{"id":12557,"date":"2018-06-12T13:17:01","date_gmt":"2018-06-12T21:17:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/06\/12\/news-6326\/"},"modified":"2018-06-12T13:17:01","modified_gmt":"2018-06-12T21:17:01","slug":"news-6326","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/12\/news-6326\/","title":{"rendered":"Microsoft Patch Tuesday, June 2018 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Jun 2018 21:04:05 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today pushed out a bevy of software updates to fix more than four dozen security holes in <strong>Windows<\/strong> and related software. Almost a quarter of the vulnerabilities addressed in this month&#8217;s patch batch earned Microsoft&#8217;s &#8220;critical&#8221; rating, meaning malware or miscreants can exploit the flaws to break into vulnerable systems without any help from users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"229\" height=\"240\" \/>Most of the critical fixes are in Microsoft browsers or browser components. One of the flaws, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8267\" target=\"_blank\" rel=\"noopener\">CVE-2018-8267<\/a>, was publicly disclosed prior to today&#8217;s patch release, meaning attackers may have had a head start figuring out how to exploit the bug to attack <strong>Internet Explorer<\/strong>\u00a0users.<\/p>\n<p dir=\"ltr\">According to <a href=\"https:\/\/www.recordedfuture.com\" target=\"_blank\" rel=\"noopener\">Recorded Future<\/a>, the most important patched vulnerability is a remote code execution vulnerability in the Windows Domain Name System (DNS), which is present in all versions of supported versions of Windows from <strong>Windows 7<\/strong> to <strong>Windows 10<\/strong> as well as all versions of Windows Server from 2008 to 2016.<\/p>\n<p dir=\"ltr\">&#8220;The vulnerability allows an attacker to send a maliciously crafted DNS packet to the victim machine from a DNS server, or even send spoofed DNS responses from attack box,&#8221; wrote\u00a0<strong>Allan Liska<\/strong>, a threat intelligence analyst at Recorded Future. &#8220;Successful exploitation of this vulnerability could allow an attacker to take control of the target machine.&#8221;<\/p>\n<p>Security vendor <strong>Qualys<\/strong> <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2018\/06\/12\/june-patch-tuesday-new-speculative-store-bypass-fixes-adobe-vulns\" target=\"_blank\" rel=\"noopener\">says<\/a> mobile workstations that may connect to untrusted Wi-Fi networks are at high risk and this DNS patch should be a priority for them. Qualys also notes that Microsoft this month is shipping updates to mitigate another variant of the <a href=\"https:\/\/krebsonsecurity.com\/2018\/01\/scary-chip-flaws-raise-spectre-of-meltdown\/\" target=\"_blank\" rel=\"noopener\">Spectre vulnerability<\/a>\u00a0in Intel machines.<\/p>\n<p>And of course there are updates available to address the <strong>Adobe Flash Player<\/strong> vulnerability that is already being exploited in active attacks. Read more on that <a href=\"https:\/\/krebsonsecurity.com\/2018\/06\/adobe-patches-zero-day-flash-flaw\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<span id=\"more-44236\"><\/span><\/p>\n<p>It&#8217;s a good idea to get in the habit of backing up your computer before applying monthly updates from Microsoft. Windows has some built-in tools that can help recover from bad patches, but restoring the system to a backup image taken just before installing the updates is often much less hassle and an added piece of mind when you&#8217;re sitting there praying for the machine to reboot after patching.<\/p>\n<p>This assumes you can get around to backing up before Microsoft decides to patch Windows on your behalf. Microsoft says by default, Windows 10 receives updates automatically, \u201cand for customers running previous versions, we recommend they\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/306525\/how-to-configure-and-use-automatic-updates-in-windows\" data-ss1520968935=\"1\">turn on automatic updates<\/a>\u00a0as a best practice.\u201d Microsoft doesn\u2019t make it easy for Windows 10 users to change this setting, but\u00a0<a href=\"https:\/\/www.howtogeek.com\/224471\/how-to-prevent-windows-10-from-automatically-downloading-updates\/\" target=\"_blank\" rel=\"noopener\">it is possible<\/a>.<\/p>\n<p>For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in\u00a0<strong>Windows Update<\/strong>.<\/p>\n<p>As always, if you experience any problems installing any of these updates, please leave a note about your issues in the comments below.<\/p>\n<p>Additional reading:<\/p>\n<p><a href=\"https:\/\/blog.talosintelligence.com\/2018\/06\/ms-tuesday.html\" target=\"_blank\" rel=\"noopener\">Cisco Talos Intelligence blog take<\/a><\/p>\n<p><a href=\"https:\/\/www.thezdi.com\/blog\/2018\/6\/12\/the-june-2018-security-update-review\" target=\"_blank\" rel=\"noopener\">The Zero Day Initiative&#8217;s Security Update Review<\/a><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+June+2018+Patch+Tuesday\/23758\/\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center<\/a><\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">Microsoft Security Update Guide<\/a><\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/06\/microsoft-patch-tuesday-june-2018-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Jun 2018 21:04:05 +0000<\/strong><\/p>\n<p>Microsoft today pushed out a bevy of software updates to fix more than four dozen security holes in Windows and related software. Almost a quarter of the vulnerabilities addressed in this month&#8217;s patch batch earned Microsoft&#8217;s &#8220;critical&#8221; rating, meaning malware or miscreants can exploit the flaws to break into vulnerable systems without any help from users.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[18664,18720,18721,18722,13457,11753,16936],"class_list":["post-12557","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe-flash-player-zero-day","tag-allan-liska","tag-cve-2018-8267","tag-microsoft-patch-tuesday-june-2018","tag-qualys","tag-recorded-future","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12557"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12557\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12557"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}