First published: Thu Oct 10 2019(Updated: )
An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Execution Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure App Service on Azure Stack Hub | <1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1372 is categorized as a critical remote code execution vulnerability.
To address CVE-2019-1372, users should update their Microsoft Azure App Service on Azure Stack to a version higher than 1.7.
CVE-2019-1372 arises from insufficient buffer length checks before memory copy operations in Azure App Service on Azure Stack.
CVE-2019-1372 affects users running Microsoft Azure App Service on Azure Stack versions before 1.7.
Exploiting CVE-2019-1372 could allow an unprivileged function to execute arbitrary code in the context of the affected application.