Advisory Date: 14 July 2020

  DESCRIPTION

Microsoft addresses several vulnerabilities in its July security bulletin. Trend Micro Deep Security covers the following:

  • CVE-2020-1436 - Windows Font Library Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of specially crafted fonts by the Windows font library. Attackers looking to take advantage of this vulnerability could persuade a user to click on a link that will lead to a specially crafted website that hosts an exploit to this vulnerability, or through a file-sharing session where the attacker sends a specially crafted document.


  • CVE-2020-1421 - LNK Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the processing of .LNK files by Windows. Attackers looking to take advantage of this vulnerability could persuade a user to access a file through a remote shared folder or removable drive.


  • CVE-2020-1400 - Jet Database Engine Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the handling of objects in memory by the Windows Jet Database engine. Attackers looking to take advantage of this vulnerability could persuade a user to open a specially crafted file.


  • CVE-2020-1355 - Windows Font Driver Host Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the way the handling of memory by the Windows Font Driver Host.


  • CVE-2020-1374 - Remote Desktop Client Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the Windows Remote Desktop Client. Attackers looking to exploit this vulnerability must find a way to control the server and convince a user to connect to it.


  • CVE-2020-1403 - VBScript Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the way the handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability could find ways to convince a user of a vulnerable machine to connect to a malicious website.


  INFORMATION EXPOSURE

Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using the Vulnerability Protection are also protected from attacks using these vulnerabilities.

Vulnerability ID DPI Rule Number DPI Rule Name Release Date Vulnerability Protection Compatibility
CVE-2020-1436 1010404 Microsoft Windows PFB Font File Out-Of-Bounds Write Privilege Escalation Vulnerability (CVE-2020-1436) 14-Jul-20 YES
CVE-2020-1421 1010395 Microsoft Windows LNK Remote Code Execution Vulnerability Over WebDAV (CVE-2020-1421) 14-Jul-20 YES
CVE-2020-1400 1010397 Microsoft Windows JET Database Engine Remote Code Execution Vulnerability (CVE-2020-1400) 14-Jul-20 YES
CVE-2020-1355 1010403 Microsoft Windows Font Parsing Remote Code Execution Vulnerability (CVE-2020-1355) 14-Jul-20 YES
CVE-2020-1374 1010402 Microsoft Windows Remote Desktop Client Remote Code Execution Vulnerability (CVE-2020-1374) 14-Jul-20 YES
CVE-2020-1403 1010393 Microsoft Internet Explorer VBScript Remote Code Execution Vulnerability (CVE-2020-1403) 14-Jul-20 YES