CVE-2019-1367: Zero-Day no Internet Explorer, remendo Agora
CYBER NEWS

CVE-2019-1367: Zero-Day no Internet Explorer, remendo Agora

CVE-2019-1367 é uma nova vulnerabilidade zero-day do tipo execução remota de código, para o qual um patch de emergência foi apenas emitiu.

O bug poderia permitir que invasores para executar ataques remotos com o propósito de prover acesso através de um sistema. The vulnerability is a scripting engine memory corruption issue, which was discovered by Clément Lecigne of Google’s Threat Analysis Group.




CVE-2019-1367: Detalhes técnicos

Aqui está o descrição oficial of CVE-2019-1367:

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.

It should be noted that in case the user is logged in with admin rights, the attacker could take control of the entire system. This event could lead to various outcomes, including the installation of programs, and the alteration or deletion of data.

relacionado: Microsoft Patches CVE-2019-1214, Falhas de dia zero CVE-2019-1215

An attack based on the CVE-2019-1367 exploit could be launched via email (malspam) or by tricking the user into visiting a maliciously crafted website. It should be mentioned that the targeted browser is Internet Explorer, which continues to be used by a large userbase. além disso, spam and malware campaigns take place daily, so applying the emergency patch for CVE-2019-1367 should be done immediately.

CVE-2019-1255

This is not the only issue that Microsoft is addressing. The second vulnerability is assigned the CVE-2019-1255 number and is located in Microsoft Defender. Felizmente, the bug is not as serious as the other one. Attackers could leverage the issue to prevent legitimate accounts from executing legitimate system binaries, Microsoft explicou.

Even though CVE-2019-1255 is not critical, a patch should be applied. The issue is fixed in v1.1.16400.2 of the Microsoft Malware Protection Engine, which is a component of the Microsoft Defender antivirus. The vulnerability was discovered by Charalampos Billinis of F-Secure Countercept and Wenxu Wu of Tencent Security Xuanwu Lab.

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerenciador de conteúdo que foi com SensorsTechForum desde o início. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...