Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2020.0098 Microsoft Patch Tuesday update for Developer Tools for May 2020 13 May 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Developer Tools Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-1192 CVE-2020-1171 CVE-2020-1161 CVE-2020-1108 CVE-2020-1066 Member content until: Friday, June 12 2020 Reference: ESB-2020.1012 OVERVIEW Microsoft has released its monthly security patch update for the month of May 2020. This update resolves 5 vulnerabilities across the following products: [1] .NET Core 2.1 .NET Core 3.1 .NET Core 5.0 ASP.NET Core 3.1 Microsoft .NET Framework 2.0 Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 3.5 AND 4.6/4.6.1/4.6.2 Microsoft .NET Framework 3.5 AND 4.7.1/4.7.2 Microsoft .NET Framework 3.5 AND 4.7.2 Microsoft .NET Framework 3.5 AND 4.8 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Microsoft .NET Framework 4.8 Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8) Microsoft Visual Studio 2019 version 16.0 Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) Microsoft Visual Studio 2019 version 16.5 Visual Studio Code IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2020-1066 Elevation of Privilege Important CVE-2020-1108 Denial of Service Important CVE-2020-1161 Denial of Service Important CVE-2020-1171 Remote Code Execution Important CVE-2020-1192 Remote Code Execution Critical MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1] KB4556807, KB4556826, KB4552931, KB4556402, KB4556441 KB4556406, KB4556813, KB4552929, KB4556404, KB4556405 KB4556399, KB4556401, KB4552926, KB4556403, KB4556812 KB4552928, KB4556400 REFERENCES [1] Security Update Guide https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXrsskGaOgq3Tt24GAQgOTxAAgiZAlVtNnEMQQp38tE3bcr95GtuBCuCX AfWdJP3Xa5c4DCWBMeR2dqAa4t6J+swCNToBfpahr+n0apWabnTeNzRQQx9L4lS8 UwOw0W9QImeiuzJ+hlXR6fx9wM1h2TlFd0ACO2yJ70v40U0zSQfYAjQzqFgqraEc /USTKulWTfPxzS98XK3lUqec//mAHrA8+AdvVnuJWSuD8gq8C4NduBqTVJcvjwqA 0XH40Y7IuokC2GiDQf3n9hom+hgom5aSg6r6HXs4w3bNlWpfcbAX+Txl9yVBCalS HpM6IGTjt4Ea5IYYBR8T3eo5lV3p5cEitSH4r4MetVpkz1yb+QgD3BtMK/nCllri RIbz9Zl4fCyCnh1Yc9dY42kl6+22dIbtLwWsXwhFqHqBGvlyEzgoMXd/5IZEfMcz 2eEizbw6QCbLjJ4vOqjLFAcj3Keq94TDBuHrcrTfA1c8alQi3ni//TVtklLnRLSE vaqt6TCFgKljkF9f42twUSh6uqoA+RQAGlLfvYmw5913IPy4LZsohPwz5+VKw6I5 p25I2WFpwW80p5Wn7lGghKq2AwoiKFVs5U22+1RmNuDistv/+82yFumUcGxCeENd sRoHzGp+W9J08m13Y3zFAonab1g1JmWHWgmBh4CTRKgkj8YVjrqI8k0zMB0cli6N b4ZBeLKyG98= =S9SI -----END PGP SIGNATURE-----