it.ucsf.edu

Security Update:Microsoft released an out-of-band CRITICAL security update to address a vulnerability in multiple products

Status Type

Security Update

Date and Time

Thursday, May 16, 2019 - 14:48

Reason

Security update

Impact

Microsoft users

WHAT HAPPENED?

Microsoft released an out-of-band CRITICAL security update to address a vulnerability in multiple products

 

Advanced Users: For a complete description and affected software refer to CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability at: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

 

AFFECTED SYSTEMS:

  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for Itanium-Based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows XP SP3 x86
  • Windows XP Professional x64 Edition SP2
  • Windows XP Embedded SP3 x86
  • Windows Server 2003 SP2 x86
  • Windows Server 2003 x64 Edition SP2

 

WHAT'S THE PROBLEM?

There's a remotely exploitable, wormable, pre-auth vulnerability in a very popular server. The healthcare vertical makes heavy use of internet-facing RDP servers to enable various business and support functions. It is likely that significant vertical-wide disruptions will occur when the exploit is eventually made public.

 

HOW DO I PROTECT MY COMPUTER?

Update your software

  1. If you are supported by ITFS or have different IT support, no action on your part is required.
  2. If you do not have IT support or they do not support your computer:
  • Execute emergency patching procedure. Ensure internal systems are fully patched.
  • Consider any VPN links with third-parties and assess potential impact if the third party should be compromised.

 

RELATED LINKS

IT Security http://it.ucsf.edu/security