SB2023061406 - Microsoft Visual Studio update for GitHub



SB2023061406 - Microsoft Visual Studio update for GitHub

Published: June 14, 2023 Updated: August 16, 2024

Security Bulletin ID SB2023061406
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Link following (CVE-ID: CVE-2023-25652)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue in "git apply --reject". A local user can create a specially crafted symbolic link to write files outside of the worktree.


2) Input validation error (CVE-ID: CVE-2023-29007)

The vulnerability allows an attacker to tamper with Git configuration.

The vulnerability exists due to insufficient input validation in "git submodule deinit" when renaming or deleting a section from a configuration file. A remote attacker can trick the victim into running the command a malicious configuration file and tamper with Git configuration on the affected system.


3) Untrusted search path (CVE-ID: CVE-2023-29012)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insecure implementation of the Git CMD function, which automatically searches and  executes the doskey.exe file from the current working directory. A remote attacker can trick the victim into placing a malicious file and tricking the victim into executing the CMD command in the directory with malicious file.

4) Untrusted search path (CVE-ID: CVE-2023-29011)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to usage of a hard-coded search path for the connect.exe binary used to run SOCKS5 proxy. A local user can place a malicious file into the "C:\etc" folder and execute it with privileges of the current user.


5) Insufficient verification of data authenticity (CVE-ID: CVE-2023-25815)

The vulnerability allows a local user to tamper with Git messages.

The vulnerability exists due to the way Git processes localized messages. A local user on a multi-user machine can display a malicious message to the user.


Remediation

Install update from vendor's website.