The April 2019 Security Update Review

April 09, 2019 | Dustin Childs

April is upon us and with it comes the latest round of patches from Adobe, Microsoft, and others. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month.

Mozilla and VMware

While we normally don’t talk too much about patches from Mozilla and VMware, there are a couple of patches we wanted to highlight. The first is MFSA2019-09. This patch corrects two CVEs disclosed during our most recent Pwn2Own competition. These bugs were reported on March 21 and patched in Firefox on the 22nd. These bugs were patched in Thunderbird with MFSA2019-12 a few days later. 

VMware also released patches related to Pwn2Own. A few days after Mozilla, VMware released VMSA-2019-0005, which among other things, fixes the TOCTOU and OOB read/write bugs identified by the Fluoroacetate team of Amat Cama and Richard Zhu during Pwn2Own. In perhaps their most elegant demonstration of the contest, the Master of Pwn winners browsed to their specially crafted webpage using Microsoft Edge from within a virtualized Windows 10 client. That single act started the string of bugs that resulted in code execution in the underlying hypervisor. Considering the implications, it’s good to see VMware release the patches to address these vulnerabilities quickly. 

Adobe Patches for April 2019

For April, Adobe released patches eight patches covering Acrobat and Reader, Flash, Bridge CC, Shockwave, InDesign, Dreamweaver, and Experience Manager Forms. A total of 13 of these bugs came through the ZDI program. The patch for Acrobat corrects 21 different CVEs. The worst of these vulnerabilities could allow an attacker to completely take control of an affected system. The update for Flash corrects one Critical remote code execution bugs that can control an affected system if a specially crafted video is viewed using Flash along with an Important-rated info disclosure.

The update for Bridge CC corrects eight CVEs – all of which were reported through the ZDI program. Included are two Critical-rated remote code execution bugs that could allow an attacker run their code in the context of the logged-on user. Shockwave receives fixes for seven RCEs – all of them being related to memory corruption. The patch for InDesign also takes care of a single, Critical-rated RCE. There are two patch traversal RCEs corrected by the fix for Adobe XD. The update for Experience Manager Forms corrects an Important-rated cross-site scripting (XSS) bug. The final offering from Adobe in April takes care of a Moderate-rated data disclosure in Dreamweaver.

Microsoft Patches for April 2019

Microsoft released security patches for 74 CVEs along with one advisory. The patches cover Internet Explorer, Edge, Windows, ChakraCore, Microsoft Office and Microsoft Office Services and Web Apps, .NET Framework and ASP.NET, Exchange Server, Visual Studio, Skype for Business, Azure DevOps Server, Open Enclave SDK, and Team Foundation Server. Of these 74 CVEs, 13 are rated Critical and 61 are rated Important in severity. A total of six of these CVEs came through the ZDI program. While none of these bugs are listed as publicly known, two are listed as being under active attack at the time of release.

Let’s take a closer look at some of the more interesting patches for this month, starting with the bugs under active attack:

-       CVE-2019-0803, CVE-2019-0859 – Win32k Elevation of Privilege Vulnerability
No, you’re not experiencing déjà vu. Just like March, there are two similar bugs listed as under active attack. And again, one these bugs was reported by Kaspersky Labs, while this month, the other bug came through the Alibaba Cloud Intelligence Security Team. These bugs allow an attacker to elevate privileges and take over a system after they have access to that system. There’s not much info on how these bugs are being used, but targeted malware seems the most likely source. Regardless, get these rolled out to your systems quickly.

-       CVE-2019-0853 – GDI+ Remote Code Execution Vulnerability
This patch corrects a vulnerability discovered by our own Hossein Lotfi, and corrects a problem in Windows GDI+. The vulnerability occurs when parsing EMF file records. A specially crafted EMF file record can trigger access of an uninitialized pointer, which allows an attacker to execute arbitrary code. Multiple Microsoft components and programs, most notably the OS and Office suite, utilize the GDI+ component. As such, it has been a fertile ground for research over the years.

-       CVE-2019-0688 – Windows TCP/IP Information Disclosure Vulnerability
This patch corrects a bug in the Windows TCP/IP stack that could allow an information disclosure due to Windows improperly handling fragmented IP packets. Data such as SAS token and resource IDs can be leaked back to an attacker. IP fragmentation attacks have existed for years, with things like the Ping of Death and Teardrop being early examples. It’s fascinating to see protocol attacks still exist, even in modern TCP/IP stacks.

-       CVE-2019-0856 – Windows Remote Code Execution Vulnerability
This patch write-up is definitely an oddity. The title lists this as Remote Code Execution, but the description indicates an attacker would need to log on to a system to exploit the bug. Either way, considering it affects all supported Windows versions and that it was fixed by “correcting how Windows handles objects in memory,” – this patch should definitely not be missed.
Note: After the initial publication of this blog, Microsoft revised the description to indicate an authenticated attacker could connect via the Windows Remote Registry Service and thus cause an RCE to occur.

Here’s the full list of CVEs released by Microsoft for April 2019.

CVE Title Severity Public Exploited XI - Latest XI - Older Type
CVE-2019-0803 Win32k Elevation of Privilege Vulnerability Important No Yes 1 0 EoP
CVE-2019-0859 Win32k Elevation of Privilege Vulnerability Important No Yes 1 0 EoP
CVE-2019-0739 Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0786 Hyper-V vSMB Server Elevation of Privilege Vulnerability Critical No No 2 2 EoP
CVE-2019-0791 MS XML Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-0792 MS XML Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-0793 MS XML Remote Code Execution Vulnerability Critical No No 1 1 RCE
CVE-2019-0806 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0810 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0812 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0829 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0845 Windows IOleCvt Interface Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-0853 GDI+ Remote Code Execution Vulnerability Critical No No 2 2 RCE
CVE-2019-0860 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0861 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No 1 N/A RCE
CVE-2019-0685 Win32k Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0688 Windows TCP/IP Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0730 Windows Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0731 Windows Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0732 Windows Security Feature Bypass Vulnerability Important No No 1 1 SFB
CVE-2019-0735 Windows CSRSS Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0752 Scripting Engine Memory Corruption Vulnerability Important No No 1 1 RCE
CVE-2019-0753 Scripting Engine Memory Corruption Vulnerability Important No No 1 1 RCE
CVE-2019-0764 Microsoft Browsers Tampering Vulnerability Important No No 2 2 Tampering
CVE-2019-0790 MS XML Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0794 VBScript Remote Code Execution Vulnerability Important No No 1 1 RCE
CVE-2019-0795 MS XML Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0796 Windows Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0801 Office Remote Code Execution Vulnerability Important No No 1 1 RCE
CVE-2019-0802 Windows GDI Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0805 Windows Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0813 Windows Admin Center Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-0814 Win32k Information Disclosure Vulnerability Important No No 1 1 Info
CVE-2019-0815 ASP.NET Core Denial of Service Vulnerability Important No No 2 2 DoS
CVE-2019-0817 Microsoft Exchange Spoofing Vulnerability Important No No 2 2 Spoof
CVE-2019-0822 Microsoft Graphics Components Remote Code Execution Vulnerability Important No No 1 1 RCE
CVE-2019-0823 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0824 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0825 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0826 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0827 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0828 Microsoft Excel Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0830 Microsoft Office SharePoint XSS Vulnerability Important No No 2 2 XSS
CVE-2019-0831 Microsoft Office SharePoint XSS Vulnerability Important No No 2 2 XSS
CVE-2019-0833 Microsoft Edge Information Disclosure Vulnerability Important No No 2 N/A Info
CVE-2019-0835 Microsoft Scripting Engine Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0836 Windows Elevation of Privilege Vulnerability Important No No 1 1 EoP
CVE-2019-0837 DirectX Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0838 Windows Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0839 Windows Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0840 Windows Kernel Information Disclosure Vulnerability Important No No 1 1 Info
CVE-2019-0841 Windows Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-0842 Windows VBScript Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0844 Windows Kernel Information Disclosure Vulnerability Important No No 1 1 Info
CVE-2019-0846 Jet Database Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0847 Jet Database Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0848 Win32k Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0849 Windows GDI Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0851 Jet Database Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0856 Windows Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0857 Team Foundation Server Spoofing Vulnerability Important No No 2 2 Spoof
CVE-2019-0858 Microsoft Exchange Spoofing Vulnerability Important No No 2 2 Spoof
CVE-2019-0862 Windows VBScript Engine Remote Code Execution Vulnerability Important No No 1 1 RCE
CVE-2019-0866 Team Foundation Server Cross-site Scripting Vulnerability Important No No 2 2 XSS
CVE-2019-0867 Team Foundation Server Cross-site Scripting Vulnerability Important No No 2 2 XSS
CVE-2019-0868 Team Foundation Server Cross-site Scripting Vulnerability Important No No 2 2 XSS
CVE-2019-0869 Team Foundation Server HTML Injection Vulnerability Important No No 2 2 Spoof
CVE-2019-0870 Team Foundation Server Cross-site Scripting Vulnerability Important No No 2 2 XSS
CVE-2019-0871 Team Foundation Server Cross-site Scripting Vulnerability Important No No 2 2 XSS
CVE-2019-0874 Team Foundation Server Cross-site Scripting Vulnerability Important No No 2 2 XSS
CVE-2019-0875 Azure DevOps Server Elevation of Privilege Vulnerability Important No No 2 2 EoP
CVE-2019-0876 Open Enclave SDK Information Disclosure Vulnerability Important No No 2 2 Info
CVE-2019-0877 Jet Database Engine Remote Code Execution Vulnerability Important No No 2 2 RCE
CVE-2019-0879 Jet Database Engine Remote Code Execution Vulnerability Important No No 2 2 RCE

Looking at the other patches for April, this release again sees many remote code execution bugs that impact the web browsing experience. Many of these are in the browsers themselves, but other components like VBScript and MS-XML have similar impacts and attack scenarios. For these cases, an attacker would need to convince a user to browse to a specially crafted website or open a specially crafted file. The other code execution bugs affect primarily Office components and the Jet database engine. For these types of bugs, the attacker would need to convince someone to open a specially crafted file.

Next up are a dozen or so info disclosure bugs. We’ve already mentioned the IP fragmentation case, but most of the other ones are the more familiar variety of memory leaks – often used in sandbox escapes. There is also an info disclosure bug in the Open Enclave SDK that could allow attackers to obtain information stored in the Enclave. If you’re using this SDK to develop Enclave applications in C and C++, you should definitely pick up this patch. There are also a dozen elevation of privilege bugs in the April release, with the majority of these occurring in the Windows kernel.

There’s a denial of service in ASP.NET due to improperly handled web requests. This one is especially interesting since remote, unauthenticated attackers could reach the bug. In addition to the previously mentioned RCEs, the web browsers also receive a patch to address a tampering bug. If successfully exploited, it could allow an attacker to pass custom command line parameters – an often-handy ability when targeting an enterprise.

The Azure DevOps Server receives a patch to address an interesting EoP. The bug allows attackers to add GitHub repos to a project without having the proper access granted to their account. According to the bulletin, an attacker would need to send a specially crafted request to an affected server, so it seems there’s more to a successful attack than trying to check in a new repo.

The release is rounded out by a handful of cross-site scripting (XSS) bugs in SharePoint and Team Foundation Server. The Team Foundation Server also gets a spoofing patch. More interestingly, there are two spoofing vulnerabilities fixed in Microsoft Exchange Server. In both cases, an attacker would need to convince a user to click on a malicious link, so there is a level of social engineering involved.

Finally, the lone advisory for this month is Microsoft’s version of the patch for Flash in Internet Explorer, which only contains defense-in-depth fixes for March.

Looking Ahead

The next patch Tuesday falls on May 14, and we’ll return with details and patch analysis then. Until then, happy patching and may all your reboots be smooth and clean!