Saturday, August 11, 2018

VA SCAN: KB4088880: Windows Server 2012 March 2018 Security Update


ISSUE:  
Description
The auditing Software Nessus/Others find Windows host is missing security update 4088880 or cumulative update 4088877 for systems which has already been patched.



CVES: (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)(CVE-2018-0878)(CVE-2018-0929)(CVE-2018-0883)(CVE-2018-0881)(CVE-2018-0889, CVE-2018-0935)(CVE-2018-0811, CVE-2018-0813, CVE-2018-0814)(CVE-2018-0885)(CVE-2018-0886)(CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901, CVE-2018-0904)(CVE-2018-0868) (CVE-2018-0816, CVE-2018-0817) (CVE-2018-0888).


Cause: The issue is often caused due to the fact that not only are the systems to be patched but some values to the registry needs to be manually added.

 a)SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\FeatureSettingsOverride

 b) SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\FeatureSettingsOverrideMask


Solution: Please back up the registry in case you want to revert. Add the following commands in an administrative power shell.


reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 8 /f

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f

A restart is required for the changes to take effect.




Ref: KB Article 4072698


Tenable Scan: Security Updates for Internet Explorer (June 2017)


 A High Vulnerability Alert Shows up in the Nessus Scan even after doing all the updates.





Description
The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :

- A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.
This vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. (CVE-2017-8519, CVE-2017-8547)

- A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2017-8517, CVE-2017-8522, CVE-2017-8524)

Solution:

   Even though all updates have been done you need to manually change some registry settings in order to fully close this vulnerability.


Please run this as admin in power shell

 reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_PRINT_INFO_DISCLOSURE_FIX" /v iexplore.exe /t REG_DWORD /d 1 /f

reg add "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_PRINT_INFO_DISCLOSURE_FIX" /v iexplore.exe /t REG_DWORD /d 1 /f


Restart the machine and do a re scan with Nessus  and Vulnerability would appear as closed.



SSH Weak MAC Algorithms Enabled on Huawei Switches & Routers

Nessus / Qualys scan Description The remote SSH server is configured to allow either MD5 or 96-bit MAC algori...