{"id":16869,"date":"2019-11-12T16:17:05","date_gmt":"2019-11-13T00:17:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/12\/news-10607\/"},"modified":"2019-11-12T16:17:05","modified_gmt":"2019-11-13T00:17:05","slug":"news-10607","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/12\/news-10607\/","title":{"rendered":"Patch Tuesday, November 2019 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Nov 2019 22:04:32 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released updates to plug security holes in its software, including patches to fix at least 74 weaknesses in various flavors of <strong>Windows<\/strong> and programs that run on top of it. The November updates include patches for a zero-day flaw in <strong>Internet Explorer<\/strong> that is currently being exploited in the wild, as well as a sneaky bug in certain versions of <strong>Office for Mac<\/strong> that bypasses security protections and was detailed publicly prior to today&#8217;s patches.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"220\" height=\"231\" \/>More than a dozen of the flaws tackled in this month&#8217;s release are rated &#8220;critical,&#8221; meaning they involve weaknesses that could be exploited to install malware without any action on the part of the user, except for perhaps browsing to a hacked or malicious Web site or opening a booby-trapped file attachment.<\/p>\n<p>Perhaps the most concerning of those critical holes is a zero-day flaw in Internet <del>Exploder<\/del> Explorer (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1429\" target=\"_blank\" rel=\"noopener\">CVE-2019-1429<\/a>) that has already seen active exploitation. Today&#8217;s updates also address two other critical vulnerabilities in the same Windows component that handles various <a href=\"https:\/\/encyclopedia2.thefreedictionary.com\/Microsoft+Script+Engine\" target=\"_blank\" rel=\"noopener\">scripting languages<\/a>.<\/p>\n<p>Microsoft also fixed a flaw in Microsoft Office for Mac (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1457\" target=\"_blank\" rel=\"noopener\">CVE-2019-1457<\/a>) that could allow attackers to bypass security protections in some versions of the program that could let malicious macros through.<\/p>\n<p>Macros are bits of computer code that can be embedded into Office files, and malicious macros are frequently used by malware purveyors to compromise Windows systems. Usually, this takes the form of a prompt urging the user to &#8220;enable macros&#8221; once they&#8217;ve opened a booby-trapped Office document delivered via email. Thus, Office has a feature called &#8220;disable all macros without notification.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28673\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/11\/macrosms.png\" alt=\"\" width=\"596\" height=\"348\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/11\/macrosms.png 630w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/11\/macrosms-285x166.png 285w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/11\/macrosms-600x350.png 600w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/p>\n<p>But Microsoft says all versions of Office still support an older type of macros that do not respect this setting, and can be used as <a href=\"https:\/\/krebsonsecurity.com\/2019\/02\/payroll-provider-gives-extortionists-a-payday\/\" target=\"_blank\" rel=\"noopener\">a vector for pushing malware<\/a>. <strong>Will Dornan<\/strong> of <a href=\"https:\/\/kb.cert.org\/vuls\/id\/125336\/\" target=\"_blank\" rel=\"noopener\">CERT\/CC reports<\/a> that while Office 2016 and 2019 for Mac will still prompt the user before executing these older macro types, <strong>Office for Mac 2011<\/strong> fails to warn users before opening them.<span id=\"more-49481\"><\/span><\/p>\n<p>Other Windows applications or components receiving patches for critical flaws today include Microsoft Exchange and Windows Media Player. In addition, Microsoft also patched nine vulnerabilities &#8212; five of them critical &#8212; in the <strong>Windows Hyper-V<\/strong>, an add-on to the <strong>Windows Server OS<\/strong> (and <strong>Windows 10 Pro<\/strong>) that allows users to create and run <a href=\"https:\/\/azure.microsoft.com\/en-us\/overview\/what-is-a-virtual-machine\/\" target=\"_blank\" rel=\"noopener\">virtual machines<\/a> (other &#8220;guest&#8221; operating systems) from within Windows.<\/p>\n<p>Although <strong>Adobe<\/strong> typically issues patches for its <strong>Flash Player<\/strong> browser component on Patch Tuesday, this is the second month in a row that Adobe has not released any security updates for Flash. However, Adobe today did push security fixes for a variety of its creative software suites, including <a href=\"https:\/\/helpx.adobe.com\/security\/products\/animate\/apsb19-34.html\" target=\"_blank\" rel=\"noopener\">Animate<\/a>, <a href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb19-36.html\" target=\"_blank\" rel=\"noopener\">Illustrator<\/a>, <a href=\"https:\/\/helpx.adobe.com\/security\/products\/media-encoder\/apsb19-52.html\" target=\"_blank\" rel=\"noopener\">Media Encoder<\/a> and <a href=\"https:\/\/helpx.adobe.com\/security\/products\/bridge\/apsb19-53.html\" target=\"_blank\" rel=\"noopener\">Bridge<\/a>. Also, I neglected to note last month that Adobe released a critical update for <strong>Acrobat\/Reader<\/strong> that <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb19-49.html\" target=\"_blank\" rel=\"noopener\">addressed at least 67 bugs<\/a>, so if you&#8217;ve got either of these products installed, please be sure they&#8217;re patched and up to date.<\/p>\n<p>Finally,\u00a0<strong>Google<\/strong> recently fixed a zero-day flaw in its <strong>Chrome<\/strong>\u00a0Web browser (<a href=\"https:\/\/securelist.com\/chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium\/94866\/\" target=\"_blank\" rel=\"noopener\">CVE-2019-13720<\/a>). If you use Chrome and see an upward-facing arrow to the right of the address bar, you have an update pending; fully closing and restarting the browser should install any available updates.<\/p>\n<p>Now seems like a good time to remind all you <strong>Windows 7<\/strong> end users that Microsoft will cease shipping security updates after January 2020 (this end-of-life also affects Windows Server 2008 and 2008 R2). While businesses and other volume-license purchasers will <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-IT-Pro-Blog\/How-to-get-Extended-Security-Updates-for-eligible-Windows\/ba-p\/917807\" target=\"_blank\" rel=\"noopener\">have the option to pay for further fixes<\/a> after that point, all other Windows 7 users who want to stick with Windows will need to consider migrating to <strong>Windows 10<\/strong> soon.<\/p>\n<p>Standard heads-up: Windows 10 likes to install patches all in one go and reboot your computer on its own schedule. Microsoft doesn\u2019t make it easy for Windows 10 users to change this setting,\u00a0<a href=\"https:\/\/www.howtogeek.com\/224471\/how-to-prevent-windows-10-from-automatically-downloading-updates\/\" target=\"_blank\" rel=\"noopener\">but it is possible<\/a>. For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in Windows Update. To get there, click the Windows key on your keyboard and type \u201cwindows update\u201d into the box that pops up.<\/p>\n<p>Keep in mind that while staying up-to-date on Windows patches is a good idea, it&#8217;s important to make sure you&#8217;re updating only after you\u2019ve backed up your important data and files. A reliable backup means you\u2019re probably not freaking out when the odd buggy patch causes problems booting the system. So do yourself a favor and backup your files before installing any patches.<\/p>\n<p>As ever, if you experience glitches or problems installing any of these patches this month, please feel free to leave a comment about it below; there\u2019s a decent chance other readers have experienced the same and may even chime in here with some helpful tips.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2019\/11\/patch-tuesday-november-2019-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Nov 2019 22:04:32 +0000<\/strong><\/p>\n<p>Microsoft today released updates to plug security holes in its software, including patches to fix at least 74 weaknesses in various flavors of Windows and in software that runs on top of it. The November updates include patches for a zero-day flaw in Internet Explorer that is currently being exploited in the wild, as well as a sneaky bug in certain versions of Office for Mac that bypasses security protections and was detailed publicly prior to today&#8217;s patches.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11414,23429,23430,23431,10796,10516,23432,16936,23433],"class_list":["post-16869","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe","tag-cve-2019-1429","tag-cve-2019-1457","tag-internet-explorer-zero-day","tag-macros","tag-microsoft","tag-office-for-mac","tag-time-to-patch","tag-windows-7-end-of-life"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16869"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16869\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16869"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}