Security
Headlines
HeadlinesLatestCVEs

Source

Microsoft Security Response Center

CVE-2021-40452: HEVC Video Extensions Remote Code Execution Vulnerability

**How do I get the updated app?** The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see here for details. It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. **My system is in a disconnected environment; is it vulnerable?** Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations. **How can I check if the update is installed?** If your device manufacturer preinstalled this app, package versions **2.0.23022.0** and later contain this update. If you purchased this app from the Microsoft Store, package versions **2.0.23022.0** and later contain this update. You can check the package version in PowerShell: `Get-AppxPackage -Name Microsoft.HEVCVideoExtension*`

Microsoft Security Response Center
#vulnerability#microsoft#Microsoft Windows Codecs Library#Security Vulnerability
CVE-2021-43224: Windows Common Log File System Driver Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.

CVE-2021-43222: Microsoft Message Queuing Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.

CVE-2021-43217: Windows Encrypting File System (EFS) Remote Code Execution Vulnerability

**What is the attack vector for this vulnerability?** An attacker could cause a buffer overflow write leading to unauthenticated non-sandboxed code execution. **Does EFS need to be in use for this to be exploited?** No. EFS interfaces trigger a start to the EFS service if it isn’t already running. **How does Microsoft plan to address this vulnerability?** Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how EFS makes connections from client to server. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see KB5009763: EFS security hardening changes in CVE-2021-43217. When the second phase of Windows updates become available in Q1 2022, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to ...

CVE-2021-43216: Microsoft Local Security Authority Server (lsasrv) Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.

CVE-2021-43876: Microsoft SharePoint Elevation of Privilege Vulnerability

**What privileges are required to exploit this vulnerability?** The attacker must be authenticated to the target site, with the rights to use the SharePoint Migration tool and the ability create a new SharePoint site collection.

CVE-2021-4066: Chromium: CVE-2021-4066 Integer underflow in ANGLE

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.53 12/9/2021 96.0.4664.93

CVE-2021-4068: Chromium: CVE-2021-4068 Insufficient validation of untrusted input in new tab page

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.53 12/9/2021 96.0.4664.93

CVE-2021-4067: Chromium: CVE-2021-4067 Use after free in window manager

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.53 12/9/2021 96.0.4664.93

CVE-2021-4064: Chromium: CVE-2021-4064 Use after free in screen capture

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 96.0.1054.53 12/9/2021 96.0.4664.93