13 New Microsoft and Adobe Vulnerabilities

Community Team Member

Palo Alto Networks Unit 42 provides an overview of 13 new vulnerabilities found in Microsoft and Adobe products that range from critical to important. Review the vulnerabilities and learn how they may impact your network. 

Unit 42 Vulnerabilities in Adobe and Microsoft (Image provided by Unit 42)Unit 42 Vulnerabilities in Adobe and Microsoft (Image provided by Unit 42)

 

Unit 42 Overview

Unit 42 is the global threat intelligence team at Palo Alto Networks and a recognized authority on cyberthreats frequently sought out by enterprises and government agencies around the world. The Unit 42 analysts are experts in hunting and collecting unknown threats as well as completely reverse-engineering malware using code analysis. Their goal is to provide context wherever possible, explaining the nuts and bolts of attacks as well as who’s executing them and why, so defenders globally can gain visibility into threats to better defend their businesses.

 

Vulnerability Overview

Unit 42 threat researchers discovered six new vulnerabilities addressed by the Adobe Product Security Incident Response Team (PSIRT) as part of its December Adobe Security Bulletin APSB19-55 security updates. There are also seven new “important” rated vulnerabilities that were addressed by the Microsoft Security Response Center (MSRC) as part of its September, October, and November 2019 security update releases.

 

Adobe and Microsoft Vulnerabilities

The Adobe vulnerabilities discovered include two “critical” and four “important” rated vulnerabilities, while the severity of the Microsoft vulnerabilities discovered were all rated as “important.”

 

The Unit 42 researchers credited are: Bo Qu, Zhibin Zhang, Qi Deng, Ken Hsu, Lexuan Sun, Hao Cai, Yue Guan, Haozhe Zhang, Hui Gao, Gal De Leon, Bar Lahav, Nadav Markus, and Yaron Samuel.

This is the first Microsoft and Adobe vulnerability discoveries credited to Ken Hsu, Lexuan Sun, Hao Cai, Yue Guan, Haozhe Zhang, Nadav Markus, and Yaron Samuel.

 

The recently discovered exploits are listed in the table below:

Vendor CVE Vulnerability Category Impact Maximum Severity Rating Researcher(s)
Adobe CVE-2019-16456 Out-of-Bounds Read Information Disclosure Important Bo Qu
Adobe CVE-2019-16457 Out-of-Bounds Read Information Disclosure Important Zhibin Zhang
Adobe CVE-2019-16458 Out-of-Bounds Read Information Disclosure Important Qi Deng, Ken Hsu
Adobe CVE-2019-16459 Use After Free Arbitrary Code Execution Critical Lexuan Sun, Hao Cai
Adobe CVE-2019-16464 Use After Free Arbitrary Code Execution Critical Yue Guan, Haozhe Zhan
Adobe CVE-2019-16465 Out-of-Bounds Read Information Disclosure Important Hui Gao, Zhibin Zhang, Yue Guan
Microsoft CVE-2019-1374 Windows Error Reporting Information Disclosure Vulnerability Information Disclosure Important Gal De Leon
Microsoft CVE-2019-1406 Jet Database Engine Remote Code Execution Vulnerability Remote Code Execution Important Bar Lahav and Gal De Leon
Microsoft CVE-2019-1417 Windows Data Sharing Service Elevation of Privilege Vulnerability Elevation of Privilege Important Nadav Markus and Yaron Samuel
Microsoft CVE-2019-1319 Windows Error Reporting Elevation of Privilege Vulnerability Elevation of Privilege Important Gal De Leon
Microsoft CVE-2019-1342 Windows Error Reporting Manager Elevation of Privilege Vulnerability Elevation of Privilege Important Gal De Leon
Microsoft CVE-2019-1241 Jet Database Engine Remote Code Execution Vulnerability Remote Code Execution Important Bar Lahav and Gal De Leon
Microsoft CVE-2019-1250 Jet Database Engine Remote Code Execution Vulnerability Remote Code Execution Important Bar Lahav and Gal De Leon

 

Vulnerabilities Conclusion

Our customers who are following our best practices and have a Threat Prevention Subscription are protected from zero-day vulnerabilities such as these. Weaponized exploits for these vulnerabilities are prevented by Traps' multi-layered exploit prevention capabilities. Threat prevention capabilities such as vulnerability protection with IPS and WildFire provide our customers with comprehensive protection and automatic updates against previously unknown threats.

 

Palo Alto Networks regularly contributes to vulnerability research in Microsoft, Adobe, Apple, Google Android, and other ecosystems, with more than 200 critical vulnerabilities discovered and regular talks at security conferences, such as BlueHat and BlackHat. By proactively identifying these vulnerabilities, developing protections for our customers, and sharing the information with the security community, we are removing weapons used by attackers to threaten users and compromise enterprise, government, and service provider networks.

 

Originally Published By: John Harrison, Sr. Regional Product Marketing Manager, EMEA, as "Unit 42 Discovers 13 New Vulnerabilities Across Microsoft and Adobe Products" on December 19, 2019.

 

Make sure to bookmark the Unit 42 blog to stay on top of new threat discoveries by Unit 42!

 

Don't forget to subscribe to the LIVEcommunity Blog.

 

As always, we welcome all comments and feedback in the comments section below.

 

Stay Secure,
Kiwi out!

966 Views
Ask Questions Get Answers Join the Live Community
Labels