The December 2019 Security Update Review

December 10, 2019 | Dustin Childs

We’ve made it to the end of the year and the final scheduled security updates from Microsoft and Adobe for 2019. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month.  

Adobe Patches for December 2019

Adobe closes out 2019 with four patches fixing 25 CVEs in Acrobat Reader, Bracket, Cold Fusion and Photoshop. The update for Acrobat Reader corrects 21 CVEs. Most are rated Critical with a few rated Important in severity. The types of bugs addressed primarily include Out-of-Bounds Reads and Writes, some untrusted pointer dereferences, and a few Use-After-Free (UAF). None are listed as publicly known or under active attack at the time of release.

The update for Brackets also addresses a single, Critical-rated bug that could allow remote code execution via command injection. The patch for Photoshop fixes two Critical-rated memory corruption bugs that could lead to arbitrary code execution. The Cold Fusion patch fixes an Important-rated insecure permissions bug.

Microsoft Patches for December 2019

This December, Microsoft released security patches for a mere 36 CVEs covering Microsoft Windows, Internet Explorer (IE), Hyper-V Server, Microsoft Defender, GitHub Library, Office and Office Services and Web Apps, and SQL Server. Seven of these CVEs were reported through the ZDI program. Of these 36 CVEs, seven are rated Critical, 28 are rated Important, and one is rated Moderate in severity. While this is a much lower quantity of CVEs compared to other months, it is quite common for Microsoft to have a light December release. None of the patches released this month are listed as publicly known, but one is listed as being actively exploited at the time of release.

Let’s take a closer look at some of the more interesting updates for this month, starting with the bug currently being exploited:

-       CVE-2019-1458 – Win32k Elevation of Privilege Vulnerability
This is the one bug listed as being under active attack this month and was reported by Kaspersky Labs. That group also reported a UAF in Chrome that was under active exploit. When that bug became public, there was speculation it was being paired with a Windows kernel bug to escape the sandbox. While it’s not confirmed this patch is connected to those Chrome attacks, this is the type of bug one would use to perform a sandbox escape.

-       CVE-2019-1471 – Windows Hyper-V Remote Code Execution Vulnerability
This Critical-rated patch fixes a bug in Hyper-V that would allow a user on a guest OS to execute arbitrary code on the underlying host OS. Bugs like this have been demonstrated at Pwn2Own in the past, and they’re always fun to watch. Considering how much modern computing depends on virtualization, it’s likely we’ll continue to see research that focuses on exploiting the hypervisor from a guest OS.

-       CVE-2019-1468 – Win32k Graphics Remote Code Execution Vulnerability
It’s hard to see a font parsing bug and not be reminded of the Duqu malware. Even eight years later, people are still finding Critical-rated problems in embedded fonts. This example, reported through the ZDI program, could allow an attacker to execute code on an affected system if they view a specially crafted font. If you’re logged on as an Administrator, the attacker could take over the system. Just another reminder that you should not use an account with administrative privileges for day-to-day activities.

Here’s the full list of CVEs released by Microsoft for December 2019.

CVE Title Severity Public Exploited XI - Latest XI - Older Type
CVE-2019-1458 Win32k Elevation of Privilege Vulnerability Important No Yes N/A 0 EoP
CVE-2019-1349 Git for Visual Studio Remote Code Execution Vulnerability Critical No No 2 N/A RCE
CVE-2019-1350 Git for Visual Studio Remote Code Execution Vulnerability Critical No No 2 N/A RCE
CVE-2019-1352 Git for Visual Studio Remote Code Execution Vulnerability Critical No No 2 N/A RCE
CVE-2019-1354 Git for Visual Studio Remote Code Execution Vulnerability Critical No No 2 N/A RCE
CVE-2019-1387 Git for Visual Studio Remote Code Execution Vulnerability Critical No No 2 N/A RCE
CVE-2019-1468 Win32k Graphics Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-1471 Windows Hyper-V Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-1332 Microsoft SQL Server Reporting Services XSS Vulnerability Important No No 2 2 XSS
CVE-2019-1400 Microsoft Access Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1453 Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability Important No No 2 2 DoS
CVE-2019-1461 Microsoft Word Denial of Service Vulnerability Important No No 2 2 DoS
CVE-2019-1462 Microsoft PowerPoint Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-1463 Microsoft Access Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1464 Microsoft Excel Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1465 Windows GDI Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1466 Windows GDI Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1467 Windows GDI Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1469 Win32k Information Disclosure Vulnerability Important No No 1 1 Info
CVE-2019-1470 Windows Hyper-V Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1472 Windows Kernel Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1474 Windows Kernel Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1476 Windows Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-1477 Windows Printer Service Elevation of Privilege Vulnerability Important No No N/A 2 EoP
CVE-2019-1478 Windows COM Server Elevation of Privilege Vulnerability Important No No N/A 2 EoP
CVE-2019-1480 Windows Media Player Information Disclosure Vulnerability Important No No N/A 2 Info
CVE-2019-1481 Windows Media Player Information Disclosure Vulnerability Important No No N/A 2 Info
CVE-2019-1483 Windows Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-1484 Windows OLE Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-1485 VBScript Remote Code Execution Vulnerability Important No No 1 1 RCE
CVE-2019-1486 Visual Studio Live Share Spoofing Vulnerability Important No No 2 N/A Spoof
CVE-2019-1487 Microsoft Authentication Library for Android Information Disclosure Vulnerability Important No No 2 N/A Info
CVE-2019-1488 Microsoft Defender Security Feature Bypass Vulnerability Important No No 1 1 SFB
CVE-2019-1489 Remote Desktop Protocol Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-1490 Skype for Business and Lync Spoofing Vulnerability Important No No 2 2 Spoof
CVE-2019-1351 Git for Visual Studio Tampering Vulnerability Moderate No No 2 N/A Tampering

Looking through the other Critical-rated patches, we see several code execution bugs in Git for Visual Studio. The descriptions for the five bugs are identical. Each states an attacker could take over a system if they can convince a user to clone a malicious repo. Each also states the patch addresses the vulnerability by correcting the manner in which Git validates command-line input. There’s also a tampering bug in Git for Visual Studio being fixed this month, although this patch is Moderate severity rather than Critical.

Moving on to the Important-rated updates, the first one to stand out is the update for VBScript. This manifests as a browser bug, since an affected IE version would allow remote code execution if it opened a specially crafted website. In other words, this is a browse-and-own bug. Since all versions of IE are affected, you should consider this Critical if you have IE in your enterprise.

There are several information disclosure bugs getting fixed this month – more than any other category. Of these 14 patches, several were reported by ZDI’s own Hossein Lotfi. While these vulnerabilities don’t directly lead to code execution, they can be used to make code execution more reliable since the info being disclosed is typically uninitialized memory.

In addition to the EoP under active attack, there are four other EoP patches for December. The most interesting of these is the one involving the Windows Printer Service. A local attacker could run a program designed to cause the service to improperly validate file paths while loading printer drivers, thus elevating for a regular user to a privileged one. The EoP in the kernel and COM server behave in a similar fashion. 

There’s one security feature bypass fix for this month, and it impacts Microsoft Defender. Rather than allow an attacker extra access, the bug allows them trigger warnings and false-positive alerts. If you’ve ever been on the receiving end of an alert flood, you know it can be overwhelming.  An attacker could use this as a type of smoke screen and hide legitimate alerts amongst the fake ones. Neat.

Wrapping up this release, both Skype for Business and Visual Studio Live Share receive patches to address spoofing bugs. There’s also a bug to fix a cross-site scripting (XSS) bug in SQL Server. Word and RDP get DoS bugs corrected.

Finally, the servicing stack advisory (ADV990001) was revised for multiple versions of Windows. No additional advisories were released this month.

Looking Ahead

The first patch Tuesday of 2020 falls on January 14, and we’ll return with details and patch analysis then. Until then, happy patching and may all your reboots be smooth and clean!