{"id":16416,"date":"2019-09-25T08:30:09","date_gmt":"2019-09-25T16:30:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/25\/news-10157\/"},"modified":"2019-09-25T08:30:09","modified_gmt":"2019-09-25T16:30:09","slug":"news-10157","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/25\/news-10157\/","title":{"rendered":"What do we know about the big, scary, exploited, emergency-patched IE security hole CVE-2019-1367?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/03\/questions_analytics-100650053-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 25 Sep 2019 07:29:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft set the patching world on its ear on Monday when it released an &#8220;out of band&#8221; patch to fix a vulnerability known as CVE-2019-1367. Susan Bradley<\/span><a href=\"https:\/\/www.askwoody.com\/2019\/patch-lady-we-have-an-out-of-band-release\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">raised the alarm<\/span><\/a><span style=\"font-weight: 400;\"> immediately. I chimed in<\/span><a href=\"https:\/\/www.askwoody.com\/2019\/more-on-the-unexpected-manual-install-only-win10-cumulative-updates-and-ie-patch\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">a few hours later<\/span><\/a><span style=\"font-weight: 400;\"> with more details.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then, yesterday (Tuesday), Microsoft dumped its usual big bunch of &#8220;optional, non-security&#8221; Win10 patches and &#8220;Monthly Rollup Previews&#8221; which\u00a0\u2014 we finally figured out\u00a0\u2014 include the fix for CVE-2019-1367. I wrote about that<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3440741\/microsoft-releases-emergency-ie-patches-inside-optional-non-security-cumulative-updates.html\" rel=\"noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">in <em>Computerworld<\/em><\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft&#8217;s official description of<\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1367\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2019-1367<\/span><\/a><span style=\"font-weight: 400;\"> sounds like a zillion other descriptions:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The part that caught everyone&#8217;s attention, though, was this one little entry in the description:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That &#8220;Exploited: Yes&#8221; notation \u2014 and the fact that the patches were released on a Monday\u00a0\u2014 set the Windows blogosphere into a meltdown. You\u2019ve read the story: Microsoft says it\u2019s exploited, so you better get patched right away! The sky is falling!\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What a crock. But the story sure drew a lot of clicks. A clickety crock.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Usually when Microsoft says a security hole has been &#8220;exploited&#8221; it means that some political group is using it to infiltrate another political group (or high-profile business) in very specific, targeted attacks. Microsoft has to worry about stuff like that. You don&#8217;t.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, when Microsoft released its original bunch of September patches a couple of weeks ago, it identified two of them\u00a0\u2014\u00a0<\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1214\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2019-1214<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1215\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2019-1215<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 as \u201cExploited: Yes.\u201d A few days later, very quietly, Microsoft turned both of them to \u201cExploited: No.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some security folks get worked up about \u201cExploited: Yes.\u201d Those of us who have been working with Microsoft patches for a while know that, even if a security hole is exploited, there\u2019s frequently no reason for the average Windows customer to quake in their boots.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, there <\/span><strong><i>are <\/i><\/strong><span style=\"font-weight: 400;\">some times when an exploited vulnerability warrants your immediate attention. But those cases are very few and far between.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019ve been on a quest to see if there are any openly reported exploits that use this week\u2019s bugaboo, CVE-2019-1367. So far I\u2019ve come up with nothing. The people who know aren\u2019t talking. The closest I\u2019ve come is a <\/span><a href=\"https:\/\/twitter.com\/craiu\/status\/1176525773869649921\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">little tweet<\/span><\/a><span style=\"font-weight: 400;\"> from Costin Raiu, who works at Kaspersky:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recently patched IE 0day (CVE-2019-1367) was used by DarkHotel, does not seem related to ongoing discussions re iOS\/Android attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That rings true, at least to my ear. (<\/span><a href=\"https:\/\/cyware.com\/news\/darkhotel-a-north-korean-hacker-group-which-is-widely-known-for-targeting-high-profile-hotels-199ee6b1\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Cyware describes<\/span><\/a><span style=\"font-weight: 400;\"> DarkHotel as \u201ca North Korea-linked threat actor group that has been active since at least 2007\u201d). If there are any attacks out in the open, I sure can\u2019t find them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quite frankly, I don\u2019t see anything about CVE-2019-1367 that makes it any different from dozens of other 0days out there. We seem to hit one or two in the Windows patching game every month.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So why the horrendously sloppy reaction from Microsoft?\u00a0 Why did we get single-purpose manual-install-only patches on Monday, followed by \u201coptional non-security\u201d updates (which clearly include security patches) and Monthly Rollup Previews (with undocumented security patches) on Tuesday?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I don\u2019t know. But it certainly set the patching world topsy-turvy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make no mistake. This isn\u2019t your grandfather\u2019s out-of-band patch. Usually out-of-band patches tend to be orderly, released for all versions of Windows at once, highly publicized, and available through the various update services. This series of patches looks more like a Keystone Kops attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do <\/span><strong><i>you <\/i><\/strong><span style=\"font-weight: 400;\">think that Microsoft\u2019s cleaned up its Windows patching mess?<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Let me know <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/what-do-we-know-about-the-big-scary-exploited-emergency-patched-internet-explorer-security-hole-cve-2019-1367\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">on AskWoody.com<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3440523\/what-do-we-know-about-the-big-scary-exploited-emergency-patched-ie-security-hole-cve-2019-1367.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/03\/questions_analytics-100650053-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 25 Sep 2019 07:29:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Microsoft set the patching world on its ear on Monday when it released an &#8220;out of band&#8221; patch to fix a vulnerability known as CVE-2019-1367. Susan Bradley<\/span><a href=\"https:\/\/www.askwoody.com\/2019\/patch-lady-we-have-an-out-of-band-release\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">raised the alarm<\/span><\/a><span style=\"font-weight: 400;\"> immediately. I chimed in<\/span><a href=\"https:\/\/www.askwoody.com\/2019\/more-on-the-unexpected-manual-install-only-win10-cumulative-updates-and-ie-patch\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">a few hours later<\/span><\/a><span style=\"font-weight: 400;\"> with more details.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3440523\/what-do-we-know-about-the-big-scary-exploited-emergency-patched-ie-security-hole-cve-2019-1367.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-16416","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16416"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16416\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16416"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}