CVE-2019-1143

5.5 MEDIUM

📋 TL;DR

This Windows GDI vulnerability allows attackers to read sensitive memory contents, potentially exposing system information that could enable further attacks. It affects Windows users who open malicious documents or visit compromised websites. The vulnerability requires user interaction but doesn't require elevated privileges.

💻 Affected Systems

Products:
  • Windows 10
  • Windows Server 2016
  • Windows Server 2019
Versions: Multiple versions prior to August 2019 updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of listed Windows versions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker obtains sensitive system memory data that could lead to full system compromise through chained attacks

🟠

Likely Case

Information disclosure revealing system details that could facilitate targeted attacks

🟢

If Mitigated

Limited impact with proper patching and user awareness training

🌐 Internet-Facing: MEDIUM - Requires user interaction but can be triggered via web content
🏢 Internal Only: LOW - Requires user to open malicious documents, less likely in controlled environments

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening document or visiting website)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: August 2019 security updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1143

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Check for updates. 3. Install August 2019 security updates. 4. Restart system if prompted.

🔧 Temporary Workarounds

Restrict document execution

windows

Configure Windows to open documents in protected view or sandboxed environments

Web content filtering

all

Block untrusted websites and restrict script execution in browsers

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized document execution
  • Deploy enhanced monitoring for suspicious GDI process behavior

🔍 How to Verify

Check if Vulnerable:

Check Windows version and update history for August 2019 security updates

Check Version:

wmic os get caption,version,buildnumber

Verify Fix Applied:

Verify KB numbers from August 2019 security updates are installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual GDI process crashes
  • Multiple document opens from untrusted sources

Network Indicators:

  • Downloads of suspicious document files
  • Connections to known malicious domains

SIEM Query:

EventID=1000 AND Source='Application Error' AND ProcessName LIKE '%gdi%'

🔗 References

📤 Share & Export