Tomcat
Professional
- Messages
- 2,688
- Reaction score
- 1,015
- Points
- 113
The latest Patch Tuesday addresses 51 vulnerabilities in Microsoft branded products.
Microsoft released a monthly security update as part of its June Patch Tuesday, fixing 51 vulnerabilities at once. One of them was classified as "Critical" (CVSS above 9 points), and the remaining 50 were classified as "Important" (CVSS above 4 points).
The number of errors in each vulnerability category is listed below:
Additionally, over the past month, 17 vulnerabilities were fixed in the Edge browser based on Chromium.
A critical vulnerability in the Microsoft Message Queuing (MSMQ) service with the ID CVE-2024-30080 and a CVSS rating of 9.8 allows a remote attacker to execute arbitrary code on the server. For successful exploitation, hackers need to send a specially generated malicious MSMQ packet to the server.
Other notable vulnerabilities include remote code execution errors in Microsoft Outlook ( CVE-2024-30103, CVSS 8.8), the Windows Wi-Fi driver (CVE-2024-30078, CVSS 8.8), and several privilege escalation vulnerabilities in the Win32 Kernel subsystem, the Windows Cloud Files mini-filter, and other components.
One of the vulnerabilities, CVE-2023-50868 (CVSS 7.5), is related to a denial of service during the DNSSEC validation process, which can cause CPU overload on the DNSSEC validation resolver. This vulnerability was identified by researchers from the National Center for Applied Cybersecurity (ATHENE) in February.
Tyler Reguli, Associate Director of Security Research at Fortra, said: "NSEC3 is an improved version of NSEC (Next Secure) that provides authenticated denial of existence. This helps prevent DNS cache poisoning for non-existent domains."
The problem applies not only to Microsoft products, but also to other well-known DNS servers, such as bind, powerdns, dnsmasq, and others, which have also released updates to solve this problem.
Information security firm Morphisec, which discovered CVE-2024-30103 in Microsoft Outlook, reported that this vulnerability allows you to execute code without the need for user interaction with the contents of the email. "The lack of user interaction and ease of operation increases the likelihood of attackers exploiting this vulnerability for initial access," said security researcher Michael Gorelik.
All the vulnerabilities fixed in the June update were not actively exploited, but one of them was publicly known at the time of release. Microsoft recommends that users do not delay installing updates to protect their systems.
You can learn more about the full list of patched vulnerabilities on the official Microsoft website.
Microsoft released a monthly security update as part of its June Patch Tuesday, fixing 51 vulnerabilities at once. One of them was classified as "Critical" (CVSS above 9 points), and the remaining 50 were classified as "Important" (CVSS above 4 points).
The number of errors in each vulnerability category is listed below:
- 25 privilege escalation vulnerabilities
- 18 remote code execution vulnerabilities
- 5 Denial-of-Service vulnerabilities
- 3 disclosure vulnerabilities
Additionally, over the past month, 17 vulnerabilities were fixed in the Edge browser based on Chromium.
A critical vulnerability in the Microsoft Message Queuing (MSMQ) service with the ID CVE-2024-30080 and a CVSS rating of 9.8 allows a remote attacker to execute arbitrary code on the server. For successful exploitation, hackers need to send a specially generated malicious MSMQ packet to the server.
Other notable vulnerabilities include remote code execution errors in Microsoft Outlook ( CVE-2024-30103, CVSS 8.8), the Windows Wi-Fi driver (CVE-2024-30078, CVSS 8.8), and several privilege escalation vulnerabilities in the Win32 Kernel subsystem, the Windows Cloud Files mini-filter, and other components.
One of the vulnerabilities, CVE-2023-50868 (CVSS 7.5), is related to a denial of service during the DNSSEC validation process, which can cause CPU overload on the DNSSEC validation resolver. This vulnerability was identified by researchers from the National Center for Applied Cybersecurity (ATHENE) in February.
Tyler Reguli, Associate Director of Security Research at Fortra, said: "NSEC3 is an improved version of NSEC (Next Secure) that provides authenticated denial of existence. This helps prevent DNS cache poisoning for non-existent domains."
The problem applies not only to Microsoft products, but also to other well-known DNS servers, such as bind, powerdns, dnsmasq, and others, which have also released updates to solve this problem.
Information security firm Morphisec, which discovered CVE-2024-30103 in Microsoft Outlook, reported that this vulnerability allows you to execute code without the need for user interaction with the contents of the email. "The lack of user interaction and ease of operation increases the likelihood of attackers exploiting this vulnerability for initial access," said security researcher Michael Gorelik.
All the vulnerabilities fixed in the June update were not actively exploited, but one of them was publicly known at the time of release. Microsoft recommends that users do not delay installing updates to protect their systems.
You can learn more about the full list of patched vulnerabilities on the official Microsoft website.