Microsoft July 2019 Patch Tuesday

Microsoft has issued patches for 77 vulnerabilities this Patch Tuesday. Of the vulnerabilities, 15 were rated critical and two were actively exploited zero day vulnerabilities.  Six of the vulnerabilities patched this month had been previously disclosed to the public.

The two actively exploited zero-days are both privilege escalation vulnerabilities. The first – CVE-2019-0880 – affects the call-handling abilities of a 64-bit printer spooler service on 64-bit Windows systems, splwow64.exe.

The flaw can be remotely exploited by an attacker to elevate privileges from low-integrity to medium-integrity according to Microsoft. While the flaw would not permit remote code execution by itself, an exploit could be combined with an exploit for another flaw, which could lead to remote code execution.

The flaw is present in Windows 10, 8.1, Server 2012, Server 2016, Server 2019, and Server versions 1803 and 1903 and older Windows versions. Microsoft advises immediate patching. If the patch cannot be applied immediately, the printer spooler should be disabled.

The second zero day does permit remote code execution. The vulnerability – CVE-2019-1132 – is due to how the Win32k component of Windows handles objects in the memory. If the flaw is exploited, an attacker could run arbitrary code in kernel mode, which would allow the installation of programs and allow an attacker to view, change, or delete data and create new accounts with administrator rights. The flaw is present in Windows 7 and Server 2008 and older Windows versions.

The publicly disclosed vulnerabilities are CVE-2019-0865, CVE-2018-15664, CVE-2019-0962, CVE-2019-1068, CVE-2019-1129, and CVE-2019-1130. The first four were disclosed by Google Project Zero researcher Tavis Ormandy and the last by SandboxEscaper.

The critical flaws affect .NET Framework, Azure DevOps, Internet Explorer, Microsoft Browsers, Microsoft Graphics Component, Microsoft Scripting Engine (8), and Windows. A critical advisory has also been issued – ADV990001 – regarding the latest Service Stack updates.

Adobe has issued 18 patches for flaws in Experience Manager, Bridge CC, and Dreamweaver. None of the vulnerabilities have been rated critical. All are either important or moderate severity. There have been no reports of these vulnerabilities being exploited in the wild.

Twitter Facebook LinkedIn Reddit Copy link Link copied to clipboard
Photo of author

Posted by

Emma Taylor

Emma Taylor is the contributing editor of Defensorum. Emma started on Defensorum as a news writer in 2017 and was promoted to editor in 2022. Emma has written and edited several hundred articles related to IT security and has developed a deep understanding of the sector. You can follow Emma on and contact Emma at