{"id":23101,"date":"2023-10-10T16:17:13","date_gmt":"2023-10-11T00:17:13","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/10\/news-16831\/"},"modified":"2023-10-10T16:17:13","modified_gmt":"2023-10-11T00:17:13","slug":"news-16831","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/10\/news-16831\/","title":{"rendered":"Patch Tuesday, October 2023 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 10 Oct 2023 22:51:31 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today issued security updates for more than 100 newly-discovered vulnerabilities in its <strong>Windows<\/strong> operating system and related software, including four flaws that are already being exploited. In addition, <strong>Apple<\/strong> recently released emergency updates to quash a pair of zero-day bugs in <strong>iOS<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-52647\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2020\/08\/windowsec.png\" alt=\"\" width=\"751\" height=\"551\" \/><\/p>\n<p>Apple last week shipped <a href=\"https:\/\/support.apple.com\/en-us\/HT213961\" target=\"_blank\" rel=\"noopener\">emergency updates<\/a> in <strong>iOS 17.0.3<\/strong> and <strong>iPadOS 17.0.3<\/strong> in response to active attacks. The patch fixes <strong>CVE-2023-42724<\/strong>, which attackers have been using in targeted attacks to elevate their access on a local device.<\/p>\n<p>Apple said it also patched <strong>CVE-2023-5217<\/strong>, which is not listed as a zero-day bug. However, as <em>Bleeping Computer<\/em> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-emergency-update-fixes-new-zero-day-used-to-hack-iphones\/\" target=\"_blank\" rel=\"noopener\">pointed out<\/a>, this flaw is caused by a weakness in the open-source &#8220;<strong>libvpx<\/strong>&#8221; video codec library, which was previously patched as a zero-day flaw by <strong>Google<\/strong> in the Chrome browser and by Microsoft in <strong>Edge<\/strong>, <strong>Teams<\/strong>, and <strong>Skype<\/strong> products. For anyone keeping count, this is <em>the 17th zero-day flaw that Apple has patched so far this year.<\/em><\/p>\n<p>Fortunately, the zero-days affecting Microsoft customers this month are somewhat less severe than usual, with the exception of <strong>CVE-2023-44487<\/strong>. This weakness is not specific to Windows but instead exists within the <a href=\"https:\/\/httpwg.org\/specs\/rfc7540.html\" target=\"_blank\" rel=\"noopener\">HTTP\/2 protocol<\/a> used by the World Wide Web: Attackers have figured out how to use a feature of HTTP\/2 to massively increase the size of distributed denial-of-service (DDoS) attacks, and these monster attacks reportedly have been going on for several weeks now.<\/p>\n<p><a href=\"https:\/\/aws.amazon.com\/blogs\/security\/how-aws-protects-customers-from-ddos-events\/\" target=\"_blank\" rel=\"noopener\">Amazon<\/a>, <a href=\"https:\/\/www.cloudflare.com\/press-releases\/2023\/cloudflare-helps-discover-new-online-threat-that-led-to-largest-attack-in\/\" target=\"_blank\" rel=\"noopener\">Cloudflare<\/a> and <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/how-it-works-the-novel-http2-rapid-reset-ddos-attack\" target=\"_blank\" rel=\"noopener\">Google<\/a> all released advisories today about how they&#8217;re addressing CVE-2023-44487 in their cloud environments. Google&#8217;s <strong>Damian Menscher<\/strong> <a href=\"https:\/\/twitter.com\/menscher\/status\/1711715943385325958\" target=\"_blank\" rel=\"noopener\">wrote on Twitter\/X<\/a> that the exploit &#8212; dubbed a &#8220;<strong>rapid reset attack<\/strong>&#8221; &#8212; works by sending a request and then immediately cancelling it (a feature of HTTP\/2). &#8220;This lets attackers skip waiting for responses, resulting in a more efficient attack,&#8221; Menscher explained.<\/p>\n<p><strong>Natalie Silva<\/strong>, lead security engineer at <strong>Immersive Labs<\/strong>, said this flaw&#8217;s impact to enterprise customers could be significant, and lead to prolonged downtime.<\/p>\n<p>&#8220;It is crucial for organizations to apply the latest patches and updates from their web server vendors to mitigate this vulnerability and protect against such attacks,&#8221; Silva said. In this month\u2019s Patch Tuesday release by Microsoft, they have released both an update to this vulnerability, as well as a temporary workaround should you not be able to patch immediately.&#8221;<span id=\"more-65298\"><\/span><\/p>\n<p>Microsoft also patched zero-day bugs in <strong>Skype for Business<\/strong> (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-41763\" target=\"_blank\" rel=\"noopener\">CVE-2023-41763<\/a>) and <strong>Wordpad<\/strong> (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36563\" target=\"_blank\" rel=\"noopener\">CVE-2023-36563<\/a>). The latter vulnerability could expose <a href=\"https:\/\/www.ired.team\/offensive-security\/initial-access\/netntlmv2-hash-stealing-using-outlook\" target=\"_blank\" rel=\"noopener\">NTLM hashes<\/a>, which are used for authentication in Windows environments.<\/p>\n<p>&#8220;It may or may not be a coincidence that Microsoft announced last month that WordPad is no longer being updated, and will be removed in a future version of Windows, although no specific timeline has yet been given,&#8221; said <strong>Adam Barnett<\/strong>, lead software engineer at <strong>Rapid7<\/strong>. &#8220;Unsurprisingly, Microsoft recommends Word as a replacement for WordPad.&#8221;<\/p>\n<p>Other notable bugs addressed by Microsoft include <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-35349\" target=\"_blank\" rel=\"noopener\">CVE-2023-35349<\/a>, a remote code execution weakness in the <strong>Message Queuing<\/strong> (MSMQ) service, a technology that allows applications across multiple servers or hosts to communicate with each other. This vulnerability has earned a <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_blank\" rel=\"noopener\">CVSS severity score<\/a> of 9.8 (10 is the worst possible). Happily, the MSMQ service is not enabled by default in Windows, although Immersive Labs notes that <strong>Microsoft Exchange Server<\/strong> can enable this service during installation.<\/p>\n<p>Speaking of Exchange, Microsoft also patched <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2023-36778\" target=\"_blank\" rel=\"noopener\">CVE-2023-36778<\/a>,\u00a0 a vulnerability in all current versions of Exchange Server that could allow attackers to run code of their choosing. Rapid7&#8217;s Barnett said successful exploitation requires that the attacker be on the same network as the Exchange Server host, and use valid credentials for an Exchange user in a PowerShell session.<\/p>\n<p>For a more detailed breakdown on the updates released today, see the <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/October%202023%20Microsoft%20Patch%20Tuesday%20Summary\/30300\/\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center roundup<\/a>. If today\u2019s updates cause any stability or usability issues in Windows,\u00a0<a href=\"https:\/\/www.askwoody.com\/2023\/october-updates-here-comes-copilot\/\" target=\"_blank\" rel=\"noopener\">AskWoody.com<\/a>\u00a0will likely have the lowdown on that.<\/p>\n<p>Please consider backing up your data and\/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any difficulties as a result of these patches.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/10\/patch-tuesday-october-2023-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2020\/08\/windowsec.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 10 Oct 2023 22:51:31 +0000<\/strong><\/p>\n<p>Microsoft today issued security updates for more than 100 newly-discovered vulnerabilities in its Windows operating system and related software, including four flaws that are already being exploited. In addition, Apple recently released emergency updates to quash a pair of zero-day bugs in iOS.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[29353,5588,2211,11458,30296,30297,30298,30299,30300,11204,1670,24626,30301,30302,30303,10516,30304,30305,30306,15086,17220,30307,16936,10525,11994],"class_list":["post-23101","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adam-barnett","tag-amazon","tag-apple","tag-cloudflare","tag-cve-2023-35349","tag-cve-2023-36563","tag-cve-2023-36778","tag-cve-2023-41763","tag-cve-2023-44487","tag-damian-menscher","tag-google","tag-immersive-labs","tag-ios-17-0-3","tag-ipados-17-0-3","tag-libvpx","tag-microsoft","tag-natalie-silva","tag-patch-tuesday-october-2023","tag-rapid-reset-attack","tag-rapid7","tag-security-tools","tag-skype-for-business","tag-time-to-patch","tag-windows","tag-wordpad"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23101"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23101\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23101"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}