBCD attacks such as the one detailedย here. This patch adds the NonForwardableDelegation registry key to enable protection on Active Directory domain controller servers. This will be enforced in a future update in February.ย 

Hereโ€™s the full list of CVEs released by Microsoft for December 2020.ย 

CVE Title Severity Public Exploited Type
CVE-2020-17131 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No RCE
CVE-2020-17095 Hyper-V Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17152 Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17158 Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17117 Microsoft Exchange Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17132 Microsoft Exchange Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17142 Microsoft Exchange Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17118 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17121 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No RCE
CVE-2020-17145 Azure DevOps Server and Team Foundation Services Spoofing Vulnerability Important No No Spoof
CVE-2020-17135 Azure DevOps Server Spoofing Vulnerability Important No No Spoof
CVE-2020-17002 Azure SDK for C Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-17160 Azure Sphere Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-17137 DirectX Graphics Kernel Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17147 Dynamics CRM Webclient Cross-site Scripting Vulnerability Important No No XSS
CVE-2020-16996 Kerberos Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-17133 Microsoft Dynamics Business Central/NAV Information Disclosure Important No No Info
CVE-2020-17126 Microsoft Excel Information Disclosure Vulnerability Important No No Info
CVE-2020-17122 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17123 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17125 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17127 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17128 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17129 Microsoft Excel Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17130 Microsoft Excel Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-17143 Microsoft Exchange Information Disclosure Vulnerability Important No No Info
CVE-2020-17141 Microsoft Exchange Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17144 Microsoft Exchange Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17119 Microsoft Outlook Information Disclosure Vulnerability Important No No Info
CVE-2020-17124 Microsoft PowerPoint Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17089 Microsoft SharePoint Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17120 Microsoft SharePoint Information Disclosure Vulnerability Important No No Info
CVE-2020-17159 Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17150 Visual Studio Code Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17148 Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17156 Visual Studio Remote Code Execution Vulnerability Important No No RCE
CVE-2020-16958 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-16959 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-16960 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-16961 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-16962 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-16963 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-16964 Windows Backup Engine Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17103 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17134 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17136 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17097 Windows Digital Media Receiver Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17094 Windows Error Reporting Information Disclosure Vulnerability Important No No Info
CVE-2020-17138 Windows Error Reporting Information Disclosure Vulnerability Important No No Info
CVE-2020-17098 Windows GDI+ Information Disclosure Vulnerability Important No No Info
CVE-2020-17099 Windows Lock Screen Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-17092 Windows Network Connections Service Elevation of Privilege Vulnerability Important No No EoP
CVE-2020-17096 Windows NTFS Remote Code Execution Vulnerability Important No No RCE
CVE-2020-17139 Windows Overlay Filter Security Feature Bypass Vulnerability Important No No SFB
CVE-2020-17140 Windows SMB Information Disclosure Vulnerability Important No No Info
CVE-2020-16971 Azure SDK for Java Security Feature Bypass Vulnerability Moderate No No SFB
CVE-2020-17153 Microsoft Edge for Android Spoofing Vulnerability Moderate No No Spoof
CVE-2020-17115 Microsoft SharePoint Spoofing Vulnerability Moderate No No Spoof

Looking at the remaining Critical-rated updates, only one (surprisingly) impacts the browser. That patch corrects a bug within the JIT compiler. By performing actions in JavaScript, an attacker can trigger a memory corruption condition, which leads to code execution. The lack of browser updates could also be a conscious decision by Microsoft to ensure a bad patch for a browser does not disrupt online shopping during the holiday season. There are two patches for Dynamics 365 for Finance and Operations (on-premises), but both are listed as post-authentication. Thereโ€™s another SharePoint patch, and multiple additional Exchange patches. Interestingly, there are two Important-rated Exchanges patches that are documented as being identical to the Critical rated ones. They have the same CVSS score, same FAQs, and affected products. Be on the safe side and count those as Critical-rated bugs, too.

Moving on to the Important-rated updates, we find 10 Office bugs impacting Outlook, PowerPoint, and Excel. Most are Excel open-and-own types of bugs, although there is also an Excel SFB that requires a group policy to be set. While these types of bugs arenโ€™t typically all that exciting, there are currently no updates for Office 2019 for Mac. If youโ€™re using that edition, be extra vigilant about clicking links until the update arrives.

There are a surprising number of security feature bypass (SFB) bugs getting patched this month. In addition to those previously mentioned, the Azure SDK for both C and Java receive patches. Azure Sphere also gets an SFB fixed, although this should have been automatically applied to IoT devices running Sphere. You only need to take action on that one if your devices are isolated from the update service. Thereโ€™s an SFB-related patch for the Windows Overlay Filter. Thereโ€™s no information about it from Microsoft but given theย researcherย who found it, weโ€™ll likely see some details soon. Perhaps the most interesting SFB this month is in the Windows lock screen. An attacker with physical access could bypass the lock screen of someone who had logged in and locked their session. Iโ€™m sure this bug will be a favorite for on-site red teams for years to come.

There are a handful of information disclosure bugs getting patched this month. As expected, most of these cases only lead to leaks consisting of unspecified memory contents. However, there is a bug in the Windows Error Reporting service that could allow an attacker to read from the file system. The info disclosure bug in SharePoint could allow an attacker to view SQL table columns that are normally hidden. Thereโ€™s a mysterious info disclosure bug being patched in Exchange. Microsoft simply states the information disclosed is โ€œsensitive information.โ€ With no further information to work with, assume a successful attacker could expose any email on the server.

The December release also contains a fair number of Elevation of Privilege (EoP) fixes. The majority of these are found in the Windows Backup Engine and the Cloud Files Mini Filter Driver. In most of these cases, an attacker would need to log in to a target system then run a specially crafted program to escalate privileges. There are a handful of spoofing bugs receiving fixes this month, but without a description, itโ€™s difficult to guess what these might be. The release is rounded out by a Cross-Site Scripting (XSS) bug in Dynamics CRM Webclient.

Looking at the new advisory for December, ADV200013 provides guidance on a spoofing vulnerability in the DNS Resolver. While they provide no information on whether this is being exploited in the wild, they recommend limiting the UDP buffer size to 1221. Implementing this will cause larger DNS queries to switch to TCP, so it seems a relatively safe change to make. The other advisory for this month is the monthly revision update to the Windowsย Servicing Stack, which adds updates for all supported versions of Windows.

Looking Ahead

The first Patch Tuesday for 2021 falls on January 12, and weโ€™ll return with details and patch analysis then. Until then, stay safe, enjoy your patching, and may all your reboots be smooth and clean! Merry Christmahanakwanzika!

...



๐Ÿ“Œ The December 2020 Security Update Review


๐Ÿ“ˆ 23.75 Punkte

๐Ÿ“Œ The December 2020 Security Update Review


๐Ÿ“ˆ 23.75 Punkte

๐Ÿ“Œ COVID-19 themed attacks December 6 โ€“ December 19, 2020


๐Ÿ“ˆ 23.29 Punkte

๐Ÿ“Œ The December 2018 Security Update Review


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ The December 2019 Security Update Review


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ The December 2022 Security Update Review


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ The December 2023 Security Update Review


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Here are Fallout 76's patch notes for December 11, December 13 on consoles


๐Ÿ“ˆ 20.72 Punkte

๐Ÿ“Œ Here are Fallout 76's patch notes for December 11, December 13 on consoles


๐Ÿ“ˆ 20.72 Punkte

๐Ÿ“Œ Apple Music karaoke launches and the FBI hates new security features -- December 2022 in review


๐Ÿ“ˆ 18.66 Punkte

๐Ÿ“Œ Apple Watch ban, passcode thieves and Beeper -- December 2023 in review


๐Ÿ“ˆ 16.74 Punkte

๐Ÿ“Œ Rocky Linux: Our first community update is now available - December 2020


๐Ÿ“ˆ 15.45 Punkte

๐Ÿ“Œ Maemo Leste - Fourteenth Update (July, August, September, October, November, December) 2020


๐Ÿ“ˆ 15.45 Punkte

๐Ÿ“Œ Community Update - December 2020


๐Ÿ“ˆ 15.45 Punkte

๐Ÿ“Œ Code Vein Getting Three DLCs in Early 2020, Free Update Drops in December


๐Ÿ“ˆ 15.45 Punkte

๐Ÿ“Œ Microsoft Announces Windows 10 Cumulative Update Changes for December 2020


๐Ÿ“ˆ 15.45 Punkte

๐Ÿ“Œ No December 2020 Update for the Microsoft Surface Duo


๐Ÿ“ˆ 15.45 Punkte

๐Ÿ“Œ Applied DNA to Present at the Imperial Capital 2020 Security Investor Conference on December 3


๐Ÿ“ˆ 14.85 Punkte

๐Ÿ“Œ Microsoft Security Bulletin Advisory Update For December, 2017


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Whatโ€™s in your Androidโ€™s December security update?


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ December 2018 Security Update Release


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Samsung Launches December Security Update for Its Smartphones


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Samsung Galaxy S7 edge Starts Receiving December Security Update


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Huawei Mate 9 Gets New Update, Adds December Security Patch, 10x Camera Zoom


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ ZTE Axon 7 Mini Update Brings T-Mobile VoLTE Support, December Security Patch


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Samsung Launches December Security Update for Its Smartphones


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Adobe December 2018 Security Update Fixes Reader, Acrobat


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Microsoft Security Update Summary For December 11, 2018


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Surface Duo gets December 2022 security patch and one crucial fix in latest update


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ December 2018 Security Update Release


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ December 2018 Security Update Release


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Samsung Galaxy S7 edge Starts Receiving December Security Update


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ Huawei Mate 9 Gets New Update, Adds December Security Patch, 10x Camera Zoom


๐Ÿ“ˆ 14.8 Punkte

๐Ÿ“Œ ZTE Axon 7 Mini Update Brings T-Mobile VoLTE Support, December Security Patch


๐Ÿ“ˆ 14.8 Punkte











matomo