{"id":10487,"date":"2017-11-14T16:17:01","date_gmt":"2017-11-15T00:17:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4259\/"},"modified":"2017-11-14T16:17:01","modified_gmt":"2017-11-15T00:17:01","slug":"news-4259","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4259\/","title":{"rendered":"Adobe, Microsoft Patch Critical Cracks"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 14 Nov 2017 23:12:32 +0000<\/strong><\/p>\n<p>It&#8217;s Nov. 14 &#8212; the second Tuesday of the month (a.k.a. &#8220;Patch Tuesday) &#8212; and\u00a0<strong>Adobe<\/strong> and <strong>Microsoft<\/strong> have issued gobs of security updates for their software. Microsoft&#8217;s 11 patch bundles fix more than four-dozen security holes in various <strong>Windows<\/strong> versions and <strong>Office<\/strong> products &#8212; including at least four serious flaws that were publicly disclosed prior to today. Meanwhile, Adobe&#8217;s got security updates available for a slew of titles, including <strong>Flash Player<\/strong>, <strong>Photoshop<\/strong>, <strong>Reader<\/strong> and <strong>Shockwave<\/strong>.<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11848\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"203\" height=\"213\" \/>Four<\/a> <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11848\" target=\"_blank\" rel=\"noopener\">of<\/a> <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11883\" target=\"_blank\" rel=\"noopener\">the<\/a> <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8700\" target=\"_blank\" rel=\"noopener\">vulnerabilities<\/a> Microsoft fixed today have public exploits, but they do not appear to be used in any active malware campaigns, according to <strong>Gill Langston<\/strong> at security vendor <strong>Qualys<\/strong>. Perhaps the two most serious flaws likely to impact Windows end users involve vulnerabilities in Microsoft browsers <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11848\" target=\"_blank\" rel=\"noopener\">Internet Explorer<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11827\" target=\"_blank\" rel=\"noopener\">Edge<\/a>.<\/p>\n<p>Qualys&#8217; Langston reminds us that on\u00a0<a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2017\/10\/10\/october-patch-tuesday-28-critical-microsoft-vulnerabilities\" data-ss1510698840=\"1\">last Patch Tuesday<\/a>, Microsoft quietly released the fix for\u00a0<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-13080\" rel=\"noreferrer\" data-ss1510698840=\"1\">CVE-2017-13080<\/a>, widely known as <a href=\"https:\/\/krebsonsecurity.com\/2017\/10\/what-you-should-know-about-the-krack-wifi-security-weakness\/\" target=\"_blank\" rel=\"noopener\">the KRACK vulnerability in WPA2 wireless protocol,<\/a> but did not make it known until a week later, when the vulnerability was publicly disclosed. Check out the <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2017\/11\/14\/november-patch-tuesday-53-vulnerabilities-and-a-massive-adobe-update\" target=\"_blank\" rel=\"noopener\">Qualys blog<\/a> and <a href=\"https:\/\/www.ivanti.com\/blog\/patch-tuesday-forecast-november\/\" target=\"_blank\" rel=\"noopener\">this post<\/a> from <strong>Ivanti<\/strong> for more on this month&#8217;s patches from Redmond. Otherwise, visit <strong>Windows Update<\/strong> sometime soon (click the\u00a0<b>Start\/Windows<\/b>\u00a0button, then type\u00a0<b>Windows Update<\/b>).<span id=\"more-41522\"><\/span><\/p>\n<p>Adobe issued patches to fix at least <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb17-33.html\" target=\"_blank\" rel=\"noopener\">62 security vulnerabilities in its products<\/a>, including several critical bugs in Adobe Flash Player and Reader\/Acrobat.\u00a0 The <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb17-33.html\" target=\"_blank\" rel=\"noopener\">Flash Player update<\/a> brings the browser plugin to <em>v. 27.0.0.187<\/em> on Windows, Mac, Linux and Chrome OS.<\/p>\n<p>Windows users who browse the Web with anything other than Internet Explorer may need to apply the Flash patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-18875\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\" alt=\"\" width=\"211\" height=\"180\" \/>Chrome and IE should auto-install the latest Flash version on browser restart (users may need to manually check for updates and\/or restart the browser to get the latest Flash version). Chrome users may need to restart the browser to install or automatically download the latest version.<\/p>\n<p>When in doubt, click the vertical three dot icon to the right of the URL bar, select \u201cHelp,\u201d then \u201cAbout Chrome\u201d: If there is an update available, Chrome should install it then. Chrome will replace that three dot icon with an up-arrow inside of a circle when updates are waiting to be installed.<\/p>\n<p>Standard disclaimer: Because Flash remains such a security risk, I continue to\u00a0encourage readers to remove or hobble Flash Player unless and until it is needed for a specific site or purpose. More on that approach (as well as slightly less radical\u00a0solutions ) can be found in\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2015\/06\/a-month-without-adobe-flash-player\/\" target=\"_blank\" rel=\"noopener\">A Month Without Adobe Flash Player<\/a>. The short\u00a0version is that you\u00a0can probably get by without Flash installed and not miss it at all.<\/p>\n<p>For readers still unwilling to cut the cord, there are half-measures that work almost as well. Fortunately,\u00a0<a href=\"https:\/\/support.google.com\/chrome\/answer\/108086?hl=en\" target=\"_blank\" rel=\"noopener\">disabling Flash in Chrome<\/a>\u00a0is simple enough. Paste \u201c<a href=\"chrome:\/\/settings\/content\" target=\"_blank\" rel=\"noopener\">chrome:\/\/settings\/content<\/a>\u201d into a Chrome browser bar and then select \u201cFlash\u201d from the list of items. By default it should be set to \u201cAsk first\u201d before running Flash, although users also can disable Flash entirely here or whitelist and blacklist specific sites.<\/p>\n<p>Another, perhaps less elegant, solution is to keep Flash installed in a browser that you don\u2019t normally use, and then to only use that browser on sites that require it.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/adobe-microsoft-patch-critical-cracks\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 14 Nov 2017 23:12:32 +0000<\/strong><\/p>\n<p>It&#8217;s Nov. 14 &#8212; the second Tuesday of the month (a.k.a. &#8220;Patch Tuesday) &#8212; and\u00a0Adobe and Microsoft have issued gobs of security updates for their software. Microsoft&#8217;s 11 patch bundles fix more than four-dozen security holes in various Windows versions and Office products &#8212; including at least four serious flaws that were publicly disclosed prior to today. Meanwhile, Adobe&#8217;s got security updates available for a slew of titles, including Flash Player, Photoshop, Reader and Shockwave.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11414,10699,16642,12616,11415,16643,10829,14947,15793,10516,16644,10644,13457,10525],"class_list":["post-10487","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe","tag-chrome","tag-cve-2017-13080","tag-edge","tag-flash-player","tag-gill-langston","tag-internet-explorer","tag-ivanti","tag-krack","tag-microsoft","tag-microsoft-patch-tuesday-november-2017","tag-other","tag-qualys","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10487"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10487\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10487"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}