Tripwire’s October 2018 Patch Priority Index (PPI) brings together the top vulnerabilities from libssh, Microsoft and Oracle.
First on the patch priority list this month is an authentication bypass vulnerability in libssh. This vulnerability can be exploited remotely, and exploit code has recently been added to Metasploit.
Next are patches for Microsoft’s Internet Explorer, Edge and Scripting Engine. These patches resolve 11 vulnerabilities, including fixes for Memory Corruption and Security Feature Bypass vulnerabilities.
Up next are patches for Microsoft Office. Those include fixes for three remote code execution vulnerabilities, one each in Excel, PowerPoint and Word.
Next on the list are the patches for Microsoft Windows. These patches address numerous vulnerabilities across Device Guard, DirectX Graphics Kernel, Windows Kernel, MS XML, Graphics component, JET Database Engine, Windows GDI, Hyper-V, Windows Subsystem for Linux, DNS, Media Player, TCP/IP and Theme. Note that CVE-2018-8453 is a privilege escalation vulnerability in Win32k’s handling of objects in memory, and it has been exploited in the wild. According to ZDNet, the exploit has been used by a nation-state cyber-espionage group known as FruityArmor. Microsoft has rated this as a 1 on the Exploitability Index (Exploitation More Likely) on their latest Windows release, while active exploitation has been detected on older releases.
Next, users should focus on the patches for Microsoft SharePoint and Exchange Server. These patches resolve Elevation of Privilege, Insecure Library Loading and Remote Code Execution vulnerabilities.
Last on the list this month are patches for Oracle Java and Oracle Database. These patches address vulnerabilities in Java SE versions 6u201, 7u191, 8u181 and 11 along with Database Server versions 188.8.131.52, 184.108.40.206, 220.127.116.11 and 18c.
To learn more about Tripwire’s Vulnerability and Exposure Research Team (VERT), click here.
|libssh – Authentication Bypass||CVE-2018-10933|
|Microsoft Internet Explorer||CVE-2018-8460, CVE-2018-8491|
|Microsoft Edge||CVE-2018-8473, CVE-2018-8509, CVE-2018-8530, CVE-2018-8512|
|Microsoft Scripting Engine||CVE-2018-8513, CVE-2018-8510, CVE-2018-8511, CVE-2018-8503, CVE-2018-8505|
|Microsoft Office||CVE-2018-8502, CVE-2018-8501, CVE-2018-8504|
|Microsoft Windows||CVE-2018-8492, CVE-2018-8484, CVE-2018-8486, CVE-2018-8329, CVE-2018-8494, CVE-2018-8333, CVE-2018-8427, CVE-2018-8432, CVE-2018-8423, CVE-2018-8506, CVE-2018-8411, CVE-2018-8453, CVE-2018-8320, CVE-2018-8472, CVE-2018-8489, CVE-2018-8490, CVE-2018-8497, CVE-2018-8330, CVE-2018-8481, CVE-2018-8482, CVE-2018-8495, CVE-2018-8493, CVE-2018-8413|
|Microsoft SharePoint||CVE-2018-8488, CVE-2018-8480, CVE-2018-8498, CVE-2018-8518|
|Microsoft Exchange Server||CVE-2010-3190, CVE-2018-8265, CVE-2018-8448|
|Oracle Java||CVE-2018-14048, CVE-2018-3183, CVE-2018-3180, CVE-2018-13785, CVE-2018-3139, CVE-2018-3150, CVE-2018-3214, CVE-2018-3169, CVE-2018-3211, CVE-2018-3157, CVE-2018-3209, CVE-2018-3136, CVE-2018-3149|
|Oracle Database||CVE-2018-3259, CVE-2018-3299, CVE-2018-7489|