{"id":18483,"date":"2022-03-12T06:30:03","date_gmt":"2022-03-12T14:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/12\/news-12216\/"},"modified":"2022-03-12T06:30:03","modified_gmt":"2022-03-12T14:30:03","slug":"news-12216","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/12\/news-12216\/","title":{"rendered":"Microsoft delivers a solid, low-impact Patch Tuesday"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/hand_flicks_on_update_switch_software_update_fix_patch_by_stadtratte_gettyimages-1140137377_2400x1600-100854510-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Sat, 12 Mar 2022 05:10:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">March brings us a solid set of updates from Microsoft for Windows, Microsoft Office, Exchange, and Edge (Chromium), but no critical issues requiring a \u201cPatch Now\u201d release schedule (though Microsoft Exchange will require some technical effort this month). We have published some testing guidelines, with a focus on printing, remote desktop over VPN connections, and server-based networking changes. We also recommend testing your Windows installer packages with a specific focus on roll-back and uninstall functionality. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can find more information about the risk of deploying these Patch Tuesday updates with <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-march-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">this useful infographic<\/a><\/span><span style=\"font-weight: 400;\">. And, if you are looking for more information on .NET updates, there is a <a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/march-2022-updates\/\" rel=\"noopener nofollow\" target=\"_blank\">great post from Microsoft<\/a><\/span><span style=\"font-weight: 400;\"> that highlights this month&#8217;s changes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There was at least one high-risk reported change to the Windows platform for March. We have included the following rough testing guidelines based on our analysis of the changed files and contents of this month\u2019s Windows and Office updates:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have time, it may be worth testing UNC paths to DOS boxes (due to several changes to the networking and authentication stack). There&#8217;s also been an update to the<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/samples\/microsoft\/windows-driver-samples\/fastfat-file-system-driver\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">FastFAT<\/span><\/a><span style=\"font-weight: 400;\"> system driver and how End User Defined Characters (<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/intl\/eudc\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">EUDC<\/span><\/a><span style=\"font-weight: 400;\">) are handled. Microsoft has now included deployment and reboot requirements for this March 2022 update <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/security-update-deployment-information-march-8-2022-kb5011746-6de55254-fef1-4a52-9ded-6d4319af461b\" rel=\"noopener nofollow\" target=\"_blank\">in a single page<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in this cycle. There is more than usual this time, so I&#8217;ve referenced a few key issues that relate to the latest builds from Microsoft, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There was an outstanding issue from January&#8217;s update cycle where the executable DWM.EXE crashes after installing<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/february-8-2022-kb5010386-os-build-22000-493-3c018e73-a58a-4fca-be69-8a93dd6fedbd'\" rel=\"nofollow noopener\" target=\"_blank\">\u00a0<span style=\"font-weight: 400;\">KB5010386<\/span><\/a><span style=\"font-weight: 400;\">. This issue has now been resolved. If you are looking for more data on these types of reported issues, one great resource from Microsoft is the<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Health Center<\/span><\/a>\u00a0\u2014<span style=\"font-weight: 400;\">\u00a0specifically, you can find out about<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-10-21H2\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Windows 10<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-11-21H2\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Windows 11<\/span><\/a><span style=\"font-weight: 400;\"> known issues and their current status.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though there is a much smaller list of patches for this patch cycle, Microsoft released several revisions to previous patches, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month, Microsoft has not published any mitigations or workarounds for the Windows, Microsoft Office, browser or development platform updates and patches. There is an ongoing list of mitigations and updates related to known issues for Microsoft Exchange (they&#8217;re included in our Exchange-related section).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following a trend set by Microsoft over the past few months, only the Chromium Edge browser has been updated. With no critical updates, and 21 reported vulnerabilities rated as important by Microsoft, this is another easy update cycle. Other than working through potential issues with the Brotli compression engine, you should be able to deploy the browser updates on your normal release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following the trend of fewer (in number and in nature) updates this month, Microsoft released just two critical updates (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-22006\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-22006<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24501\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24501<\/span><\/a><span style=\"font-weight: 400;\">). Neither update is likely to affect core platforms as each patches a singular video codec and a Microsoft Store component. The remaining 40 patches are all rated as important by Microsoft and update the following core Windows components:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You may want to add a Windows Installer test to your testing regime this month. Add these Windows updates to your standard release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you were ever looking for a &#8220;low-risk&#8221; patch profile for Microsoft Office, this month&#8217;s updates are a very good candidate. Microsoft has released six patches to Office, all of which are rated as important. Most importantly, they either affect Skype (which is not so important) or the &#8220;<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/office\/troubleshoot\/office-suite-issues\/office-click-to-run-installation\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Click to Run<\/span><\/a><span style=\"font-weight: 400;\">&#8221; (CTR) installation of Office. The CTR version is the virtualized, self-contained version of the Office install that is streamed down to the target system. By design, these installations have little to no effect on the operating system and given the nature of the changes made this month, there is very little deployment risk. Add these Office updates to your standard deployment schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, a critical vulnerability from Microsoft. No&#8230;, wait! Darn, it&#8217;s for Exchange. Microsoft Exchange is in the bad books this month with one of the few critical-rated vulnerabilities (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-23277\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-23277<\/span><\/a><span style=\"font-weight: 400;\">). Of the two Exchange-related patches for March, the other (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24463\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-24463<\/span><\/a><span style=\"font-weight: 400;\">) is rated as important and could lead to a potential credential spoofing scenario. The critical issue is rated as highly likely to be exploited, but does require that the attacker is authenticated. This is not a &#8220;<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_worm\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">worm-able<\/span><\/a><span style=\"font-weight: 400;\">&#8221; vulnerability, so we recommend you add the Microsoft Exchange updates to your standard server deployment. This update will require a reboot to your servers. There have been several published issues with recent Microsoft Exchange updates, and so we have included a list of known issues when updating your Exchange Servers, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has <a href=\"https:\/\/support.microsoft.com\/help\/5003623\" rel=\"noopener nofollow\" target=\"_blank\">published a workaround<\/a> for the &#8220;400 Bad Request&#8221; error<\/span><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released just four updates to its development platforms for March, all rated important. Two patches are for the .NET platform (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24512\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-24512<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24464\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-24464<\/span><\/a><span style=\"font-weight: 400;\">), both of which require user interaction to deliver their payload, at worst resulting in an elevation-of-privilege attack. The Microsoft patch that may give you a headache was raised by Google in 2020 (hence it&#8217;s CVE identifier of<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-8927\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2020-8927<\/span><\/a><span style=\"font-weight: 400;\">). This Patch Tuesday update to<\/span><a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/introducing-support-for-brotli-compression\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Brotli<\/span><\/a><span style=\"font-weight: 400;\"> may affect how your web pages are compressed (notice I did not say \u201czipped\u201d). Before you deploy this update, take a quick look at your internal web pages and browser-based applications using Brotli for adverse effects on decompressing CSS and JavaScript (hint, hint). Otherwise, add these updates to your standard patch schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just like last month, Adobe has not released any updates or patches to the Adobe Reader product lines. This is good news, and hopefully part of a larger trend. I&#8217;m hoping that Adobe Reader updates follow the same patch as Microsoft&#8217;s browser patches (ever decreasing numbers of critical updates), and then, as with the Microsoft Chromium browser, we see only a few security issues rated as important by both the community and Microsoft. Adobe has released a few patches to its<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/photoshop\/apsb22-14.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Photoshop<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/after_effects\/apsb22-17.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">After Effects<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb22-15.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Illustrator<\/span><\/a><span style=\"font-weight: 400;\"> products. However, these are product-focused updates and should not affect your general desktop\/server patch roll-out schedules.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3653356\/microsoft-delivers-a-solid-low-impact-patch-tuesday.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/08\/hand_flicks_on_update_switch_software_update_fix_patch_by_stadtratte_gettyimages-1140137377_2400x1600-100854510-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Sat, 12 Mar 2022 05:10:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">March brings us a solid set of updates from Microsoft for Windows, Microsoft Office, Exchange, and Edge (Chromium), but no critical issues requiring a \u201cPatch Now\u201d release schedule (though Microsoft Exchange will require some technical effort this month). We have published some testing guidelines, with a focus on printing, remote desktop over VPN connections, and server-based networking changes. We also recommend testing your Windows installer packages with a specific focus on roll-back and uninstall functionality. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can find more information about the risk of deploying these Patch Tuesday updates with <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-march-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">this useful infographic<\/a><\/span><span style=\"font-weight: 400;\">. And, if you are looking for more information on .NET updates, there is a <a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/march-2022-updates\/\" rel=\"noopener nofollow\" target=\"_blank\">great post from Microsoft<\/a><\/span><span style=\"font-weight: 400;\"> that highlights this month&#8217;s changes.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3653356\/microsoft-delivers-a-solid-low-impact-patch-tuesday.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525],"class_list":["post-18483","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18483"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18483\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18483"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}