Article 4913A Microsoft patches 0-day vulnerabilities in IE and Exchange

Microsoft patches 0-day vulnerabilities in IE and Exchange

by
Dan Goodin
from Ars Technica - All content on (#4913A)
getty-microsoft-800x517.jpg

Enlarge (credit: Getty Images | Justin Sullivan)

Microsoft's Patch Tuesday this month had higher-than-usual stakes with fixes for a zero-day Internet Explorer vulnerability under active exploit and an Exchange Server flaw that was disclosed last month with proof-of-concept code.

The IE vulnerability, Microsoft said, allows attackers to test whether one or more files are stored on disks of vulnerable PCs. Attackers first must lure targets to a malicious site. Microsoft, without elaborating, said it has detected active exploits against the vulnerability, which is indexed as CVE-2019-0676 and affects IE version 10 or 11 running on all supported versions of Windows. The flaw was discovered by members of Google's Project Zero vulnerability research team.

Microsoft also patched Exchange against a vulnerability that allowed remote attackers with little more than an unprivileged mailbox account to gain administrative control over the server. Dubbed PrivExchange, CVE-2019-0686 was publicly disclosed last month, along with proof-of-concept code that exploited it. In Tuesday's advisory, Microsoft officials said they haven't seen active exploits yet but that they were "likely."

Read 2 remaining paragraphs | Comments

index?i=otsbTj7EmrE:6uGOrmL_i6A:V_sGLiPB index?i=otsbTj7EmrE:6uGOrmL_i6A:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments