CERT-In Vulnerability Note
CIVN-2018-0206
Elevation of Privilege Vulnerability in Microsoft Visual Studio
Original Issue Date:December 12, 2018
Severity Rating: MEDIUM
Software Affected
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 for 32-bit Systems
- Windows Server 2016
- Windows Server 2016 (Server Core installation)
- Windows 10 Version 1703 for x64-based Systems
- Windows 10 Version 1703 for 32-bit Systems
- Windows 10 Version 1709 for 32-bit Systems
- Windows 10 Version 1709 for 64-based Systems
- Windows Server, version 1709 (Server Core Installation)
- Windows 10 Version 1803 for 32-bit Systems
- Windows 10 Version 1803 for x64-based Systems
- Windows Server, version 1803 (Server Core Installation)
- Microsoft Visual Studio 2015 Update 3
- Microsoft Visual Studio 2017
- Windows 10 Version 1803 for ARM64-based Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
- Windows Server 2019 (Server Core installation)
- Windows 10 Version 1709 for ARM64-based Systems
- Microsoft Visual Studio 2017 version 15.9
Overview
A Vulnerability has been reported in Microsoft Visual Studio which could allow remote attacker to gain elevated privileges on the targeted system.
Description
An elevation of privilege vulnerability exists in Microsoft Visual Studio due to improperly impersonate certain file operations by the Diagnostics Hub Standard Collector Service.
Successful exploitation of this vulnerability could allow an attacker to gain elevated privileges on the targeted system.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
https://portal.msrc.microsoft.com/en-us/security-guidance
Vendor Information
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8599
References
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8599
CVE Name
CVE-2018-8599
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|