Microsoft closes actively exploited Windows zero-day

By on
Microsoft closes actively exploited Windows zero-day

Remote code execution bugs in Edge taken care of too.

Admins and Windows users have been urged to apply the November 2018 round of security patches urgently, to close off vulnerabilities, one of which is under active exploitation currently.

This is the Kaspersky Labs-reported CVE-2018-8589 vulnerability in the win32k.sys kernel, a privilege elevation bug that allows attackers to run arbitrary code in the local system security context, Microsoft warned.

Attackers need to be logged onto the target system to run specially coded applications to exploit the vulnerability. Successful exploitation of the vulnerability allows full system take over, Microsoft said.

A second zero-day, CVE-2018-8584, is also a privilege escalation bug caused by improper handling of calls to the Advanced Local Procedure Call (ALPC) used for the Microsoft Data Sharing Service feature. 

The zero-day was published on Twitter and Github on October 23, but not disclosed to Microsoft prior to that.

As with CVE-2018-8589, the CVE-2018-8584 vulnerability requires an attacker to be logged on to the target system for successful exploitation and taking control over it.

Current and unpatched versions of Windows 10, as well as Windows Server 2016 and 2019, are vulnerable to the above zero-days.

While Microsoft said in its Security Update Guide that CVE-2018-8584 is not exploited in the wild, security vendor Tenable's chief technology officer Glen Pendley warned that the flaw is serious as it allows non-admin users to access, delete and inject malicious code on vulnerable systems.

The built-in web browsers for current versions of Windows, Edge, also received fixes for several critical, remotely exploitable vulnerabilities. These are mainly in Microsoft's Chakra Javascript rendering engine.

A total of 62 security flaws are fixed in the November 2018 Patch Wednesday.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © . All rights reserved.

Most Read Articles

Log In

  |  Forgot your password?