{"id":22691,"date":"2023-08-11T12:30:36","date_gmt":"2023-08-11T20:30:36","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/08\/11\/news-16421\/"},"modified":"2023-08-11T12:30:36","modified_gmt":"2023-08-11T20:30:36","slug":"news-16421","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/08\/11\/news-16421\/","title":{"rendered":"Patch Tuesday: Microsoft rolls out 90 updates for Windows, Office"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-small.jpg\"\/><\/p>\n<p><span style=\"font-weight: 400;\">With its August Patch Tuesday release, Microsoft pushed out 90 updates for the Windows and Office platforms. The latest fixes include \u00a0another update for Microsoft Exchange (along with with a warning about failed updates to Exchange Server 2016 and 2019) and a &#8220;Patch Now&#8221; recommendation from us for Office. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The team at\u00a0<\/span><a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">Application<\/span>\u00a0<span style=\"font-weight: 400;\">Readiness<\/span><\/a><span style=\"font-weight: 400;\"> has crafted\u00a0<\/span><a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-august-2023\/\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">this useful<\/span>\u00a0<span style=\"font-weight: 400;\">infographic<\/span><\/a><span style=\"font-weight: 400;\">\u00a0outlining the risks associated with each of the updates for this month.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues affecting the latest update cycle. For August, they include:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately for those still using<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/august-8-2023-kb5029296-monthly-rollup-141f03b9-1e2c-412c-900f-51586fbaf9ee\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">Windows Server 2008 ESU<\/span><\/a><span style=\"font-weight: 400;\">, this month&#8217;s update might fail completely with the message, &#8220;Failure to configure Windows updates. Reverting Changes. Do not turn off your computer.&#8221; Microsoft offers some\u00a0<\/span><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/obtaining-extended-security-updates-for-eligible-windows-devices\/ba-p\/1167091\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">advice on<\/span>\u00a0<span style=\"font-weight: 400;\">ESU updates<\/span><\/a><span style=\"font-weight: 400;\">, but you might find you have to wait a little while before you&#8217;re able to successfully update legacy Exchange servers. Sorry about that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has published these major revisions covering:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft published the following vulnerability-related mitigations for this release cycle:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, the<\/span>\u00a0<span style=\"font-weight: 400;\">Readiness team<\/span><span style=\"font-weight: 400;\"> analyzes the latest Patch Tuesday updates and provides detailed, actionable testing guidance. This guidance is based on assessing a large application portfolio and a detailed analysis of the patches and their potential impact on the Windows platforms and app installations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the significant number of changes included this month, I&#8217;ve broken down the testing scenarios into high-risk and standard-risk groups:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As all the high-risk changes affect the Microsoft Windows core kernel and internal messaging subsystem (though we have not seen any published functionality changes), we strongly recommend the following focused testing:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And here&#8217;s one for Windows focused IT administrators: Microsoft has updated the<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/winsat\/windows-system-assessment-tool-portal\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">WinSAT<\/span><\/a><span style=\"font-weight: 400;\"> API. This tool is described by Microsoft:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">&#8220;<\/span><\/i><i><span style=\"font-weight: 400;\">The Windows System Assessment Tool (WinSAT) exposes a number of classes that assess the performance characteristics and capabilities of a computer. Developers can use this API to develop software that can access the performance and capability information of a computer to determine the optimal application settings based on that computer&#8217;s performance capabilities.&#8221;<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">All these scenarios will require significant application-level testing before general deployment. In addition to these specific testing requirements, we suggest a general test of the following printing features:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automated testing will help with these scenarios (especially a testing platform that offers a &#8220;delta&#8221; or comparison between builds). However, for your line-of-business applications, getting the app owner (doing<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Acceptance_testing\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">UAT<\/span><\/a><span style=\"font-weight: 400;\">) to test and approve the results is absolutely essential.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Continuing a welcome trend, Microsoft released 11 updates to its Chromium browser projects (Edge) and no patches to its legacy browsers. You can read more about Microsoft Edge release notes<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">, noting that Chrome\/Edge updates were released on Monday (Aug. 7) not the usual &#8220;Patch Tuesday.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Add these browser updates to your standard patch release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released three critical updates, 32 rated as important and one rated as moderate. All (three) of the critical updates to the Windows platform relate to the Windows Message Queuing (<\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/desktop\/msmq\/ms711472(v=vs.85)\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">MSMQ<\/span><\/a><span style=\"font-weight: 400;\">). Though these critical updates have a rating of 9.8 (that&#8217;s pretty high), they have not been publicly disclosed or reported as exploited. Not every organization will make use of the MSMQ feature, so for most teams, the testing profile should be pretty light. Add these Windows updates to your standard release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has released three critical updates to Microsoft Outlook (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36895\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2023-36895<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29330\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2023-29330<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-29328\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2023-29328<\/span><\/a><span style=\"font-weight: 400;\">) that require immediate attention. In addition to these patches, Microsoft has released 11 updates rated as important and one rated as moderate. These 12 updates affect Microsoft Office in general and Visio. Add these Office updates to your &#8220;Patch Now&#8221; release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before you do anything, don&#8217;t update your non-English Microsoft Exchange Servers (2019 and 2016). This month&#8217;s update will fail mid-way through and leave your server in an &#8220;<\/span><a href=\"https:\/\/support.microsoft.com\/help\/5030558\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">undetermined state<\/span><\/a>.<span style=\"font-weight: 400;\">&#8221; Now that this has (not) been done, you can attend to the six Exchange updates (all rated as important) for this month. No critical updates showed up, so take your time. Note: all these August patches will require a server reboot. Add these updates to your standard release schedule.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has released eight updates to the Microsoft .NET and<\/span> <span style=\"font-weight: 400;\">ASP.NET<\/span><span style=\"font-weight: 400;\"> platforms this month. These patches were rated as important and should be included in your standard developer release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adobe is back. And we have another &#8220;A&#8221; to worry about (kinda weird, huh?).<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb23-30.html\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">APSB23-30<\/span><\/a><span style=\"font-weight: 400;\"> from Adobe patches a critical vulnerability in Adobe Reader \u2014 add it to your &#8220;Patch Now&#8221; schedule. And the other &#8220;A&#8221;? Following the recent trend of supporting third-party patches in the Microsoft update release cycle (remember the Autodesk<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27910\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">update<\/span><\/a><span style=\"font-weight: 400;\"> in June?),<\/span><span style=\"font-weight: 400;\"> Microsoft has released<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-20569\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2023-20569<\/span><\/a>; it<span style=\"font-weight: 400;\">\u00a0is related to an AMD memory-related vulnerability. You can read more about this on the AMD site<\/span><a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7005.html\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0<span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Patching? Sure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Testing? Not sure.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3704493\/patch-tuesday-microsoft-rolls-out-90-updates-for-windows-office.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/conceptual_representation_of_technical_support_fixes_service_maintenance_updates_digital_sign_wrench_screwdriver_branching_circuits_throughout_system_by_traitov_gettyimages-1199145131_cw_2400x1600-100853239-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">With its August Patch Tuesday release, Microsoft pushed out 90 updates for the Windows and Office platforms. The latest fixes include \u00a0another update for Microsoft Exchange (along with with a warning about failed updates to Exchange Server 2016 and 2019) and a &#8220;Patch Now&#8221; recommendation from us for Office. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The team at\u00a0<\/span><a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">Application<\/span>\u00a0<span style=\"font-weight: 400;\">Readiness<\/span><\/a><span style=\"font-weight: 400;\"> has crafted\u00a0<\/span><a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-august-2023\/\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">this useful<\/span>\u00a0<span style=\"font-weight: 400;\">infographic<\/span><\/a><span style=\"font-weight: 400;\">\u00a0outlining the risks associated with each of the updates for this month.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3704493\/patch-tuesday-microsoft-rolls-out-90-updates-for-windows-office.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-22691","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22691"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22691\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22691"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}