{"id":19347,"date":"2020-05-14T07:49:44","date_gmt":"2020-05-14T11:49:44","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=19347"},"modified":"2020-05-19T07:12:47","modified_gmt":"2020-05-19T11:12:47","slug":"microsofts-may-2020-security-patch-fixes-111-bugs","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/microsofts-may-2020-security-patch-fixes-111-bugs\/","title":{"rendered":"Microsoft&#8217;s May 2020 Security Patch Fixes 111 Bugs"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 24pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">Microsoft&#8217;s May 2020 Security Patch Fixes 111 Bugs<\/span><\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/windows-10-update-causing-blue-screens-audio-issues-data-loss-and-more\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong><span style=\"text-decoration: underline;\">Before installing this update, please read this article.<\/span><\/strong><\/span><\/a><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Who would have guessed that Windows 10 computers had 111 security vulnerabilities and bugs that needed to be fixed?\u00a0 I don&#8217;t ever recall a security patch that addressed (fixed?) so many problems at the same time.\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">But Microsoft&#8217;s Windows 10 May 2020 patch attempts to address all 111 bugs all at once. Let&#8217;s see how that goes.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">On a positive note, there were no known exploitations of the vulnerabilities &#8211; lucky for us that Microsoft discovered them before the hacking crowd did.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">If you want to know more about the technical side of the May 2020 security patch, here is some information from Threatpost&#8230;<\/span><\/p>\n<blockquote><p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Along with the expected cache of operating system, browser, Office and SharePoint updates, Microsoft has also released updates for .NET Framework, .NET Core, Visual Studio, Power BI, Windows Defender, and Microsoft Dynamics.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><strong>Privilege-Escalation Bugs to the Fore<\/strong><\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The majority of the fixes are important-rated elevation-of-privilege (EoP) bugs. There are a total of 56 of these types of fixes in Microsoft\u2019s May release, primarily impacting various Windows components. This class of vulnerabilities is used by attackers once they\u2019ve managed to gain initial access to a system, in order to execute code on their target systems with elevated privileges.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Three of these bugs have received a rating of &#8216;Exploitation More Likely,&#8217; pointed out Satnam Narang, staff research engineer at Tenable: A pair of flaws in Win32k (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1054\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1054<\/a>,\u00a0<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1143\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1143<\/a>) and one in the Windows Graphics Component (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1135\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1135<\/a>).<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The two flaws in Win32k both exist when the Windows kernel-mode driver fails to properly handle objects in memory, according to Microsoft\u2019s advisory. An attacker who successfully exploited either vulnerability could run arbitrary code in kernel mode; thus, an attacker could then install programs; view, change or delete data; or create new accounts with full user rights.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">To exploit these, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The Windows Graphics Component EoP bug meanwhile is found in most Windows 10 and Windows Server builds, Jay Goodman, strategic product marketing manager at Automox, told Threatpost. &#8216;The vulnerability could allow an exploit that leverages how Windows Graphics handles objects in memory,&#8217; he said. &#8216;An attacker could use this vulnerability to elevate a process\u2019 privileges, allowing the attacker to steal credentials or sensitive data, download additional malware, or execute malicious code.&#8217;<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">It was demonstrated at this year\u2019s Pwn2Own, said Dustin Childs, researcher at Trend Micro\u2019s Zero-Day Initiative.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">&#8216;While Pwn2Own <a href=\"https:\/\/threatpost.com\/defying-covid-19s-pall-pwn2own-goes-virtual\/154002\/\" target=\"_blank\" rel=\"noopener noreferrer\">may have been virtual<\/a> this year, the bugs demonstrated certainly were not,&#8217; he said in a <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2020\/5\/12\/the-may-2020-security-update-review\" target=\"_blank\" rel=\"noopener noreferrer\">Patch Tuesday analysis<\/a>. &#8216;This bug from the Fluoroacetate duo of Richard Zhu and Amat Cama allows a logged-on user to take over a system by running a specially crafted program. They leveraged a use-after-free (UAF) bug in Windows to escalate from a regular user to SYSTEM&#8230;&#8217; <\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/threatpost.com\/microsoft-111-bugs-may-patch-tuesday\/155669\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read more here.<\/a><\/span><\/p><\/blockquote>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">So there you go &#8211; now you know. If you see an update notification in the notification area of your Windows 10 PC or tablet, you might want to update your Windows 10 computer as soon as possible.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Microsoft&#8217;s May 2020 Security Patch Fixes 111 Bugs Before installing this update, please read this article. Who would have guessed that Windows 10 computers had 111 security vulnerabilities and bugs that needed to be fixed?\u00a0 I don&#8217;t ever recall a security patch that addressed (fixed?) so many problems at the same time.\u00a0 But Microsoft&#8217;s Windows 10\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/microsofts-may-2020-security-patch-fixes-111-bugs\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,2366],"tags":[3921,3922,3923],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/19347"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=19347"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/19347\/revisions"}],"predecessor-version":[{"id":19384,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/19347\/revisions\/19384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=19347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=19347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=19347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}