{"id":23110,"date":"2023-10-11T13:20:55","date_gmt":"2023-10-11T21:20:55","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/10\/11\/news-16840\/"},"modified":"2023-10-11T13:20:55","modified_gmt":"2023-10-11T21:20:55","slug":"news-16840","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/11\/news-16840\/","title":{"rendered":"Patch Tuesday harvests a bumper crop in October"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Wed, 11 Oct 2023 18:06:24 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Microsoft on Tuesday released patches for 104 vulnerabilities, including 80 for Windows. Ten other product groups are also affected. Of the 104 CVEs addressed, 11 are considered Critical in severity; ten of those are in Windows, while one falls in the Microsoft Common Data Model SDK. (The <a href=\"https:\/\/learn.microsoft.com\/en-us\/common-data-model\/\">Common Data Model<\/a> is a metadata system for business-related data.) One CVE, an Important-severity denial-of-service issue (CVE-2023-38171), affects not only Windows but both .NET and Visual Studio.<\/p>\n<p>At patch time, two issues involving WordPad and Skype are known to be under exploit in the wild. An additional 10 vulnerabilities in Windows, Exchange, and Skype are by the company\u2019s estimation more likely to be exploited in the next 30 days. For ease of prioritization, those 12 issues are:<\/p>\n<p>&nbsp;<\/p>\n<p>One of the most fascinating items in this month\u2019s release isn\u2019t even a patch \u2013 though to be fair, it\u2019s not an issue that can be \u201cpatched\u201d in the usual sense, for Microsoft products or many others. CVE-2023-44487, an Important-severity denial of service issue, describes a rapid-reset attack against HTTP\/2, currently under extremely active exploit in the wild. It carries a MITRE-assigned CVE number (a rarity; usually Microsoft assigns its own CVEs numbers) and, according to Microsoft\u2019s finder-acknowledgement system, is \u201ccredited\u201d to Google, Amazon, and Cloudflare. The list of affected product families is long: .NET, ASP.NET, Visual Studio, and various iterations of Windows. \u00a0Microsoft has published <a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/10\/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http\/2\/\">an article<\/a> on the matter. It\u2019s not included in the patch tallies in this post, though the article states that the company is releasing mitigations \u2013 not patches, mitigation &#8212; for IIS, .NET, and Windows. \u00a0There\u2019s a recommended workaround, though \u2013 going into RegEdit and disabling the HTTP\/2 protocol on your web server.<\/p>\n<p>Beyond Patch Tuesday, the keepers of curl (the open-source command-line tool) also had a significant patch on tap for Wednesday, 11 October. According to the advisory <a href=\"https:\/\/github.com\/curl\/curl\/discussions\/12026\">posted to GitHub<\/a>, CVE-2023-38545 and CVE-2023-38546 both describe issues in libcurl, with CVE-2023-38545, a heap-overflow issue, also touching curl itself. These are serious business; according to Daniel Stenberg, the maintainer who wrote the GitHub advisory, \u201c[CVE-2023-38545] is probably the worst curl security flaw in a long time.\u201d Since curl lies at the heart of such popular protocols as SSL, TLS, HTTP, and FTP, system administrators are advised in the strongest possible terms to familiarize themselves with <a href=\"https:\/\/daniel.haxx.se\/blog\/2023\/10\/11\/curl-8-4-0\/\">the new curl 8.4.0 release<\/a>, which addresses this issue.<\/p>\n<p>October is also a big month for goodbyes. The tables in Appendix E at the end of this article list the Microsoft products reaching <a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/policies\/fixed\">end-of-servicing<\/a> (covered under the Modern Policy) and <a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/end-of-support\/end-of-support-2023\">end of support<\/a> (covered under the Fixed Policy) today, as well as those moving from Mainstream to Extended support. Extended support includes free security updates, but no more new features or design changes. The list of products affected is long and exciting \u2013 in particular, Office 2019 no longer taking feature updates is a milestone \u2013 but the headline act on this month\u2019s cruise into the sunset is surely Server 2012 and Server 2012R2. As a going-away present, that venerable version of the platform receives 65 patches, 11 of them critical-severity, one under active exploit in the wild.<\/p>\n<p>We are as usual including at the end of this post three appendices listing all Microsoft\u2019s patches, sorted by severity, by predicted exploitability, and by product family. As per Microsoft\u2019s guidance we\u2019ll treat the Chromium patch as information-only and not include it in the following charts and totals, though we\u2019ve added a chart at the end of the post providing basic information on that. (CVE-2023-44487, discussed above, also applies to Chromium; this is also noted in the appendix.)<\/p>\n<ul>\n<li>Total Microsoft CVEs: 2<\/li>\n<li>Total advisories shipping in update: 2<\/li>\n<li>Publicly disclosed: 2<\/li>\n<li>Exploited: 2<\/li>\n<li>Severity\n<ul>\n<li>Critical: 13<\/li>\n<li>Important: 91<\/li>\n<\/ul>\n<\/li>\n<li>Impact\n<ul>\n<li>Remote Code Execution: 45<\/li>\n<li>Elevation of Privilege: 26<\/li>\n<li>Denial of Service: 16<\/li>\n<li>Information Disclosure: 12<\/li>\n<li>Security Feature Bypass: 4<\/li>\n<li>Spoofing: 1<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-951662\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-01.png\" alt=\"A bar chart showing distribution of October 2023 Patch Tuesday releases by severity and impact\" width=\"640\" height=\"416\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-01.png 839w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-01.png?resize=300,195 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-01.png?resize=768,499 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: October is a heavy patch month with a little bit of everything<\/em><\/p>\n<p><strong>Products<\/strong><\/p>\n<ul>\n<li>Windows: 80 (including one shared with .NET and Visual Studio)<\/li>\n<li>Azure: 6<\/li>\n<li>SQL: 5<\/li>\n<li>Skype: 4<\/li>\n<li>Dynamics 365: 3<\/li>\n<li>Office: 3<\/li>\n<li>.NET: 1 (shared with Visual Studio and Windows)<\/li>\n<li>Exchange: 1<\/li>\n<li>Microsoft Common Data Model SDK: 1<\/li>\n<li>MMPC: 1<\/li>\n<li>Visual Studio: 1 (shared with .NET and Windows)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-951663\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-02.png\" alt=\"A bar chart showing October 2023 Patch Tuesday releases by product family and severity\" width=\"640\" height=\"449\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-02.png 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-02.png?resize=300,211 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 2: Products affected by October\u2019s patches. For items that apply to more than one product family (e.g., the patch shared by Windows, Visual Studio, and .NET), the chart represents those patches in each family to which they apply, making the workload look slightly heavier than it will be in practice<\/em><\/p>\n<p><strong>Notable October updates<\/strong><\/p>\n<p>In addition to the high-priority issues discussed above, a few interesting items present themselves.<\/p>\n<p><strong>9 CVEs &#8212; Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<br \/> 5 CVEs &#8212; Win32k Elevation of Privilege Vulnerability<\/strong><\/p>\n<p>Identically named CVEs are hardly unusual in these releases; this month also has identically named sets of 16 (Microsoft Message Queuing Remote Code Execution Vulnerability), 4 (Microsoft Message Queuing Denial of Service Vulnerability), and 3 (too many to list) CVEs. However, the 9 RCEs touching Windows\u2019 Layer 2 tunnelling protocol also share Critical-severity status (CVSS 3.1 base is 8.1) and are thus worth looking at sooner rather than later. Fortunately, Microsoft does not believe any of them to be more likely to be exploited in the next 30 days. The 5 EoP issues touching Win32K, on the other hand, are all considered <em>more<\/em> likely to see exploitation in the next 30 days.<\/p>\n<p><strong>CVE-2023-36563 &#8212; Microsoft WordPad Information Disclosure Vulnerability<\/strong><\/p>\n<p>This is as mentioned one of the two vulnerabilities under active exploit in the wild; Microsoft states that Preview Pane is a vector.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-951664\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-03.png\" alt=\"A bar chart showing cumulative Patch Tuesday totals for 2023; in descending order, RCE, EoP, info disclosure, DoS, spoofing, security feature bypass, tampering\" width=\"640\" height=\"413\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-03.png 837w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-03.png?resize=300,194 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/figure-03.png?resize=768,495 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 3: With two months to go in 2023, Microsoft has issued exactly 300 patches against remote code execution issue, the most of any category of vulnerability this year<\/em><\/p>\n<p><strong>Sophos protections<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"151\"><strong>CVE<\/strong><\/td>\n<td width=\"265\"><strong>Sophos Intercept X\/Endpoint IPS<\/strong><\/td>\n<td width=\"186\"><strong>Sophos XGS Firewall<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-36594<\/td>\n<td width=\"265\">Exp\/2336594-A<\/td>\n<td width=\"186\">Exp\/2336594-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-36713<\/td>\n<td width=\"265\">Exp\/2336713-A<\/td>\n<td width=\"186\">Exp\/2336713-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-36731<\/td>\n<td width=\"265\">Exp\/2336731-A<\/td>\n<td width=\"186\">Exp\/2336731-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-36743<\/td>\n<td width=\"265\">Exp\/2336743-A<\/td>\n<td width=\"186\">Exp\/2336743-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-36776<\/td>\n<td width=\"265\">Exp\/2336776-A<\/td>\n<td width=\"186\">Exp\/2336776-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-38159<\/td>\n<td width=\"265\">Exp\/2338159-A<\/td>\n<td width=\"186\">Exp\/2338159-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2023-41772<\/td>\n<td width=\"265\">Exp\/2341772-A<\/td>\n<td width=\"186\">Exp\/2341772-A<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>As you can every month, if you don\u2019t want to wait for your system to pull down Microsoft\u2019s updates itself, you can download them manually from the Windows Update Catalog website. Run the <strong>winver.exe <\/strong>tool to determine which build of Windows 10 or 11 you\u2019re running, then download the Cumulative Update package for your specific system\u2019s architecture and build number.<\/p>\n<p>With regard to CVE-2023-44487, the best option for thwarting the denial-of-service attack enabled by the vulnerability is to follow Microsoft\u2019s <a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/10\/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http\/2\/\">published advice<\/a>.<\/p>\n<p><strong>Appendix A: Vulnerability Impact and Severity<\/strong><\/p>\n<p>This is a list of October\u2019s patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.<\/p>\n<p><strong>Remote Code Execution (45 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-35349<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36697<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36718<\/td>\n<td width=\"469\">Windows Virtual Trusted Platform Module Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38166<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41765<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41767<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41768<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41769<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41770<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41771<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41773<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41774<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36414<\/td>\n<td width=\"469\">Azure Identity SDK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36415<\/td>\n<td width=\"469\">Azure Identity SDK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36417<\/td>\n<td width=\"469\">Microsoft SQL OLE DB Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36418<\/td>\n<td width=\"469\">Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36420<\/td>\n<td width=\"469\">Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36436<\/td>\n<td width=\"469\">Windows MSHTML Platform Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36557<\/td>\n<td width=\"469\">PrintHTML API Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36570<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36571<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36572<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36573<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36574<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36575<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36577<\/td>\n<td width=\"469\">Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36578<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36582<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36583<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36589<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36590<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36591<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36592<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36593<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36598<\/td>\n<td width=\"469\">Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36702<\/td>\n<td width=\"469\">Microsoft DirectMusic Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36704<\/td>\n<td width=\"469\">Windows Setup Files Cleanup Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36710<\/td>\n<td width=\"469\">Windows Media Foundation Core Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36730<\/td>\n<td width=\"469\">Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36778<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36780<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36785<\/td>\n<td width=\"469\">Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36786<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36789<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36902<\/td>\n<td width=\"469\">Windows Runtime Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Elevation of Privilege (26 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36419<\/td>\n<td width=\"469\">Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36434<\/td>\n<td width=\"469\">Windows IIS Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36561<\/td>\n<td width=\"469\">Azure DevOps Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36565<\/td>\n<td width=\"469\">Microsoft Office Graphics Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36568<\/td>\n<td width=\"469\">Microsoft Office Click-To-Run Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36569<\/td>\n<td width=\"469\">Microsoft Office Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36594<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36605<\/td>\n<td width=\"469\">Windows Named Pipe Filesystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36701<\/td>\n<td width=\"469\">Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36711<\/td>\n<td width=\"469\">Windows Runtime C++ Template Library Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36712<\/td>\n<td width=\"469\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36721<\/td>\n<td width=\"469\">Windows Error Reporting Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36723<\/td>\n<td width=\"469\">Windows Container Manager Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36725<\/td>\n<td width=\"469\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36726<\/td>\n<td width=\"469\">Windows Internet Key Exchange (IKE) Extension Elevation of Privilege\u00a0 Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36729<\/td>\n<td width=\"469\">Named Pipe File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36731<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36732<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36737<\/td>\n<td width=\"469\">Azure Network Watcher VM Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36743<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36776<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36790<\/td>\n<td width=\"469\">Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38159<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41763<\/td>\n<td width=\"469\">Skype for Business Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41766<\/td>\n<td width=\"469\">Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41772<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Denial of Service (16 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36566<\/td>\n<td width=\"469\">Microsoft Common Data Model SDK Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36431<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36435<\/td>\n<td width=\"469\">Microsoft QUIC Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36579<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36581<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36585<\/td>\n<td width=\"469\">Active Template Library Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36602<\/td>\n<td width=\"469\">Windows TCP\/IP Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36603<\/td>\n<td width=\"469\">Windows TCP\/IP Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36606<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36703<\/td>\n<td width=\"469\">DHCP Server Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36707<\/td>\n<td width=\"469\">Windows Deployment Services Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36709<\/td>\n<td width=\"469\">Microsoft AllJoyn API Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36717<\/td>\n<td width=\"469\">Windows Virtual Trusted Platform Module Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36720<\/td>\n<td width=\"469\">Windows Mixed Reality Developer Tools Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36728<\/td>\n<td width=\"469\">Microsoft SQL Server Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38171<\/td>\n<td width=\"469\">Microsoft QUIC Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Information Disclosure (12 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29348<\/td>\n<td width=\"469\">Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36429<\/td>\n<td width=\"469\">Microsoft Dynamics 365 Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36433<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36438<\/td>\n<td width=\"469\">Windows TCP\/IP Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36563<\/td>\n<td width=\"469\">Microsoft WordPad Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36567<\/td>\n<td width=\"469\">Windows Deployment Services Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36576<\/td>\n<td width=\"469\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36596<\/td>\n<td width=\"469\">Remote Procedure Call Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36706<\/td>\n<td width=\"469\">Windows Deployment Services Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36713<\/td>\n<td width=\"469\">Windows Common Log File System Driver Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36722<\/td>\n<td width=\"469\">Active Directory Domain Services Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36724<\/td>\n<td width=\"469\">Windows Power Management Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> <\/strong><strong>Security Feature Bypass (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36564<\/td>\n<td width=\"469\">Windows Search Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36584<\/td>\n<td width=\"469\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36698<\/td>\n<td width=\"469\">Windows Kernel Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36700<\/td>\n<td width=\"469\">Microsoft Defender Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Spoofing (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36416<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Appendix B: Exploitability<\/strong><\/p>\n<p>This is a list of the October CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release, as well as those already known to be under exploit. Each list is further arranged by CVE.<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Exploitation detected <\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36563<\/td>\n<td width=\"469\">Microsoft WordPad Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41763<\/td>\n<td width=\"469\">Skype for Business Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Exploitation more likely<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36594<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36713<\/td>\n<td width=\"469\">Windows Common Log File System Driver Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36731<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36732<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36743<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36776<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36778<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36780<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38159<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41772<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><strong>Appendix C: Products Affected<\/strong><\/p>\n<p>This is a list of October\u2019s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE.<\/p>\n<p><strong>Windows (80 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-35349<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36697<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36718<\/td>\n<td width=\"469\">Windows Virtual Trusted Platform Module Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38166<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41765<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41767<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41768<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41769<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41770<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41771<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41773<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41774<\/td>\n<td width=\"469\">Layer 2 Tunneling Protocol Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-29348<\/td>\n<td width=\"469\">Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36431<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36434<\/td>\n<td width=\"469\">Windows IIS Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36435<\/td>\n<td width=\"469\">Microsoft QUIC Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36436<\/td>\n<td width=\"469\">Windows MSHTML Platform Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36438<\/td>\n<td width=\"469\">Windows TCP\/IP Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36557<\/td>\n<td width=\"469\">PrintHTML API Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36563<\/td>\n<td width=\"469\">Microsoft WordPad Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36564<\/td>\n<td width=\"469\">Windows Search Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36567<\/td>\n<td width=\"469\">Windows Deployment Services Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36570<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36571<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36572<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36573<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36574<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36575<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36576<\/td>\n<td width=\"469\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36577<\/td>\n<td width=\"469\">Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36578<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36579<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36581<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36582<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36583<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36584<\/td>\n<td width=\"469\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36585<\/td>\n<td width=\"469\">Active Template Library Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36589<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36590<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36591<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36592<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36593<\/td>\n<td width=\"469\">Microsoft Message Queuing Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36594<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36596<\/td>\n<td width=\"469\">Remote Procedure Call Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36598<\/td>\n<td width=\"469\">Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36602<\/td>\n<td width=\"469\">Windows TCP\/IP Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36603<\/td>\n<td width=\"469\">Windows TCP\/IP Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36605<\/td>\n<td width=\"469\">Windows Named Pipe Filesystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36606<\/td>\n<td width=\"469\">Microsoft Message Queuing Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36698<\/td>\n<td width=\"469\">Windows Kernel Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36701<\/td>\n<td width=\"469\">Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36702<\/td>\n<td width=\"469\">Microsoft DirectMusic Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36703<\/td>\n<td width=\"469\">DHCP Server Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36704<\/td>\n<td width=\"469\">Windows Setup Files Cleanup Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36706<\/td>\n<td width=\"469\">Windows Deployment Services Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36707<\/td>\n<td width=\"469\">Windows Deployment Services Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36709<\/td>\n<td width=\"469\">Microsoft AllJoyn API Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36710<\/td>\n<td width=\"469\">Windows Media Foundation Core Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36711<\/td>\n<td width=\"469\">Windows Runtime C++ Template Library Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36712<\/td>\n<td width=\"469\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36713<\/td>\n<td width=\"469\">Windows Common Log File System Driver Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36717<\/td>\n<td width=\"469\">Windows Virtual Trusted Platform Module Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36720<\/td>\n<td width=\"469\">Windows Mixed Reality Developer Tools Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36721<\/td>\n<td width=\"469\">Windows Error Reporting Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36722<\/td>\n<td width=\"469\">Active Directory Domain Services Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36723<\/td>\n<td width=\"469\">Windows Container Manager Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36724<\/td>\n<td width=\"469\">Windows Power Management Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36725<\/td>\n<td width=\"469\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36726<\/td>\n<td width=\"469\">Windows Internet Key Exchange (IKE) Extension Elevation of Privilege\u00a0 Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36729<\/td>\n<td width=\"469\">Named Pipe File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36731<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36732<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36743<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36776<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36790<\/td>\n<td width=\"469\">Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36902<\/td>\n<td width=\"469\">Windows Runtime Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38159<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38171<\/td>\n<td width=\"469\">Microsoft QUIC Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41766<\/td>\n<td width=\"469\">Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41772<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Azure (6 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36414<\/td>\n<td width=\"469\">Azure Identity SDK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36415<\/td>\n<td width=\"469\">Azure Identity SDK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36418<\/td>\n<td width=\"469\">Azure RTOS GUIX Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36419<\/td>\n<td width=\"469\">Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36561<\/td>\n<td width=\"469\">Azure DevOps Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36737<\/td>\n<td width=\"469\">Azure Network Watcher VM Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> SQL (5 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36417<\/td>\n<td width=\"469\">Microsoft SQL OLE DB Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36420<\/td>\n<td width=\"469\">Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36728<\/td>\n<td width=\"469\">Microsoft SQL Server Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36730<\/td>\n<td width=\"469\">Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36785<\/td>\n<td width=\"469\">Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Skype (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36780<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36786<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36789<\/td>\n<td width=\"469\">Skype for Business Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-41763<\/td>\n<td width=\"469\">Skype for Business Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Dynamics 365 (3 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36416<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36429<\/td>\n<td width=\"469\">Microsoft Dynamics 365 Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36433<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Office (3 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36565<\/td>\n<td width=\"469\">Microsoft Office Graphics Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36568<\/td>\n<td width=\"469\">Microsoft Office Click-To-Run Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36569<\/td>\n<td width=\"469\">Microsoft Office Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> .NET (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38171<\/td>\n<td width=\"469\">Microsoft QUIC Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Exchange (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36778<\/td>\n<td width=\"469\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Microsoft Common Data Model SDK (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36566<\/td>\n<td width=\"469\">Microsoft Common Data Model SDK Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> MMPC (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-36700<\/td>\n<td width=\"469\">Microsoft Defender Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/> Visual Studio (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2023-38171<\/td>\n<td width=\"469\">Microsoft QUIC Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Appendix D: Other Products<\/strong><\/p>\n<p>This is a list of advisories in the October Microsoft release, sorted by product group.<\/p>\n<p><strong>Chromium \/ Edge (1 issue)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"132\">CVE-2023-5346<\/td>\n<td width=\"469\">Chromium: CVE-2023-5346 Type Confusion in V8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The CVE-2023-44487 covered extensively above also applies to Chromium \/ Edge.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><strong>Appendix E: End of Servicing, End of Support, and other changes<\/strong><\/p>\n<p>These three tables cover Microsoft products changing status on 10 October 2023.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"601\"><strong>End of Servicing (2 products)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Dynamics 365 Business Central on-premises (Modern Policy), 2022 release wave 1, version 20.x<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows 11 Home and Pro, Version 21H2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"601\"><strong>End of Support (21 products)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Excel 2019 for Mac<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Hyper-V Server 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Hyper-V Server 2012 R2<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Internet Explorer 7<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Internet Information Services (IIS), IIS 8 on Windows Server 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Internet Information Services (IIS), IIS 8.5 on Windows Server 2012 R2<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Microsoft Office 2019 for Mac<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Microsoft Office Audit and Control Management Server 2013<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Outlook 2019 for Mac<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">PowerPoint 2019 for Mac<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Embedded Compact 2013<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Embedded POSReady 7, Extended Security Update Year 2*<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Embedded Standard 7, Extended Security Update Year 3*<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows MultiPoint Server 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Server 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Server 2012 R2<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Server Update Services for Windows Server 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Server Update Services for Windows Server 2012 R2<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Storage Server 2012<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Windows Storage Server 2012 R2<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Word 2019 for Mac<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"601\"><strong>Moving from Mainstream to Extended Support (11 products)<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Access 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Dynamics 365 Business Central on-premises (Fixed Policy)<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Excel 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Microsoft Office 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">OneNote 2016<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Outlook 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">PowerPoint 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Project 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Publisher 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Visio 2019<\/td>\n<\/tr>\n<tr>\n<td width=\"601\">Word 2019<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/10\/11\/patch-tuesday-harvests-a-bumper-crop-in-october\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/10\/2310-hero-image.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Wed, 11 Oct 2023 18:06:24 +0000<\/strong><\/p>\n<p>Two significant vulnerabilities \u2013 both extending far beyond Microsoft \u2013 make this a crucial month for admins to stay on their game<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[29703,30310,30300,129,30311,10516,19245,16771],"class_list":["post-23110","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-curl","tag-cve-2023-38545","tag-cve-2023-44487","tag-featured","tag-libcurl","tag-microsoft","tag-patch-tuesday","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23110"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23110\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23110"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}