Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0110 Microsoft Patch Tuesday update for Extended Security Update for May 2021 12 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Internet Explorer 9 Windows 7 Windows Server 2008 R2 Windows Server 2008 Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Existing Account Provide Misleading Information -- Remote/Unauthenticated Denial of Service -- Existing Account Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-31194 CVE-2021-31193 CVE-2021-31188 CVE-2021-31186 CVE-2021-31184 CVE-2021-31182 CVE-2021-28476 CVE-2021-28455 CVE-2021-26419 CVE-2020-26144 CVE-2020-24588 CVE-2020-24587 Reference: ASB-2021.0104 ASB-2021.0102 ESB-2021.1587 OVERVIEW Microsoft has released its monthly security patch update for the month of May 2021. This update resolves 12 vulnerabilities across the following products: [1] Internet Explorer 9 Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2020-24587 Information Disclosure Important CVE-2020-24588 Spoofing Important CVE-2020-26144 Spoofing Important CVE-2021-26419 Remote Code Execution Critical CVE-2021-28455 Remote Code Execution Important CVE-2021-28476 Remote Code Execution Critical CVE-2021-31182 Spoofing Important CVE-2021-31184 Information Disclosure Important CVE-2021-31186 Information Disclosure Important CVE-2021-31188 Elevation of Privilege Important CVE-2021-31193 Elevation of Privilege Important CVE-2021-31194 Remote Code Execution Critical MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1]. KB5003165, KB5003210, KB5003225, KB5003228, KB5003233 REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYJslG+NLKJtyKPYoAQh/mA/8DHVttWdHlVu/1vQ5I+RUfNmiLihxVNLn BR8zvSxH1ji3Z3lvIz34mlr2/ELkSATqsShOusWZT4p6Hx+6YVgt2WTtycu8nOw7 aCHpEHJn49OaPprYwEU00ISiuQE/xD5ZZU31EviVqWxl+gqyGQUOIVZ8TdDmxUK3 B6SSUZqXiCNHsvF0r/fVNzOKjZupzVWDDCdaRkrXXsG+BqGHSX0FojCveouYjvPh JLXTyXicDhQGseVwHOgRzxJyjNenkMzv9rEnCAqUJ2w50yIYGChBGSznQdy7LQxy SlWxtXQLEKuZ6jP8DaYXGwJzzQSHUes4esgYEUjDSUAv0sll8QZir647ur3ORhi9 c2QuDhz+x1B99tIZY1GBW913/oHkCsAZ7MRmxILhEGvDBORaQcZq1qchFfNBO6JE renyLpHK0NJ8o4fprV6sKXuDAGf4LLEjmkTJeGZwB9HCESt3fUKsATrYW4481cYw UHdRz4jwibsRDGrwJzNe6gD5eyYUXz5BtCFERM6UfjLnNBGjQY9EiWzxjsw3JVma GReY1XWz32HPNRJutQsk6TpdnkHtT8vYgXLpPNOZjj2DLSW1GfEQ9h6kBNuuy0zu yO2BKdDMcUWH8zBahglqiaFmVwLlSt4/45R1Ich7sPCSN3plE0bThGxzt8UeB1WU lhURYCJttQI= =axBL -----END PGP SIGNATURE-----