Security Market Segment LS
Wednesday, 13 October 2021 09:33

Microsoft patches 71 flaws, including one zero-day Featured

By
Microsoft patches 71 flaws, including one zero-day Pixabay

Seventy-one flaws have been patched in Microsoft's products, the company announced on Tuesday, the monthly Patch Tuesday.

One vulnerability — CVE-2021-40449 — for which a patch was issued was being exploited in the wild, the Russian security firm Kaspersky reported in a separate blog post. However, Microsoft marked this issue as Important, the second level on its scale. A total of four zero-days were patched, three of which had been made public earlier.

The NSA reported one of the vulnerabilities, CVE-2021-26427, but Microsoft said it was less likely to be exploited, despite being a remote code execution flaw in  Microsoft Exchange Server.

Kaspersky researchers Boris Lanin and Costin Raiu said they had detected multiple attacks making use of the elevation of privileges flaw on multiple Windows servers.

"The exploit had numerous debug strings from an older, publicly known exploit for vulnerability CVE-2016-3309, but closer analysis revealed that it was a zero-day," the pair said.

"We discovered that it was using a previously unknown vulnerability in the Win32k driver and exploitation relies heavily on a technique to leak the base addresses of kernel modules.

"We promptly reported these findings to Microsoft. The information disclosure portion of the exploit chain was identified as not bypassing a security boundary, and was therefore not fixed.

"Microsoft assigned CVE-2021-40449 to the use-after-free vulnerability in the Win32k kernel driver and it was patched on 12 October as a part of the October Patch Tuesday."

Of the 71 vulnerabilities patched, two had Microsoft's highest rating of critical. Apart from Windows, bugs were fixed in Edge, Microsoft Exchange, Microsoft Office Services and SharePoint Server.

Ryan Naraine, a veteran security journalist, said in his report that thus far there had been 73 zero-day attacks in the wild. Most took advantage of vulnerable code in products sold by Microsoft, Apple and Google.

Raiu and Lanin said the exploit they had found for CVE-2021-40449 could attack the following Microsoft products:

  • Windows Vista
  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows 10 (build 14393)
  • Windows Server 2016 (build 14393)
  • Windows 10 (build 17763)
  • Windows Server 2019 (build 17763)

"CVE-2021-40449 is a use-after-free vulnerability in Win32k’s NtGdiResetDC function," the pair said.

"As with many other Win32k vulnerabilities, the root cause of this vulnerability lies in the ability to set user-mode callbacks and execute unexpected API functions during execution of those callbacks.

"The CVE-2021-40449 is triggered when the function ResetDC is executed a second time for the same handle during execution of its own callback."

Raiu and Lanin said they had analysed the malware payload used along with the zero-day exploit, and found that variants were detected in widespread espionage campaigns against IT companies, military/defence contractors, and diplomatic entities.

"We are calling this cluster of activity MysterySnail. Code similarity and re-use of C2 infrastructure we discovered allowed us to connect these attacks with the actor known as IronHusky and Chinese-speaking APT activity dating back to 2012," the pair said.

Satnam Narang, a regular commentator on vulnerabilities for iTWire, said a total of 74 CVEs had been patched.

"This month's Patch Tuesday release includes fixes for 74 CVEs, three of which are rated critical, including one vulnerability that was exploited in the wild as a zero-day," said Narang, a staff research engineer with security outfit Tenable.

"This month's release includes a fix for CVE-2021-36970, a spoofing vulnerability in Microsoft's Windows Print Spooler. The vulnerability was discovered by researchers XueFeng Li and Zhiniang Peng of Sangfor. They were also credited with the discovery of CVE-2021-1675, one of two vulnerabilities known as PrintNightmare.

"While no details have been shared publicly about the flaw, this is definitely one to watch for, as we saw a constant stream of Print Spooler-related vulnerabilities patched over the summer while ransomware groups began incorporating PrintNightmare into their affiliate playbook.

"We strongly encourage organisations to apply these patches as soon as possible. Microsoft also patched CVE-2021-40449, an elevation of privilege vulnerability in Win32k.

"According to reports, this flaw was exploited in the wild as a zero-day. It is not uncommon to see zero-day elevation of privilege flaws patched during Patch Tuesday.

"These flaws are most valuable in post-compromise scenarios once an attacker has gained access to a target system through other means, in order to execute code with elevated privileges."


Subscribe to ITWIRE UPDATE Newsletter here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments