Published on: 12 June 2019
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20190611/security-update-deployment-information-june-11-2019
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, security feature bypass, elevation of privilege, spoofing, tampering and denial of service.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/253dc509-9a5b-e911-a98e-000d3a33c573
https://support.microsoft.com/en-us/help/20190611/security-update-deployment-information-june-11-2019
https://www.hkcert.org/my_url/en/alert/19061201
https://www.us-cert.gov/ncas/current-activity/2019/06/11/Microsoft-Releases-June-2019-Security-Updates
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190015
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190016
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190017
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0709 (to CVE-2019-0711)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0904 (to CVE-2019-0909)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0972 (to CVE-2019-0974)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0983 (to CVE-2019-0986)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0988 (to CVE-2019-0993)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1009 (to CVE-2019-1019)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1021 (to CVE-2019-1029)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1031 (to CVE-2019-1036)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1038 (to CVE-2019-1041)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1043 (to CVE-2019-1055)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1081