April 2020 Patch Bulletin
There are 112 unique CVE’s listed, 6 technologies with critical vulnerabilities, 3 vulnerabilities that were exploited in the wild, and one of those vulnerabilities was publicly disclosed.
This month we pay close attention to CVE-2020-0938, CVE-2020-1020 and CVE-2020-1027. In the case of CVE-2020-0938 and CVE-2020-1020 attacks could execute code with full user rights unless the system is running Windows 10. CVE-2020-1027 will require an attacker to have local access to a machine and then execute a malicious application to elevate privileges.
CVE-2020-0938 |CVE-2020-1020| Adobe Font Manager Library Remote Code Execution Vulnerability
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font – Adobe Type 1 PostScript format.
For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane.
The update addresses the vulnerability by correcting how the Windows Adobe Type Manager Library handles Type1 fonts.
CVE-2020-1027 | Windows Kernel Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
For additional details, please find the information from Microsoft below:
In case of any questions or clarifications please feel free to reach out to ECHO’s Service Desk.