Сентябрьский набор патчей от Microsoft устраняет 59 уязвимостей, включая две уязвимости нулевого дня, активно эксплуатируемые в реальных кибератаках. Корпорация рекомендует не игнорировать Patch Tuesday.
24 бреши позволяют выполнить код удалённо (RCE), из них только пять получили статус критических. По категориям проблемы распределились следующим образом:
- Три уязвимости обхода защитных функций;
- 24 RCE;
- 9 дыр, приводящих к раскрытию информации;
- 3 DoS;
- 5 — спуфинг;
- 5 багов в Edge.
Что касается 0-day, эти уязвимости получили идентификаторы CVE-2023-36802 и CVE-2023-36761. Первая затрагивает прокси-службу Microsoft Streaming и приводит к повышению прав в системе. Вторая допускает раскрытие информации в Microsoft Word.
Полный список пропатченных брешей приводим ниже:
Затронутый компонент | Идентификатор CVE | CVE-наименование | Степень опасности |
.NET and Visual Studio | CVE-2023-36794 | Visual Studio Remote Code Execution Vulnerability | Важная |
.NET and Visual Studio | CVE-2023-36796 | Visual Studio Remote Code Execution Vulnerability | Критическая |
.NET and Visual Studio | CVE-2023-36792 | Visual Studio Remote Code Execution Vulnerability | Критическая |
.NET and Visual Studio | CVE-2023-36793 | Visual Studio Remote Code Execution Vulnerability | Критическая |
.NET Core & Visual Studio | CVE-2023-36799 | .NET Core and Visual Studio Denial of Service Vulnerability | Важная |
.NET Framework | CVE-2023-36788 | .NET Framework Remote Code Execution Vulnerability | Важная |
3D Builder | CVE-2023-36772 | 3D Builder Remote Code Execution Vulnerability | Важная |
3D Builder | CVE-2023-36771 | 3D Builder Remote Code Execution Vulnerability | Важная |
3D Builder | CVE-2023-36770 | 3D Builder Remote Code Execution Vulnerability | Важная |
3D Builder | CVE-2023-36773 | 3D Builder Remote Code Execution Vulnerability | Важная |
3D Viewer | CVE-2022-41303 | AutoDesk: CVE-2022-41303 use-after-free vulnerability in Autodesk® FBX® SDK 2020 or prior | Важная |
3D Viewer | CVE-2023-36760 | 3D Viewer Remote Code Execution Vulnerability | Важная |
3D Viewer | CVE-2023-36740 | 3D Viewer Remote Code Execution Vulnerability | Важная |
3D Viewer | CVE-2023-36739 | 3D Viewer Remote Code Execution Vulnerability | Важная |
Azure DevOps | CVE-2023-33136 | Azure DevOps Server Remote Code Execution Vulnerability | Важная |
Azure DevOps | CVE-2023-38155 | Azure DevOps Server Remote Code Execution Vulnerability | Важная |
Azure HDInsights | CVE-2023-38156 | Azure HDInsight Apache Ambari Elevation of Privilege Vulnerability | Важная |
Microsoft Azure Kubernetes Service | CVE-2023-29332 | Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability | Критическая |
Microsoft Dynamics | CVE-2023-38164 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Важная |
Microsoft Dynamics | CVE-2023-36886 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Важная |
Microsoft Dynamics Finance & Operations | CVE-2023-36800 | Dynamics Finance and Operations Cross-site Scripting Vulnerability | Важная |
Microsoft Edge (Chromium-based) | CVE-2023-4863 | Chromium: CVE-2023-4863 Heap buffer overflow in WebP | Неизвестно |
Microsoft Edge (Chromium-based) | CVE-2023-4763 | Chromium: CVE-2023-4763 Use after free in Networks | Неизвестно |
Microsoft Edge (Chromium-based) | CVE-2023-4761 | Chromium: CVE-2023-4761 Out of bounds memory access in FedCM | Неизвестно |
Microsoft Edge (Chromium-based) | CVE-2023-4764 | Chromium: CVE-2023-4764 Incorrect security UI in BFCache | Неизвестно |
Microsoft Edge (Chromium-based) | CVE-2023-4762 | Chromium: CVE-2023-4762 Type Confusion in V8 | Неизвестно |
Microsoft Exchange Server | CVE-2023-36744 | Microsoft Exchange Server Remote Code Execution Vulnerability | Важная |
Microsoft Exchange Server | CVE-2023-36756 | Microsoft Exchange Server Remote Code Execution Vulnerability | Важная |
Microsoft Exchange Server | CVE-2023-36745 | Microsoft Exchange Server Remote Code Execution Vulnerability | Важная |
Microsoft Exchange Server | CVE-2023-36777 | Microsoft Exchange Server Information Disclosure Vulnerability | Важная |
Microsoft Exchange Server | CVE-2023-36757 | Microsoft Exchange Server Spoofing Vulnerability | Важная |
Microsoft Identity Linux Broker | CVE-2023-36736 | Microsoft Identity Linux Broker Remote Code Execution Vulnerability | Важная |
Microsoft Office | CVE-2023-36767 | Microsoft Office Security Feature Bypass Vulnerability | Важная |
Microsoft Office | CVE-2023-36765 | Microsoft Office Elevation of Privilege Vulnerability | Важная |
Microsoft Office | CVE-2023-41764 | Microsoft Office Spoofing Vulnerability | Moderate |
Microsoft Office Excel | CVE-2023-36766 | Microsoft Excel Information Disclosure Vulnerability | Важная |
Microsoft Office Outlook | CVE-2023-36763 | Microsoft Outlook Information Disclosure Vulnerability | Важная |
Microsoft Office SharePoint | CVE-2023-36764 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | Важная |
Microsoft Office Word | CVE-2023-36761 | Microsoft Word Information Disclosure Vulnerability | Важная |
Microsoft Office Word | CVE-2023-36762 | Microsoft Word Remote Code Execution Vulnerability | Важная |
Microsoft Streaming Service | CVE-2023-36802 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability | Важная |
Microsoft Windows Codecs Library | CVE-2023-38147 | Windows Miracast Wireless Display Remote Code Execution Vulnerability | Важная |
Visual Studio | CVE-2023-36758 | Visual Studio Elevation of Privilege Vulnerability | Важная |
Visual Studio | CVE-2023-36759 | Visual Studio Elevation of Privilege Vulnerability | Важная |
Visual Studio Code | CVE-2023-36742 | Visual Studio Code Remote Code Execution Vulnerability | Важная |
Visual Studio Code | CVE-2023-39956 | Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability | Важная |
Windows Cloud Files Mini Filter Driver | CVE-2023-35355 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Важная |
Windows Common Log File System Driver | CVE-2023-38143 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Важная |
Windows Common Log File System Driver | CVE-2023-38144 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Важная |
Windows Defender | CVE-2023-38163 | Windows Defender Attack Surface Reduction Security Feature Bypass | Важная |
Windows DHCP Server | CVE-2023-38152 | DHCP Server Service Information Disclosure Vulnerability | Важная |
Windows DHCP Server | CVE-2023-38162 | DHCP Server Service Denial of Service Vulnerability | Важная |
Windows DHCP Server | CVE-2023-36801 | DHCP Server Service Information Disclosure Vulnerability | Важная |
Windows GDI | CVE-2023-36804 | Windows GDI Elevation of Privilege Vulnerability | Важная |
Windows GDI | CVE-2023-38161 | Windows GDI Elevation of Privilege Vulnerability | Важная |
Windows Internet Connection Sharing (ICS) | CVE-2023-38148 | Internet Connection Sharing (ICS) Remote Code Execution Vulnerability | Критическая |
Windows Kernel | CVE-2023-38141 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
Windows Kernel | CVE-2023-38142 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
Windows Kernel | CVE-2023-38139 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
Windows Kernel | CVE-2023-38140 | Windows Kernel Information Disclosure Vulnerability | Важная |
Windows Kernel | CVE-2023-38150 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
Windows Kernel | CVE-2023-36803 | Windows Kernel Information Disclosure Vulnerability | Важная |
Windows Scripting | CVE-2023-36805 | Windows MSHTML Platform Security Feature Bypass Vulnerability | Важная |
Windows TCP/IP | CVE-2023-38160 | Windows TCP/IP Information Disclosure Vulnerability | Важная |
Windows TCP/IP | CVE-2023-38149 | Windows TCP/IP Denial of Service Vulnerability | Важная |
Windows Themes | CVE-2023-38146 | Windows Themes Remote Code Execution Vulnerability | Важная |