{"id":17910,"date":"2020-03-17T20:33:01","date_gmt":"2020-03-18T04:33:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11643\/"},"modified":"2020-03-17T20:33:01","modified_gmt":"2020-03-18T04:33:01","slug":"news-11643","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11643\/","title":{"rendered":"Take your time, get it right for March Patch Tuesday"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/01\/cso_microsoft_windows_7_security_patches_updates_by_tookapic_and_garik_barseghyan_aka_insspirito_2400x1600-100827635-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Thu, 12 Mar 2020 11:41:00 -0700<\/strong><\/p>\n<p>This is a big update to the Windows platform for the Microsoft March Patch Tuesday release cycle. Consisting of 115 patches, mostly to the Windows desktop, with almost all of the critical issues relating to browser-based scripting engine memory issues, this will be a difficult set of updates to release and manage.<\/p>\n<p>The testing profile for the Windows desktop platform is very large, with a lower than usual exploitability\/risk rating. For this month, we do not have any reports of publicly exploited or disclosed vulnerabilities (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\" rel=\"noopener nofollow\" target=\"_blank\">zero-days<\/a>), so my recommendation is to take your time, test the changes to each platform, create a staged rollout plan and wait for future (potentially) imminent changes from Microsoft.<\/p>\n<p>Each month, Microsoft includes a list of known issues that relate to the operating system and platforms that are included in this update cycle. I have referenced a few key issues that relate to the latest builds from Microsoft including:<\/p>\n<p>And on Windows 7.x, 8.x and Server 2012 builds you will still see the following (outstanding) known issues:<\/p>\n<p>Microsoft is working on a resolution and will provide an update in an upcoming release.<\/p>\n<p>There have been numerous updates to the Microsoft LDAP Channel binding and signing advisory over the past year. Microsoft has recently posted a new update that includes:<\/p>\n<p>\u201cMicrosoft is announcing that the March 10, 2020 security updates are available that add options for administrators to harden the configurations for LDAP channel binding on Active Directory domain controllers. Further information and configuration options can be found here: <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190023\" rel=\"noopener nofollow\" target=\"_blank\">ADV190023<\/a>. While the latest servicing stack information can be found here (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV990001\" rel=\"noopener nofollow\" target=\"_blank\">ADV990001<\/a>).\u201d<\/p>\n<p>The following Remote Desktop vulnerabilities have now been updated to include all versions of Windows 10:<\/p>\n<p>No further action for all of these major revisions is required if you are using Microsoft automatic updates.<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>It&#8217;s not you, it&#8217;s your browser. With 15 critical updates and one remaining patch rated as important by Microsoft, the majority of critical vulnerabilities addressed in this month\u2019s Patch Tuesday relate to browser-based scripting Engines (Chakra, JavaScript). Though all of the critical rated patches could lead to remote code execution scenarios, their <a href=\"https:\/\/www.first.org\/cvss\/\" rel=\"noopener nofollow\" target=\"_blank\">CVSS<\/a> scores and thus their corresponding exploitability are quite low (average 4.4 out 10).<\/p>\n<p>Further narrowing the security concerns for these reported vulnerabilities is that they only apply to relatively few Windows builds. If you are on the latest release of Windows 10, you are probably OK. If you are on an old version of Windows (pre-Chakra), you are not affected. If you are running a really early version of Windows 10 (who are you?), then you have a problem. Add these browser patches to your standard rollout schedule.<\/p>\n<p>With 73 updates (of which 6 are rated as critical), this month\u2019s Windows update covers a lot of functionality across the Windows ecosystem, including changes to: Microsoft Scripting Engine, Windows App Platform and Frameworks, Windows Media, Windows Silicon Platform, Microsoft Edge, Internet Explorer, Windows Fundamentals, Windows Authentication, Windows Kernel, Windows Core Networking, Windows Storage and File Systems, Windows Peripherals, Windows Update Stack, and Windows Server.<\/p>\n<p>Some areas of concern include LNK file handling changes (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0684\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2020-0684<\/a>), updates to the Microsoft graphics core engine (GDI) and a slew of patches to the Windows media engine (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0801\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2020-0801<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0807\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2020-0807<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0809\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2020-0809<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0869\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2020-0869<\/a>).<\/p>\n<p>Aside from the documented security issues, I feel that this month we are at risk of some patch deployment challenges. This month\u2019s Patch Tuesday is a large update that covers a lot of \u201cfunctional territory.\u201d This means a lot of testing will be required across core Windows functionality and application dependencies.<\/p>\n<p>Working through the patch manifest and update payloads, there are some core files that have been updated that have caused application issues in the past. One good example includes the file MSXML3R.DLL, which was updated in <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0844\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2020-0844<\/a>. We have already encountered a number of potential issues in the following applications as part of our algorithmic analysis, including:<\/p>\n<p>Our advice this month is to take your time with this update, create a staged rollout (IT first) and then deploy in concentric rings of business priority.<\/p>\n<p>We also expect some out-of-band updates later this month \u2014 possibly with an update to the LNK patches or the SMB issue. For further guidance on the potential issues with the latest SMB vulnerability, Microsoft has released an advisory here: <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200005\" rel=\"noopener nofollow\" target=\"_blank\">ADV200005<\/a>.<\/p>\n<p><em>Editor&#8217;s note: Microsoft released <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4551762\/windows-10-update-kb4551762\" rel=\"noopener nofollow\" target=\"_blank\">KB4551762<\/a> on March 12 to address the SMBv3 vulnerability.<\/em><\/p>\n<p>This month Microsoft Office has one critical patch in Word (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0852\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2020-0852<\/a>) with eight other vulnerabilities rated as important by Microsoft. The Word-related vulnerability addresses a memory issue and could lead to a remote code execution scenario; it is relatively difficult to exploit. Add these updates to your regular patch cadence office.<\/p>\n<p>For March Microsoft has released five patches for its development platform, all rated as important by Microsoft. Mostly affecting the <a href=\"https:\/\/azure.microsoft.com\/en-ca\/services\/devops\/server\/\" rel=\"noopener nofollow\" target=\"_blank\">Azure DevOps<\/a> server, they are (currently) difficult to exploit and lead only to spoofing and elevation of privilege attacks. Add these minor updates to your standard development update effort.<\/p>\n<p>Adobe has chosen not to release any updates for this March Patch Tuesday cycle. Unfortunately, this does not mean that there are no vulnerabilities to exploit this month. Expect an update from Adobe next week or shortly after. Until then, it\u2019s Margarita time!<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3532432\/take-your-time-get-it-right-for-march-patch-tuesday.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/01\/cso_microsoft_windows_7_security_patches_updates_by_tookapic_and_garik_barseghyan_aka_insspirito_2400x1600-100827635-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Thu, 12 Mar 2020 11:41:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>This is a big update to the Windows platform for the Microsoft March Patch Tuesday release cycle. Consisting of 115 patches, mostly to the Windows desktop, with almost all of the critical issues relating to browser-based scripting engine memory issues, this will be a difficult set of updates to release and manage.<\/p>\n<p>The testing profile for the Windows desktop platform is very large, with a lower than usual exploitability\/risk rating. For this month, we do not have any reports of publicly exploited or disclosed vulnerabilities (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\" rel=\"noopener nofollow\" target=\"_blank\">zero-days<\/a>), so my recommendation is to take your time, test the changes to each platform, create a staged rollout plan and wait for future (potentially) imminent changes from Microsoft.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3532432\/take-your-time-get-it-right-for-march-patch-tuesday.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10909,13764,714,10525],"class_list":["post-17910","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft-office","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17910"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17910\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17910"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}