{"id":12232,"date":"2018-05-08T13:17:02","date_gmt":"2018-05-08T21:17:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/08\/news-6001\/"},"modified":"2018-05-08T13:17:02","modified_gmt":"2018-05-08T21:17:02","slug":"news-6001","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/08\/news-6001\/","title":{"rendered":"Microsoft Patch Tuesday, May 2018 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 08 May 2018 20:38:16 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released a bundle of security updates to fix at least 67 holes in its various <strong>Windows<\/strong> operating systems and related software, including one dangerous flaw that Microsoft warns is actively being exploited. Meanwhile, as it usually does on Microsoft&#8217;s Patch Tuesday &#8212; the second Tuesday of each month &#8212; <strong>Adobe<\/strong> has a new <strong>Flash Player<\/strong> update that addresses a single but critical security weakness.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-18875\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\" alt=\"\" width=\"211\" height=\"180\" \/>First, the <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-16.html\" target=\"_blank\" rel=\"noopener\">Flash Tuesday update<\/a>, which brings Flash Player to v.\u00a0<em>29.0.0.171<\/em>. Some (present company included) would that Flash Player is itself &#8220;a single but critical security weakness.&#8221; Nevertheless, <strong>Google Chrome<\/strong> and <strong>Internet Explorer\/Edge<\/strong> ship with their own versions of Flash, which get updated automatically when new versions of these browsers are made available.<\/p>\n<p>You can check if your browser has Flash installed\/enabled and what version it&#8217;s at by pointing your browser at\u00a0<a href=\"https:\/\/helpx.adobe.com\/flash-player.html\" target=\"_blank\" rel=\"noopener\">this link<\/a>. Adobe is\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2017\/08\/flash-player-is-dead-long-live-flash-player\/\" target=\"_blank\" rel=\"noopener\">phasing out Flash entirely by 2020<\/a>, but most of the major browsers already take steps to hobble Flash. And with good reason: It\u2019s a major security liability.<span id=\"more-43750\"><\/span><\/p>\n<p>Google Chrome blocks Flash from running on all but a handful of popular sites, and then only after user approval. Disabling Flash in Chrome\u00a0is simple enough. Paste \u201c<a href=\"chrome:\/\/settings\/content\" target=\"_blank\" rel=\"noopener\">chrome:\/\/settings\/content<\/a>\u201d into a Chrome browser bar and then select \u201cFlash\u201d from the list of items. By default it should be set to \u201cAsk first\u201d before running Flash, although users also can disable Flash entirely here or whitelist\/blacklist specific sites. If you spot an upward pointing arrow to the right of the address bar in Chrome, that means there&#8217;s an update to the browser available, and it&#8217;s time to restart Chrome.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"204\" height=\"214\" \/>For Windows users with\u00a0<strong>Mozilla Firefox<\/strong>\u00a0installed, the browser prompts users to enable Flash on a per-site basis.<\/p>\n<p>Through the end of 2017 and into 2018, Microsoft Edge will continue to ask users for permission to run Flash on most sites the first time the site is visited, and will remember the user\u2019s preference on subsequent visits. Microsoft users will need to install this month&#8217;s batch of patches to get the latest Flash version for IE\/Edge, where most of the critical updates in this month&#8217;s patch batch reside.<\/p>\n<p>According to security vendor <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2018\/05\/08\/may-2018-patch-tuesday-medium-weight-but-one-active-exploit-needs-attention#more-24616\" target=\"_blank\" rel=\"noopener\">Qualys<\/a>, one Microsoft patch in particular deserves priority over others in organizations that are testing updates before deploying them: <strong>CVE-2018-8174<\/strong> involves a problem with the way the Windows scripting engine handles certain objects, and Microsoft says this bug is already being exploited in active attacks.<\/p>\n<p>Some other useful sources of information on today&#8217;s updates include the <a href=\"https:\/\/www.thezdi.com\/blog\/2018\/5\/8\/the-may-2018-security-update-review\" target=\"_blank\" rel=\"noopener\">Zero Day Initiative<\/a> and\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-may-2018-patch-tuesday-fixes-67-security-issues-including-ie-zero-day\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a>. And of course there is always the <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">Microsoft Security Update Guide<\/a>.<\/p>\n<p>As always, please feel free to leave a comment below if you experience any issues applying any of these updates.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/05\/microsoft-patch-tuesday-may-2018-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 08 May 2018 20:38:16 +0000<\/strong><\/p>\n<p>Microsoft today released a bundle of security updates to fix at least 67 holes in its various Windows operating systems and related software, including one dangerous flaw that Microsoft warns is actively being exploited. Meanwhile, as it usually does on Microsoft&#8217;s Patch Tuesday &#8212; the second Tuesday of each month &#8212; Adobe has a new Flash Player update that addresses a single but critical security weakness.    First, the Flash Tuesday update, which brings Flash Player to v.\u00a029.0.0.171. Some (present company included) would argue that Flash Player is in itself &#8220;a single but critical security weakness.&#8221; Nevertheless, Google Chrome and Internet Explorer\/Edge ship with their own versions of Flash, which get updated automatically when new versions of these browsers are made available.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11414,10699,18334,18335,16888,17395,18336,13457,17220,16936,10525],"class_list":["post-12232","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe","tag-chrome","tag-cve-2018-8174","tag-flash-player-29-0-0-171","tag-latest-warnings","tag-mozilla-firefox","tag-patch-tuesday-may-2018","tag-qualys","tag-security-tools","tag-time-to-patch","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12232"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12232\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12232"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}