{"id":11058,"date":"2018-01-10T10:17:01","date_gmt":"2018-01-10T18:17:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/10\/news-4829\/"},"modified":"2018-01-10T10:17:01","modified_gmt":"2018-01-10T18:17:01","slug":"news-4829","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/10\/news-4829\/","title":{"rendered":"Microsoft&#8217;s Jan. 2018 Patch Tuesday Lowdown"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 10 Jan 2018 16:07:35 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> on Tuesday released 14 security updates, including fixes for the <strong>Spectre<\/strong> and <strong>Meltdown<\/strong> flaws detailed last week, as well as a zero-day vulnerability in <strong>Microsoft Office<\/strong> that is being exploited in the wild. Separately, <strong>Adobe<\/strong> pushed a security update to its <strong>Flash Player<\/strong> software.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"206\" height=\"216\" \/>Last week&#8217;s story, <a href=\"https:\/\/krebsonsecurity.com\/2018\/01\/scary-chip-flaws-raise-spectre-of-meltdown\/\" target=\"_blank\" rel=\"noopener\">Scary Chip Flaws Raise Spectre of Meltdown<\/a>, sought to explain the gravity of these two security flaws present in most modern computers, smartphones, tablets and mobile devices. The bugs are thought to be mainly exploitable in chips made by <strong>Intel<\/strong> and <strong>ARM<\/strong>, but researchers said it was possible they also could be leveraged to steal data from computers with chips made by <strong>AMD<\/strong>.<\/p>\n<p>By the time that story had published, Microsoft had already begun shipping an emergency update to address the flaws, but many readers complained that their PCs experienced the dreaded &#8220;<a href=\"https:\/\/krebsonsecurity.com\/2010\/03\/secret-obsession-odd-windows-crash-alerts\/\" target=\"_blank\" rel=\"noopener\">blue screen of death<\/a>&#8221; (BSOD) after applying the update. Microsoft warned that the BSOD problems were attributable to many antivirus programs not yet updating their software to play nice with the security updates.<\/p>\n<p>On Tuesday, Microsoft said it was suspending the patches for computers running AMD chipsets.<\/p>\n<p>&#8220;After investigating, Microsoft determined that some AMD chipsets do not conform to the documentation previously provided to Microsoft to develop the Windows operating system mitigations to protect against the chipset vulnerabilities known as Spectre and Meltdown,&#8221; the company said in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073707\/windows-os-security-update-block-for-some-amd-based-devices?ranMID=24542&amp;ranEAID=nOD%2FrLJHOac&amp;ranSiteID=nOD_rLJHOac-_HQEBR_XRHQKxjSSaNyFXQ&amp;tduid=(c438b93529abd1646060d8789010252e)(256380)(2459594)(nOD_rLJHOac-_HQEBR_XRHQKxjSSaNyFXQ)()\" target=\"_blank\" rel=\"noopener\">a notice posted to its support site<\/a>.<\/p>\n<p>&#8220;To prevent AMD customers from getting into an unbootable state, Microsoft has temporarily paused sending the following Windows operating system updates to devices that have impacted AMD processors,&#8221; the company continued. &#8220;Microsoft is working with AMD to resolve this issue and resume Windows OS security updates to the affected AMD devices via Windows Update and WSUS as soon as possible.&#8221;<\/p>\n<p>In short, if you&#8217;re running Windows on a computer powered by an AMD, you&#8217;re not going to be offered the Spectre\/Meltdown fixes for now. Not sure whether your computer has an Intel or AMD chip? Most modern computers display this information (albeit very briefly) when the computer first starts up, before the Windows logo appears on the screen.<\/p>\n<p>Here&#8217;s another way. From within Windows, users can find this information by pressing the Windows key on the keyboard and the &#8220;Pause&#8221; key at the same time, which should open the System Properties feature. The chip maker will be displayed next to the &#8220;Processor:&#8221; listing on that page.<\/p>\n<p>Microsoft also on Tuesday <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/01\/09\/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems\/\" target=\"_blank\" rel=\"noopener\">provided more information<\/a> about the potential performance impact on Windows computers after installing the Spectre\/Meltdown updates. To summarize, Microsoft said <strong>Windows 7<\/strong>, <strong>8.1<\/strong> and <strong>10<\/strong> users on older chips (circa 2015 or older), as well as Windows server users on any silicon, are likely to notice a slowdown of their computer after applying this update.<\/p>\n<p>Any readers who experience a BSOD after applying January&#8217;s batch of updates may be able to get help from Microsoft&#8217;s site: Here are the corresponding help pages for <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17074\/windows-7-resolving-stop-blue-screen-errors\" target=\"_blank\" rel=\"noopener\">Windows 7<\/a>, <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17075\/windows-8-resolving-blue-screen-errors\" target=\"_blank\" rel=\"noopener\">Windows 8.1<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/14238\/windows-10-troubleshoot-blue-screen-errors\" target=\"_blank\" rel=\"noopener\">Windows 10<\/a> users.<\/p>\n<p>As evidenced by this debacle, it&#8217;s a good idea to get in the habit of backing up your system on a regular basis. I typically do this at least once a month &#8212; but especially right before installing any updates from Microsoft.\u00a0<span id=\"more-42156\"><\/span><\/p>\n<p>Attackers could exploit a zero-day vulnerability in Office (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0802\" target=\"_blank\" rel=\"noopener\">CVE-2018-0802<\/a>) just by getting a user to open a booby-trapped Office document or visit a malicious\/hacked Web site. Microsoft also patched a flaw (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0819\" target=\"_blank\" rel=\"noopener\">CVE-2018-0819<\/a>) in <strong>Office for Mac<\/strong> that was publicly disclosed prior to the patch being released, potentially giving attackers a heads up on how to exploit the bug.<\/p>\n<p>Of the 56 vulnerabilities addressed in the January Patch Tuesday batch, at least 16 earned Microsoft&#8217;s critical rating, meaning attackers could exploit them to gain full access to Windows systems with little help from users. For more on Tuesday&#8217;s updates from Microsoft, check out blogs from <a href=\"https:\/\/www.ivanti.com\/blog\/january-patch-tuesday-2017\/\" target=\"_blank\" rel=\"noopener\">Ivanti<\/a> and <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2018\/01\/09\/january-patch-tuesday-meltdown-spectre-16-critical-microsoft-patches-1-adobe-patch\" target=\"_blank\" rel=\"noopener\">Qualys<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-18875\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\" alt=\"\" width=\"211\" height=\"180\" \/>As per usual, Adobe issued an update for Flash Player yesterday. The update brings Flash to <em>version 28.0.0.137<\/em> on Windows, <strong>Mac<\/strong>, and <strong>Linux<\/strong> systems. Windows users who browse the Web with anything other than <strong>Internet Explorer<\/strong> may need to apply the Flash patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).<\/p>\n<p><strong>Chrome<\/strong> and IE should auto-install the latest Flash version on browser restart (users may need to manually check for updates and\/or restart the browser to get the latest Flash version). Chrome users may need to restart the browser to install or automatically download the latest version.<\/p>\n<p>When in doubt, click the vertical three dot icon to the right of the URL bar, select \u201cHelp,\u201d then \u201cAbout Chrome\u201d: If there is an update available, Chrome should install it then. Chrome will replace that three dot icon with an up-arrow inside of a circle when updates are waiting to be installed.<\/p>\n<p>Standard disclaimer: Because Flash remains such a security risk, I continue to\u00a0encourage readers to remove or hobble Flash Player unless and until it is needed for a specific site or purpose. More on that approach (as well as slightly less radical\u00a0solutions ) can be found in\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2015\/06\/a-month-without-adobe-flash-player\/\" target=\"_blank\" rel=\"noopener\">A Month Without Adobe Flash Player<\/a>. The short\u00a0version is that you\u00a0can probably get by without Flash installed and not miss it at all.<\/p>\n<p>For readers still unwilling to cut the Flash cord, there are half-measures that work almost as well. Fortunately,\u00a0<a href=\"https:\/\/support.google.com\/chrome\/answer\/108086?hl=en\" target=\"_blank\" rel=\"noopener\">disabling Flash in Chrome<\/a>\u00a0is simple enough. Paste \u201c<a href=\"chrome:\/\/settings\/content\" target=\"_blank\" rel=\"noopener\">chrome:\/\/settings\/content<\/a>\u201d into a Chrome browser bar and then select \u201cFlash\u201d from the list of items. By default it should be set to \u201cAsk first\u201d before running Flash, although users also can disable Flash entirely here or whitelist and blacklist specific sites.<\/p>\n<p>Another, perhaps less elegant, solution is to keep Flash installed in a browser that you don\u2019t normally use, and then to only use that browser on sites that require it.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/01\/microsofts-jan-2018-patch-tuesday-lowdown\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 10 Jan 2018 16:07:35 +0000<\/strong><\/p>\n<p>Microsoft on Tuesday released 14 security updates, including fixes for the Spectre and Meltdown flaws detailed last week, as well as a zero-day vulnerability in Microsoft Office that is being exploited in the wild. Separately, Adobe pushed a security update to its Flash Player software.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[17086,17118,17102,11415,8397,17119,17120,16936],"class_list":["post-11058","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-amd","tag-blue-screen-of-death","tag-bsod","tag-flash-player","tag-intel","tag-microsoft-patch-tuesday-january-2018","tag-spectre-bug","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11058"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11058\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11058"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}