{"id":13111,"date":"2018-08-15T07:17:11","date_gmt":"2018-08-15T15:17:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/15\/news-6878\/"},"modified":"2018-08-15T07:17:11","modified_gmt":"2018-08-15T15:17:11","slug":"news-6878","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/15\/news-6878\/","title":{"rendered":"Patch Tuesday, August 2018 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 15 Aug 2018 14:52:21 +0000<\/strong><\/p>\n<p><strong>Adobe <\/strong>and <strong>Microsoft<\/strong> each released security updates for their software on Tuesday. Adobe plugged five security holes in its <strong>Flash Player<\/strong> browser plugin. Microsoft pushed 17 updates to fix at least 60 vulnerabilities in Windows and other software, including two &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\" target=\"_blank\" rel=\"noopener\">zero-day<\/a>&#8221; flaws that attackers were already exploiting before Microsoft issued patches to fix them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"194\" height=\"203\" \/>According to security firm <strong>Ivanti<\/strong>, the first of the two zero-day flaws (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8373\" target=\"_blank\" rel=\"noopener\">CVE-2018-8373<\/a>) is a critical flaw in <strong>Internet Explorer<\/strong> that attackers could use to foist malware on IE users who browse to hacked or booby-trapped sites. The other zero-day is a bug (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8414\" target=\"_blank\" rel=\"noopener\">CVE-2018-8414<\/a>) in the Windows 10 shell that could allow an attacker to run code of his choice.<\/p>\n<p>Microsoft also patched more variants of the <a href=\"https:\/\/krebsonsecurity.com\/2018\/01\/scary-chip-flaws-raise-spectre-of-meltdown\/\" target=\"_blank\" rel=\"noopener\">Meltdown\/Spectre memory vulnerabilities<\/a>, collectively dubbed &#8220;<a href=\"https:\/\/foreshadowattack.eu\/\" target=\"_blank\" rel=\"noopener\">Foreshadow<\/a>&#8221; by a team of researchers who discovered and reported the <strong>Intel<\/strong>-based flaws. For more information about how Foreshadow works, check out their <a href=\"https:\/\/foreshadowattack.eu\/foreshadow.pdf\" target=\"_blank\" rel=\"noopener\">academic paper<\/a>\u00a0(PDF), and\/or the video below. Microsoft&#8217;s analysis is <a href=\"https:\/\/blogs.technet.microsoft.com\/srd\/2018\/08\/10\/analysis-and-mitigation-of-l1-terminal-fault-l1tf\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>One nifty little bug fixed in this patch batch is <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8345\" target=\"_blank\" rel=\"noopener\">CVE-2018-8345<\/a>. It addresses a problem in the way Windows handles shortcut files; ending in the \u201c.lnk\u201d extension, shortcut files are Windows components that link (hence the \u201clnk\u201d extension) easy-to-recognize icons to specific executable programs, and are typically placed on the user\u2019s Desktop or Start Menu.<\/p>\n<p>That description of a shortcut file was taken verbatim from the <a href=\"https:\/\/krebsonsecurity.com\/2010\/07\/experts-warn-of-new-windows-shortcut-flaw\/\" target=\"_blank\" rel=\"noopener\">first widely read report<\/a> on what would later be dubbed the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noopener\">Stuxnet worm<\/a>, which also employed an exploit for a weakness in the way Windows handled shortcut (.lnk) files. According to security firm <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2018\/08\/14\/august-patch-tuesday-63-vulns-l1tf-exchange-sql-active-attacks-on-ie-flaw\" target=\"_blank\" rel=\"noopener\">Qualys<\/a>, this patch should be prioritized for both workstations and servers, as the user does not need to click the file to exploit. &#8220;Simply viewing a malicious LNK file can execute code as the logged-in user,&#8221; Qualys&#8217; <strong>Jimmy Graham<\/strong> wrote.<span id=\"more-44576\"><\/span><\/p>\n<p>Not infrequently, Redmond ships updates that end up causing stability issues for some users, and it doesn\u2019t hurt to wait a day or two before seeing if any major problems are reported with new updates before installing them. Microsoft doesn\u2019t make it easy for Windows 10 users to change this setting, but it is possible. For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in Windows Update.<\/p>\n<p>It\u2019s a good idea to get in the habit of backing up your computer before applying monthly updates from Microsoft. Windows has some built-in tools that can help recover from bad patches, but restoring the system to a backup image taken just before installing updates is often much less hassle and an added piece of mind while you\u2019re sitting there praying for the machine to reboot successfully after patching.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-18875\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\" alt=\"\" width=\"193\" height=\"165\" \/>Adobe&#8217;s Flash update brings the program to <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-25.html\" target=\"_blank\" rel=\"noopener\"><em>v. 30.0.0.154<\/em><\/a> for Windows,<strong> macOS<\/strong>, <strong>Chrome<\/strong> and <strong>Linux<\/strong>. Most readers here know how I feel about Flash, which is a major security liability and a frequent target of browser-based attacks. The updates from Microsoft include these Flash fixes for IE, and <strong>Google Chrome<\/strong> has already pushed an update to address these five Flash flaws (although a browser restart may be needed).<\/p>\n<p>But seriously, if you don&#8217;t have a specific need for Flash, just disable it already. Chrome is set to ask before playing Flash objects, but disabling Flash in Chrome is simple enough. Paste \u201cchrome:\/\/settings\/content\u201d into a Chrome browser bar and then select \u201cFlash\u201d from the list of items. By default it should be set to \u201cAsk first\u201d before running Flash, although users also can disable Flash entirely here or whitelist and blacklist specific sites.<\/p>\n<p>By default, Mozilla Firefox on Windows computers with Flash installed runs Flash in a \u201cprotected mode,\u201d which prompts the user to decide if they want to enable the plugin before Flash content runs on a Web site.<\/p>\n<p>Adobe also released <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb18-29.html\" target=\"_blank\" rel=\"noopener\">security updates<\/a> for its PDF Reader and Acrobat products.<\/p>\n<p>As always, please leave a note in the comments below if you experience any problems installing any of these updates.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/08\/patch-tuesday-august-2018-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 15 Aug 2018 14:52:21 +0000<\/strong><\/p>\n<p>Adobe and Microsoft each released security updates for their software on Tuesday. Adobe plugged five security holes in its Flash Player browser plugin. Microsoft pushed 17 updates to fix at least 60 vulnerabilities in Windows and other software, including two &#8220;zero-day&#8221; flaws that attackers were already exploiting before Microsoft issued patches to fix them.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[19217,17524,19218,14947,13455,3495,19219,13457,16936],"class_list":["post-13111","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-flash-player-30-0-0-154","tag-flash-player-update","tag-foreshadow-bug","tag-ivanti","tag-jimmy-graham","tag-microsoft-windows","tag-patch-tuesday-august-2018","tag-qualys","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13111"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13111\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13111"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}