Hacker invaded Wyoming Medical Center

Hacker invaded Wyoming Medical Center

Hackers invaded Wyoming medical center systems forcing a hospital to cancel some surgeries, stop accepting ...
Read More

WeWork's WiFi network is leaking sensitive user information

WeWork WiFi vulnerabilities in the Manhattan-based company building which exposed sensitive company data, ...
Read More

Microsoft: The biggest risk for businesses is cyberattacks

According to a survey by Marsh and Microsoft, the biggest threat to businesses is cyberattacks. Nowadays,...
Read More

How to fix iOS 13 bugs in iPhone Mail app

If you have upgraded to iOS 13, then you may have discovered that the Mail app behaves a bit weird, which is ...
Read More

Check if your folders have malware with Windows Defender!

Windows comes with a free antivirus program, called Windows Defender, that offers continuous protection as well as the ability to ...
Read More
Latest Posts

Microsoft Patch Tuesday September 2019 fixes 2 vulnerabilities


The new ones security updates which was released microsoft for September of 2019, they face 80 vulnerabilities, including two privilege escalation defects that can be exploited by hackers to carry out attacks.

The updates cover Microsoft Windows, Internet Explorer, Microsoft Edge, ChakraCore, Office and Microsoft Office Services and Web Applications, Skype for business and Microsoft Lync, Visual Studio, .NET Framework, Exchange Server, Microsoft Yammer and Team Foundation Server.

Of the vulnerabilities faced by these updates, 17 is classified as critical, 62 is listed as significant, and one is classified as moderate in severity.

The first zero day vulnerability, discovered as CVE-2019-1214, is at Windows Common Log File System (CLFS) and can be used by an experienced attacker to carry out attacks. The vulnerability affects all supported versions of Windows.

"You notice an increase in privilege escalation vulnerabilities when the Windows Common Log File System (CLFS) program does not handle objects in memory correctly. An attacker who successfully exploited this vulnerability could execute more rights-based processes, "Microsoft said in an update.

"To exploit the vulnerability, an attacker must first connect to system and then execute a specially designed one application, to take control of the affected system. "

Microsoft addresses the issue of vulnerability by repairing how CLFS handles objects in memory.

The defect was reported by a Vulcan Qihoo 360 researcher.

The second zero day vulnerability, CVE-2019-1215, affects Winsock (ws2ifsl.sys) and could be exploited by an updated attacker to execute privilege escalation code.

"To exploit vulnerability, one intruder could run a specially designed application. "

Microsoft has addressed the vulnerability by ensuring that ws2ifsl.sys handles objects in memory correctly.

The company has also confirmed that this defect has already been exploited by malware from 2017.

Microsoft also examined two vulnerabilities that were made public before the fixes were made, CVE-2019-1235 and CVE-2019-1294.

The first is a privilege escalation issue in the Windows Text Service Framework, the second is a Windows Secure Boot Boot bypass issue.

How useful was this post?

Average rating / 5. Vote count:

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by
Absent Mia

About Absent Mia

Being your self, in a world that constantly tries to change you, is your greatest achievement

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *