Operating System:

[Win]

Published:

14 August 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0232
                    Security updates for Microsoft Edge
                              14 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Microsoft Edge
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-1197 CVE-2019-1196 CVE-2019-1195
                      CVE-2019-1193 CVE-2019-1192 CVE-2019-1141
                      CVE-2019-1140 CVE-2019-1139 CVE-2019-1131
                      CVE-2019-1030  
Member content until: Friday, September 13 2019
Reference:            ASB-2019.0231
                      ESB-2019.1455.2

OVERVIEW

        Microsoft has released its monthly security patch update for the month
        of August 2019. [1]
        
        This update resolves 10 vulnerabilities across the following products: 
        
         Microsoft Edge


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2019-1030   Information Disclosure   Important
         CVE-2019-1131   Remote Code Execution    Critical
         CVE-2019-1139   Remote Code Execution    Critical
         CVE-2019-1140   Remote Code Execution    Critical
         CVE-2019-1141   Remote Code Execution    Critical
         CVE-2019-1192   Security Feature Bypass  Important
         CVE-2019-1193   Remote Code Execution    Important
         CVE-2019-1195   Remote Code Execution    Critical
         CVE-2019-1196   Remote Code Execution    Critical
         CVE-2019-1197   Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software with the version made 
        available on the Microsoft Update Catalogue for the following 
        Knowledge Base articles. [1]
        
         KB4511553, KB4512508, KB4512497, KB4512517, KB4512516
         KB4512507, KB4512501


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Ilq8
-----END PGP SIGNATURE-----