{"id":15551,"date":"2019-06-12T07:17:05","date_gmt":"2019-06-12T15:17:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/12\/news-9300\/"},"modified":"2019-06-12T07:17:05","modified_gmt":"2019-06-12T15:17:05","slug":"news-9300","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/12\/news-9300\/","title":{"rendered":"Microsoft Patch Tuesday, June 2019 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 12 Jun 2019 13:26:21 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong>\u00a0on Tuesday released updates to fix 88 security vulnerabilities in its <strong>Windows<\/strong> operating systems and related software. The most dangerous of these include four flaws for which there is already exploit code available. There&#8217;s also a scary bug affecting all versions of <strong>Microsoft Office<\/strong> that can be triggered by a malicious link or attachment. And of course <strong>Adobe<\/strong> has its customary monthly security update for <strong>Flash Player<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"229\" height=\"240\" \/>Microsoft says it has so far seen no exploitation against any of the four flaws that were disclosed publicly prior to their patching this week &#8212; nor against any of the 88 bugs quashed in this month&#8217;s release. All four are privilege escalation flaws: <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1064\" target=\"_blank\" rel=\"noopener\">CVE-2019-1064<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1069\" target=\"_blank\" rel=\"noopener\">CVE-2019-1069<\/a> affect <strong>Windows 10<\/strong> and later; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1053\" target=\"_blank\" rel=\"noopener\">CVE-2019-1053<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0973\" target=\"_blank\" rel=\"noopener\">CVE-2019-0973<\/a> both affect all currently supported versions of Windows.<\/p>\n<p>Most of the critical vulnerabilities &#8212; those that can be exploited by malware or miscreants to infect systems without any action on the part of the user &#8212; are present in Microsoft&#8217;s browsers <strong>Internet Explorer<\/strong> and <strong>Edge<\/strong>.<\/p>\n<p>According to <strong>Allan Liska<\/strong>, senior solutions architect at <strong>Recorded Future<\/strong>, serious vulnerabilities\u00a0in this month&#8217;s patch batch reside in <strong>Microsoft Word<\/strong> (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1034\" target=\"_blank\" rel=\"noopener\">CVE-2019-1034<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1035\" target=\"_blank\" rel=\"noopener\">CVE-2019-1035<\/a>).<\/p>\n<p>&#8220;This is another memory corruption vulnerability that requires an attacker to send a specially crafted Microsoft Word document for a victim to open, alternatively an attacker could convince a victim to click on a link to a website hosting a malicious Microsoft Word document,&#8221; Liska wrote. &#8220;This vulnerability affects all versions of Microsoft Word on Windows and Mac as well as Office 365. Given that Microsoft Word Documents are a favorite exploitation tool of cybercriminals, if this vulnerability is reverse engineered it could be widely exploited.&#8221;<span id=\"more-47982\"><\/span><\/p>\n<p>Microsoft also pushed an update to plug <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb19-30.html\" target=\"_blank\" rel=\"noopener\">a single critical security hole<\/a> in Adobe&#8217;s Flash Player software, which is waning in use but it still is a target for malware purveyors.\u00a0<strong>Google Chrome\u00a0<\/strong>auto-updates Flash but also is now making users explicitly enable Flash every time they want to use it. By the summer of 2019 Google will\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/09\/03\/chrome-flash-is-almost-almost-almost-dead\/\" target=\"_blank\" rel=\"noopener\">make Chrome users go into their settings to enable it<\/a>\u00a0every time they want to run it.<\/p>\n<p>Firefox also forces users with the Flash add-on installed to click in order to play Flash content; instructions for disabling or removing Flash from Firefox are\u00a0<a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/disable-or-remove-add-ons\" target=\"_blank\" rel=\"noopener\">here<\/a>. Adobe will stop supporting Flash at the end of 2020.<\/p>\n<p>Note that\u00a0<strong>Windows 10<\/strong>\u00a0likes to install patches all in one go and reboot your computer on its own schedule. Microsoft doesn\u2019t make it easy for Windows 10 users to change this setting,\u00a0<a href=\"https:\/\/www.howtogeek.com\/224471\/how-to-prevent-windows-10-from-automatically-downloading-updates\/\" target=\"_blank\" rel=\"noopener\">but it is possible<\/a>. For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in\u00a0<strong>Windows Update<\/strong>. To get there, click the Windows key on your keyboard and type &#8220;windows update&#8221; into the box that pops up.<\/p>\n<p>Staying up-to-date on Windows patches is good. Updating only after you\u2019ve backed up your important data and files is even better. A good backup means you\u2019re not pulling your hair out if the odd buggy patch causes problems booting the system. So do yourself a favor and backup your files before installing any patches.<\/p>\n<p>As always, if you experience any problems installing any of the patches this month, please feel free to leave a comment about it below; there\u2019s a good chance other readers have experienced the same and may even chime in here with some helpful tips.<\/p>\n<p>Additional reading:<\/p>\n<p><a href=\"https:\/\/www.ghacks.net\/2019\/06\/11\/microsoft-windows-security-updates-june-2019-overview\/\" target=\"_blank\" rel=\"noopener\">Martin Brinkmann&#8217;s take at Ghacks.net<\/a><\/p>\n<p><a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2019\/06\/11\/june-2019-patch-tuesday-88-vulns-21-critical-hyper-v-escape-adobe-vulns\" target=\"_blank\" rel=\"noopener\">Qualys on Patch Tuesday<\/a><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/MSFT+June+2019+Patch+Tuesday\/25024\/\" target=\"_blank\" rel=\"noopener\">SANS&#8217;s quick reference by severity<\/a><\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2019\/06\/microsoft-patch-tuesday-june-2019-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 12 Jun 2019 13:26:21 +0000<\/strong><\/p>\n<p>Microsoft\u00a0on Tuesday released updates to fix 88 security vulnerabilities in its Windows operating systems and related software. The most dangerous of these include four flaws for which there is already exploit code available. There&#8217;s also a scary bug affecting all versions of Microsoft Office that can be triggered by a malicious link or attachment. And of course Adobe has its customary monthly security update for Flash Player.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[18720,22013,22014,22015,22016,22017,22018,22019,11753,16936],"class_list":["post-15551","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-allan-liska","tag-cve-2019-0973","tag-cve-2019-1034","tag-cve-2019-1035","tag-cve-2019-1053","tag-cve-2019-1064","tag-cve-2019-1069","tag-patch-tuesday-june-2019","tag-recorded-future","tag-time-to-patch"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15551"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15551\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15551"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}