{"id":19848,"date":"2022-08-13T04:30:14","date_gmt":"2022-08-13T12:30:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/08\/13\/news-13581\/"},"modified":"2022-08-13T04:30:14","modified_gmt":"2022-08-13T12:30:14","slug":"news-13581","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/08\/13\/news-13581\/","title":{"rendered":"Patch Tuesday update addresses 123 vulnerabilities, two critical zero-days"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Sat, 13 Aug 2022 04:58:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft&#8217;s August Patch Tuesday release addresses 123 security issues in Microsoft Windows, Office, Exchange (it&#8217;s back!) and Visual Studio \u2014 and unfortunately, we have two zero-days with reports of active exploitation in the wild. Since this is\u00a0a broad update, it will require planning and testing before deployment. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-34713\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-34713<\/span><\/a><span style=\"font-weight: 400;\">) occurs in the Windows diagnostic tools and the second (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-30134\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-30134<\/a>) affects Microsoft Exchange<\/span><span style=\"font-weight: 400;\">. Basically, the holidays are over and it&#8217;s time to pay attention to Microsoft updates again. We have made &#8220;Patch Now&#8221; recommendations for Windows, Exchange and Adobe for this month.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Y<\/span><span style=\"font-weight: 400;\">ou can find more information on the risk of deploying these Patch Tuesday updates <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-june-2022\/\" rel=\"noopener nofollow\" target=\"_blank\">in this infographic<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the large number of changes included in this August patch cycle, I have broken down the testing scenarios into high risk and standard risk groups:<\/span><\/p>\n<p><strong>High Risk:<\/strong><span style=\"font-weight: 400;\"> These are likely to include functionality changes, may deprecate existing functionality and will likely require creating new testing plans:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following updates are not documented as functional changes, but still require a full test cycle:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the changes to the SSU,<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/devtest\/boot-options-in-windows\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Windows Boot Manager<\/span><\/a><span style=\"font-weight: 400;\"> and updates to the Windows kernel (WIN32KY.SYS) this month, it may be worth having a look at some Microsoft testing platforms such as the Microsoft Test Authoring and Execution Framework (<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/taef\/getting-started\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">TAEF<\/span><\/a><span style=\"font-weight: 400;\">). You will have to know<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/taef\/authoring-tests-in-c--\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">C++<\/span><\/a><span style=\"font-weight: 400;\"> or<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/taef\/authoring-tests-in-c-\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">C#<\/span><\/a><span style=\"font-weight: 400;\"> and you will need the Windows Driver kit (<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/download-the-wdk\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">WDK<\/span><\/a><span style=\"font-weight: 400;\">). Noting that for each of these testing scenarios, a manual shut-down, reboot and restart is suggested, with a focus on Boot Manager entries in the event viewer logs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms that are included in this update cycle. This month, there are some really complex changes:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And for the latest release of Windows 11, it looks as if this month&#8217;s update may lead to the utility<\/span><a href=\"https:\/\/apps.microsoft.com\/store\/detail\/reader\/9WZDNCRFHWG5?hl=en-us&amp;gl=US\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">XPS Viewer<\/span><\/a><span style=\"font-weight: 400;\"> behaving badly (using increasing processor and memory resources) before closing unexpectedly (i.e. badly). A reboot will solve the issue until Microsoft posts a fix.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though we have fewer &#8220;new&#8221; patches released this month, there are a lot of updated and newly released patches from previous months:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Probably the most important workaround this month relates to Microsoft Outlook crashing and locking up immediately after start-up.\u00a0<\/span><span style=\"font-weight: 400;\">Microsoft explains, &#8220;When you start Outlook Desktop, it gets past loading profile and processing, briefly opens, and then stops responding,&#8221; Microsoft is currently working on the issue and we expect an update soon. Microsoft offered the following workarounds:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can find out more about Microsoft Diagnostic settings<\/span><a href=\"https:\/\/admx.help\/?Category=Office2016&amp;Policy=outlk16.Office.Microsoft.Policies.Windows%3A%3AL_DisableSupportDiagnostics\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. This is a little embarrassing for Microsoft as this is another significant Office issue following the recent<\/span><a href=\"https:\/\/answers.microsoft.com\/en-us\/outlook_com\/forum\/all\/uber-emails-crash-outlook-windows\/e50c4c8e-b006-4208-a80f-b2f5f34bd10e\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Uber receipt<\/span><\/a><span style=\"font-weight: 400;\"> crashing issue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><strong>Browsers<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released three updates to its Edge browser (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-33636\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-33636<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-33649\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-33649<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-35796\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-35796<\/span><\/a><span style=\"font-weight: 400;\">). Following a trend, none of these are rated as critical. There were also 17 updates to the Chromium project. Google has published all these changes in its\u00a0<\/span><a href=\"https:\/\/chromium.googlesource.com\/chromium\/src\/+log\/102.0.5005.115..103.0.5060.53?pretty=fuller&amp;n=10000\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">update<\/span>\u00a0<span style=\"font-weight: 400;\">log<\/span><\/a><span style=\"font-weight: 400;\">. For further information, refer to the Chromium<\/span><a href=\"https:\/\/sites.google.com\/a\/chromium.org\/dev\/Home\/chromium-security\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">security update\u00a0page<\/span><\/a><span style=\"font-weight: 400;\">. Along with these security fixes, there were a few new features in the latest stable release (103) which\u00a0<\/span><a href=\"https:\/\/blog.chromium.org\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">can be found\u00a0<\/span><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. Add these low-profile updates to your standard patch release schedule.<\/span><\/p>\n<p><strong>Windows<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft addressed 13 critical issues and 43 issues rated important this month. This is fairly broad update that covers the following key Windows features:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to this large update,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-34713\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-34713<\/span><\/a><span style=\"font-weight: 400;\"> (Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability) has been reported as both publicly disclosed and exploited in the wild, making this a serious Windows<\/span><span style=\"font-weight: 400;\"> zero-day<\/span><span style=\"font-weight: 400;\">. This serious Windows security flaw is a<\/span><a href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">path traversal flaw<\/span><\/a><span style=\"font-weight: 400;\"> that attackers can exploit to copy an executable to the Windows Startup folder when a user opens a specially-crafted file through an email client or downloaded from the web. In lighter news, you can find the latest\u00a0<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RE53z8h?pid=ocpVideo1-innerdiv-oneplayer&amp;maskLevel=20&amp;market=en-us\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Windows 11 update video<\/span>\u00a0<span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. Add these critical Windows updates to your &#8220;Patch Now&#8221; release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released an out-of-band (OOB) patch (<\/span><a href=\"http:\/\/kb5002248\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB5002248<\/span><\/a><span style=\"font-weight: 400;\">) for Microsoft Office 2016 (both 32- and 64-bit) relating to VBA projects and Microsoft Access. This month&#8217;s release cycle delivers only four updates, all rated important. Microsoft Excel, Outlook and a few core Microsoft Office libraries are affected, with the most serious leading to remote code execution scenarios. Fortunately, all of these security issues have official fixes from Microsoft and are all relatively difficult to exploit, particularly in a well-managed enterprise environment. Add these low-profile updates to your standard release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately we have six updates for Microsoft Exchange Server, with three rated critical and the remaining three rated important.\u00a0<\/span><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/new-exchange-server-security-update-and-hotfix-packaging\/ba-p\/3301819\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">As promised in<\/span>\u00a0<span style=\"font-weight: 400;\">May<\/span><\/a><span style=\"font-weight: 400;\">, Microsoft has updated its patching process to include self-extracting EXE&#8217;s. You will not find these latest updates in the Microsoft catalog, so I have included a list of <\/span><span style=\"font-weight: 400;\">updates available for the following specific builds of Exchange Server:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the publicly disclosed vulnerability in Microsoft Exchange (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-30134\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-30134<\/span><\/a><span style=\"font-weight: 400;\">) which allows an attacker to read targeted email messages, Microsoft has recommended you apply these security related fixes <\/span><i><span style=\"font-weight: 400;\">immediately (<\/span><\/i><span style=\"font-weight: 400;\">italics added by Microsoft). To get the latest updates, you may also have to run the\u00a0<\/span><a href=\"https:\/\/aka.ms\/ExSetupAssist\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Exchange<\/span>\u00a0<span style=\"font-weight: 400;\">SetupAssist\u00a0PowerShell script<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your organization may already be comfortable with the new update format, but if you are in doubt about the status of your Exchange servers, you can run the Microsoft CSS<\/span><a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Diagnostics\/HealthChecker\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Health Checker<\/span><\/a><span style=\"font-weight: 400;\">. My feeling is that some preparation and planning is required to stage these updates. It took me a while just to walk through the patching decision\/logic trees this month, never mind<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/exchange\/troubleshoot\/client-connectivity\/exchange-security-update-issues\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">troubleshooting failed Exchange updates<\/span><\/a><span style=\"font-weight: 400;\">. Add this month&#8217;s updates to your &#8220;Patch Now&#8221; schedule, noting that all updates this month will require a server reboot.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released five updates rated as important for Visual Studio and .NET Core. The .NET vulnerability (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-34716\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-34716<\/span><\/a><span style=\"font-weight: 400;\">) is really tough to exploit and depends upon successfully executing a technically challenging blind &#8220;external entity&#8221; injection (<\/span><a href=\"https:\/\/portswigger.net\/web-security\/xxe\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">XXE<\/span><\/a><span style=\"font-weight: 400;\">) attack. The remaining Visual Studio vulnerabilities relate to remote code execution (<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Arbitrary_code_execution\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">RCE<\/span><\/a><span style=\"font-weight: 400;\">) scenarios exploited through a local email client (requiring the user to open a specially crafted file). Add these updates to your standard developer update schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Who would have thought it? We are back this August with three updates rated critical and four as important for Adobe Reader.<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb22-39.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">APSB22-39<\/span><\/a><span style=\"font-weight: 400;\"> has been published by Adobe but not included by Microsoft in this month&#8217;s patch cycle. All seven reported vulnerabilities relate to memory leak issues and could lead to a remote code execution scenario (<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Arbitrary_code_execution\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">RCE<\/span><\/a><span style=\"font-weight: 400;\">), requiring immediate attention. Add these Adobe updates to your &#8220;Patch Now&#8221; schedule.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3669897\/patch-tuesday-update-addresses-123-vulnerabilities-two-critical-zero-days.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Sat, 13 Aug 2022 04:58:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Microsoft&#8217;s August Patch Tuesday release addresses 123 security issues in Microsoft Windows, Office, Exchange (it&#8217;s back!) and Visual Studio \u2014 and unfortunately, we have two zero-days with reports of active exploitation in the wild. Since this is\u00a0a broad update, it will require planning and testing before deployment. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-34713\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-34713<\/span><\/a><span style=\"font-weight: 400;\">) occurs in the Windows diagnostic tools and the second (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-30134\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-30134<\/a>) affects Microsoft Exchange<\/span><span style=\"font-weight: 400;\">. Basically, the holidays are over and it&#8217;s time to pay attention to Microsoft updates again. We have made &#8220;Patch Now&#8221; recommendations for Windows, Exchange and Adobe for this month.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3669897\/patch-tuesday-update-addresses-123-vulnerabilities-two-critical-zero-days.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,24580,10525],"class_list":["post-19848","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19848"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19848\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19848"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}