-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2019.0261.2
        Multiple vulnerabilities have been identified in Microsoft
                             Development Tools
                             16 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Microsoft Development Tools
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                      Access Privileged Data          -- Remote/Unauthenticated      
                      Increased Privileges            -- Remote with User Interaction
                      Create Arbitrary Files          -- Existing Account            
                      Denial of Service               -- Remote/Unauthenticated      
                      Cross-site Scripting            -- Existing Account            
                      Provide Misleading Information  -- Remote/Unauthenticated      
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-1306 CVE-2019-1305 CVE-2019-1302
                      CVE-2019-1301 CVE-2019-1300 CVE-2019-1298
                      CVE-2019-1237 CVE-2019-1232 CVE-2019-1231
                      CVE-2019-1217 CVE-2019-1142 CVE-2019-1138
Member content until: Friday, October 11 2019

Revision History:     September 16 2019: Microsoft have added PowerShell Core as being also affected.
                      September 11 2019: Initial Release

OVERVIEW

        Microsoft has released its monthly security patch update for the month of September 2019. [1]
        
        This update resolves 12 vulnerabilities across the following products: 
        
         .NET Core 2.1
         .NET Core 2.2
         ASP.NET Core 2.1
         ASP.NET Core 2.2
         ASP.NET Core 3.0
         Azure DevOps Server 2019 Update 1
         Azure DevOps Server 2019.0.1
         ChakraCore
         Microsoft .NET Framework 3.5
         Microsoft .NET Framework 3.5 AND 4.7.2
         Microsoft .NET Framework 3.5 AND 4.8
         Microsoft .NET Framework 4.5.2
         Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2
         Microsoft .NET Framework 4.8
         Microsoft Visual Studio 2015 Update 3
         Microsoft Visual Studio 2017 version 15.0
         Microsoft Visual Studio 2017 version 15.9
         Microsoft Visual Studio 2019 version 16.0
         Microsoft Visual Studio 2019 version 16.2
         Rome SDK 1.4.1
         PowerShell Core 6.1
         PowerShell Core 6.2
         Team Foundation Server 2015 Update 4.2
         Team Foundation Server 2017 Update 3.1
         Team Foundation Server 2018 Update 1.2
         Team Foundation Server 2018 Update 3.2


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2019-1138
          Remote Code Execution    Critical
         CVE-2019-1142
          Elevation of Privilege   Important
         CVE-2019-1217
          Remote Code Execution    Critical
         CVE-2019-1231
          Information Disclosure   Important
         CVE-2019-1232
          Elevation of Privilege   Important
         CVE-2019-1237
          Remote Code Execution    Critical
         CVE-2019-1298
          Remote Code Execution    Critical
         CVE-2019-1300
          Remote Code Execution    Critical
         CVE-2019-1301
          Denial of Service        Important
         CVE-2019-1302
          Elevation of Privilege   Important
         CVE-2019-1305
          Spoofing                 Important
         CVE-2019-1306
          Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software with the version made available on the Microsoft Update Cataloge for the following Knowledge Base articles. [1]
        
        
         KB4514355, KB4514354, KB4514357, KB4514356, KB4514359
         KB4514604, KB4514603, KB4514601, KB4513696, KB4516068
         KB4514599, KB4516044, KB4516058, KB4516070, KB4516066
         KB4514598


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=c3YK
-----END PGP SIGNATURE-----