SynopsisThe Microsoft Visual Studio Products are affected by multiple vulnerabilities.
DescriptionThe Microsoft Visual Studio Products are missing security updates. It is, therefore, affected by multiple vulnerabilities :
- A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated. An attacker who successfully exploited this vulnerability could try an infinite number of authentication attempts. The update addresses the vulnerability by validating the number of incorrect login attempts. (CVE-2018-8171)
- A remote code execution vulnerability exists in .NET software which can lead to exploitation of a user's machine by allowing attackers to run arbitrary code.
The update addresses the vulnerability by correcting how .NET checks the source markup of a file.
- A tampering vulnerability exists in Microsoft Macro Assembler when code is improperly validated. The security update addresses the vulnerability asserting that Microsoft Macro Assembler properly validates code logic. (CVE-2018-8232)
SolutionMicrosoft has released the following security updates to address this issue: