{"id":13823,"date":"2018-11-14T07:17:01","date_gmt":"2018-11-14T15:17:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/14\/news-7590\/"},"modified":"2018-11-14T07:17:01","modified_gmt":"2018-11-14T15:17:01","slug":"news-7590","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/14\/news-7590\/","title":{"rendered":"Patch Tuesday, November 2018 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 14 Nov 2018 13:25:13 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> on Tuesday released 16 software updates to fix more than 60 security holes in various flavors of <strong>Windows<\/strong> and other Microsoft products. <strong>Adobe<\/strong>\u00a0also has security patches available for <strong>Flash Player<\/strong>, <strong>Acrobat<\/strong> and <strong>Reader<\/strong> users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"229\" height=\"240\" \/>As per usual, most of the critical flaws &#8212; those that can be exploited by malware or miscreants without any help from users &#8212; reside in Microsoft&#8217;s Web browsers <strong>Edge<\/strong> and <strong>Internet Explorer<\/strong>.<\/p>\n<p>This week&#8217;s patch batch addresses two flaws of particular urgency: One is a zero-day vulnerability (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8589\" target=\"_blank\" rel=\"noopener\">CVE-2018-8589<\/a>) that is already being exploited to compromise\u00a0<strong>Windows 7<\/strong> and <strong>Server 2008<\/strong> systems.<\/p>\n<p>The other is a publicly disclosed bug in Microsoft&#8217;s <strong>Bitlocker<\/strong> encryption technology (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8566\" target=\"_blank\" rel=\"noopener\">CVE-2018-8566<\/a>) that could allow an attacker to get access to encrypted data. One mitigating factor with both security holes is that the attacker would need to be already logged in to the targeted system to exploit them.<\/p>\n<p>Of course, if the target has Adobe Reader or Acrobat installed, it might be easier for attackers to achieve that log in. According to <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2018\/11\/13\/november-2018-patch-tuesday-62-vulns-tftp-server-rce-adobe-poc\" target=\"_blank\" rel=\"noopener\">analysis<\/a> from security vendor <strong>Qualys<\/strong>, there is now code publicly available that could force these two products to leak a hash of the user&#8217;s Windows password (which could then be cracked with open-source tools). A <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb18-40.html\" target=\"_blank\" rel=\"noopener\">new update<\/a> for Acrobat\/Reader fixes this bug, and Adobe has published some <a href=\"https:\/\/helpx.adobe.com\/acrobat\/kb\/mitigation-NTLM-dictionary-attacks.html\" target=\"_blank\" rel=\"noopener\">mitigation suggestions<\/a> as well.<span id=\"more-45693\"><\/span><\/p>\n<p>In addition, Adobe pushed out <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-39.html\" target=\"_blank\" rel=\"noopener\">a security update<\/a> for Windows, Mac, Linux and Chrome versions of\u00a0<strong>Flash Player<\/strong>. The update fixes just one vulnerability in Flash, but I&#8217;m sure most of us would rather Flash died off completely already. Adobe said it plans to end support for the plugin in 2020. <strong>Google Chrome<\/strong> is now making users explicitly enable Flash every time they want to use it, and by the summer of 2019 it will\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/09\/03\/chrome-flash-is-almost-almost-almost-dead\/\" target=\"_blank\" rel=\"noopener\">make users go into their settings to enable it<\/a> every time they want to run it.<\/p>\n<p>KrebsOnSecurity has frequently suggested that Windows users wait a day or two after Microsoft releases monthly security updates before installing the fixes, with the rationale that occasionally buggy patches can cause serious headaches for users who install them before all the kinks are worked out.<\/p>\n<p><strong>Windows 10<\/strong> likes to install patches all in one go and reboot your computer on its own schedule. Microsoft doesn\u2019t make it easy for Windows 10 users to change this setting,\u00a0<a href=\"https:\/\/www.howtogeek.com\/224471\/how-to-prevent-windows-10-from-automatically-downloading-updates\/\" target=\"_blank\" rel=\"noopener\">but it is possible<\/a>. For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in <strong>Windows Update<\/strong>.<\/p>\n<p>In either case, it&#8217;s a good idea to get in the habit of backing up your data before installing Windows updates. Unlike last month, when many Windows users saw the contents of their &#8220;My Documents&#8221; folder erased by a buggy update, I&#8217;m not aware of any major issues this time around.<\/p>\n<p>If you experience any problems installing any of these patches this month, please feel free to leave a comment about it below; there\u2019s a good chance other readers have experienced the same and may even chime in here with some helpful tips.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/11\/patch-tuesday-november-2018-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 14 Nov 2018 13:25:13 +0000<\/strong><\/p>\n<p>Microsoft on Tuesday released 16 software updates to fix more than 60 security holes in various flavors of Windows and other Microsoft products. Adobe&#8217;s also got security patches available for Flash, Acrobat and Adobe Reader users.\u00a0<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[20147,20148,11415,20149,13457,17220,16936],"class_list":["post-13823","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-cve-2018-8566","tag-cve-2018-8589","tag-flash-player","tag-microsoft-patch-tuesday-november-2018","tag-qualys","tag-security-tools","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13823"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13823\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13823"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}