hessen.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
hessen.social ist die Mastodongemeinschaft für alle Hessen:innen und alle, die sich Hessen verbunden fühlen

Serverstatistik:

1,6 Tsd.
aktive Profile

#msrc

0 Beiträge0 Beteiligte0 Beiträge heute
Sass, David<p>Is <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Defender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Defender</span></a> for <a href="https://infosec.exchange/tags/Identity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Identity</span></a> part of the <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a> <a href="https://infosec.exchange/tags/Bounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bounty</span></a> program? </p><p>Asking for a fried.</p>
Not Simon<p><strong>Microsoft</strong> Security Response Center (MSRC) indicated that they will adopt the Common Weakness Enumeration (CWE) industry standard when identifying a root causeof security vulnerabilities in Microsoft products and services. 🔗 <a href="https://msrc.microsoft.com/blog/2024/04/toward-greater-transparency-adopting-the-cwe-standard-for-microsoft-cves/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msrc.microsoft.com/blog/2024/0</span><span class="invisible">4/toward-greater-transparency-adopting-the-cwe-standard-for-microsoft-cves/</span></a></p><p><a href="https://infosec.exchange/tags/CWE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CWE</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a></p>
Not Simon<p>Happy Patch Tuesday from <strong>Microsoft</strong>: 155 vulnerabilities. <br>EDIT: 1 vulnerability was updated to say Exploited and Publicly Disclosed: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234" rel="nofollow noopener noreferrer" target="_blank">CVE-2024-26234</a> (6.7 medium) <strong>THIS IS AN EXPLOITED ZERO-DAY!</strong> See Sophos article for information on a malicious executable signed by a valid Microsoft Hardware Publisher Certificate: <a href="https://news.sophos.com/en-us/2024/04/09/smoke-and-screen-mirrors-a-strange-signed-backdoor/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2024/04/</span><span class="invisible">09/smoke-and-screen-mirrors-a-strange-signed-backdoor/</span></a></p><blockquote><p>Updated CVE to correct exploit status. This is an informational update only.</p></blockquote><p>cc: <span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>campuscodi</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>briankrebs</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@todb" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>todb</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@serghei" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>serghei</span></a></span> </p><p><a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchTuesday</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE_2024_26234" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE_2024_26234</span></a> <a href="https://infosec.exchange/tags/eitw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eitw</span></a> <a href="https://infosec.exchange/tags/activeexploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activeexploitation</span></a></p>
Not Simon<p>Here is the proof of concept for CVE-2024-28916: 🔗 <a href="https://github.com/Wh04m1001/GamingServiceEoP" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Wh04m1001/GamingSer</span><span class="invisible">viceEoP</span></a></p><blockquote><p>Exploit for arbitrary folder move in GamingService component of Xbox. GamingService is not default service. If service is installed on system it allows low privilege users to escalate to system.</p><p>During the process of changing directory the Gaming Services service will try to open C:\XboxGames\GameSave\Content\MicrosoftGame.Config file, if the file exists the gaming service will try to move whole C:\XboxGames\GameSave folder. It does that by calling MoveFileW API call while impersonating calling user.</p><p>If gaming service fails to move folder due to access denied error it will revert impersonation and perform the move operation as system. As the C:\XboxGames folder gives modify permissions to authenticated users group (even if it does not the user can change it to directory that is fully controlled by that user) user can delete c:\xboxgames folder, create new one, drop arbitrary dll inside C:\XboxGames\GameSave folder and add deny delete ACL for itself so that move operation fails while impersonating user.</p></blockquote><p><a href="https://infosec.exchange/tags/CVE_2024_28916" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE_2024_28916</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/proofofconcept" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proofofconcept</span></a></p>
Not Simon<p>Who expected an Xbox Gaming Services Elevation of Privilege Vulnerability to be a <strong>Zero Day</strong>?! <strong>Microsoft</strong> Security Response Center (MSRC) published CVE-2024-28916 (8.8 high), marked as Publicly Disclosed. "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges." Proof-of-concept exploit code is available. This must have been serious enough to release an update and advisory outside of Patch Tuesday. 🔗 <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-28916" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msrc.microsoft.com/update-guid</span><span class="invisible">e/en-US/advisory/CVE-2024-28916</span></a></p><p>cc: <span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>campuscodi</span></a></span> </p><p><a href="https://infosec.exchange/tags/CVE_2024_28916" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE_2024_28916</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/proofofconcept" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proofofconcept</span></a></p>
Not Simon<p><strong>MSRC</strong> (Microsoft) released 11 Chromium-related security advisories. The ones not already included in Google's original post are as follows:</p><ul><li><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21423" rel="nofollow noopener noreferrer" target="_blank">CVE-2024-21423</a> (4.8 medium) Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</li><li><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-26188" rel="nofollow noopener noreferrer" target="_blank">CVE-2024-26188</a> (4.3 medium) Microsoft Edge (Chromium-based) Spoofing Vulnerability </li><li><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-26192" rel="nofollow noopener noreferrer" target="_blank">CVE-2024-26192</a> (8.2 high) Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</li></ul><p>The Frequently Asked Questions (FAQ) section of each vulnerability explains a lot more than <a href="https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html" rel="nofollow noopener noreferrer" target="_blank">Google</a> normally would. Also provides a CVSSv3 score. These are noted as Not Publicly Disclosed, Not Exploited, and Exploitation Less Likely (CVE-2024-26192 is missing an exploitability assessment).</p><p><a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a> <a href="https://infosec.exchange/tags/securityadvisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityadvisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/Chromium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chromium</span></a></p>
Not Simon<p>Happy Patch Tuesday to those who celebrate: Microsoft, 59 vulnerabilities, 3 zero-days:</p><ul><li>CVE-2023-36025 Windows SmartScreen Security Feature Bypass Vulnerability</li><li>CVE-2023-36033 Windows DWM Core Library Elevation of Privilege Vulnerability (publicly disclosed too)</li><li>CVE-2023-36036 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</li></ul><p><a href="https://infosec.exchange/tags/CVE202336025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202336025</span></a> <a href="https://infosec.exchange/tags/CVE202336033" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202336033</span></a> <a href="https://infosec.exchange/tags/CVE202336036" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202336036</span></a> <a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchTuesday</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <br><a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSRC</span></a> cc: <span class="h-card" translate="no"><a href="https://noc.social/@AAKL" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>AAKL</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@avoidthehack" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>avoidthehack</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@todb" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>todb</span></a></span></p>
Sascha Stumpler<p><a href="https://hessen.social/tags/MSRC" class="mention hashtag" rel="tag">#<span>MSRC</span></a> Security Update Guide Improvement – Representing Hotpatch Updates <a href="https://bit.ly/3vrf8Mc" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">bit.ly/3vrf8Mc</span><span class="invisible"></span></a></p>