Security Updates for Microsoft Skype for Business and Microsoft Lync (July 2018)
Critical Nessus Plugin ID 111045
SynopsisThe Microsoft Skype for Business or Microsoft Lync installation on the remote host is affected by multiple vulnerabilities.
DescriptionThe Microsoft Skype for Business or Microsoft Lync installation on the remote host is missing security updates.
It is, therefore, affected by multiple vulnerabilities :
- A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages. An attacker who successfully exploited the vulnerability could execute arbitrary commands in the context of the logged-in user.
The security feature bypass by itself does not allow arbitrary code execution. Instead, an attacker would have to convince users to click a link to a file. In a file-sharing attack scenario, an attacker could provide a specially-crafted file designed to exploit the vulnerability, and then convince a user to click the link to the file. The update addresses the vulnerability by correcting how Skype for Business and Lync handle links to UNC paths. (CVE-2018-8238)
- A remote code execution vulnerability exists when Skype for Business and Microsoft Lync clients fail to properly sanitize specially crafted content. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2018-8311)
SolutionMicrosoft has released the following security updates to address this issue: