Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Patch Tuesday – March 2020

This month sees a bumper crop of fixes from Microsoft; the biggest in the company’s history.

Windows and Windows Server

This month there are patches for 7 ‘Critical’ remote code execution (RCE) bugs for Windows 10, Windows Server 2016, and 2019. CVE-2020-0684 could allow an attacker to gain the same rights as the logged-in user when a .LNK file is parsed. That means that a user doesn’t need to open the .LNK file. When File Explorer or other application parses any removable drive or share containing an infected .LNK file, an attacker could run malicious code of their choice on the target system.

A memory corruption vulnerability in Windows Media Foundation (CVE-2020-0809) could let an attacker create new accounts with full user rights. Users would need to open a specially crafted document to allow the attacker to exploit the bug. A vulnerability (CVE-2020-0881) in the way the Windows Graphics Device Interface (GDI) handles objects in memory could let an attacker take control of the affected system. Including creating new accounts with full user rights. Users without administrative rights would be less impacted by this bug.

Internet Explorer 11 and EdgeHTML get a series of fixes for RCE flaws rated Critical. Most of the remaining bugs, rated Important, are elevation of privilege (EoP) flaws. Although there is one fix for Microsoft IIS Server that plugs a tampering issue when IIS improperly handles malformed request headers.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

SMBv3 compression security advisory

Microsoft issued a security advisory (ADV200005) rated Critical. Microsoft says that it is aware of an RCE bug in Server Message Block 3.1.1. An attacker could exploit the way SMBv3 handles requests to run code on a target SMB Server or SMB Client.

To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it.

The flaw hasn’t been publicly exploited or disclosed but Microsoft says SMB Servers can be protected by disabling SMBv3 compression. The workaround doesn’t protect SMBv3 Clients. For more information on the workaround, see Microsoft’s advisory here.

Microsoft Office

Office 365 ProPlus gets patches for an RCE flaw in Microsoft Word. A memory vulnerability could let an attacker use a specially crafted file to perform actions in the context of the currently logged-in user. The Microsoft Outlook Preview Pane is an attack vector for the vulnerability.

Microsoft Exchange, SharePoint, and SQL Server

Exchange Server 2016 and 2019 get a patch for a spoofing flaw (CVE-2020-0903) that is rated Important. It is a cross-site-scripting vulnerability where Exchange doesn’t properly sanitize specially crafted web requests to affected servers. An attacker could use the flaw to run a script in the context of the currently logged-in user.

SharePoint Server 2016 and 2019 both get fixes for the same bugs that affect Microsoft Word (CVE-2020-0850 and CVE-2020-0852). Both bugs are RCEs. One rated Critical and the other Important.

There are no patches for Microsoft SQL Server this month.

Adobe software

Flash Player got an update yesterday. Bringing Flash to version, Adobe said that it includes important bug fixes. But Adobe didn’t provide information on any security fixes.

That is it for another month!

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

IT consultant, Contributing Editor @PetriFeed, and trainer @Pluralsight. All about Microsoft, Office 365, Azure, and Windows Server.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: