{"id":23131,"date":"2023-10-13T12:30:07","date_gmt":"2023-10-13T20:30:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/10\/13\/news-16861\/"},"modified":"2023-10-13T12:30:07","modified_gmt":"2023-10-13T20:30:07","slug":"news-16861","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/13\/news-16861\/","title":{"rendered":"Microsoft addresses three zero-days for October\u2019s Patch Tuesday"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-small.jpg\"\/><\/p>\n<p>This month, Microsoft has released 103 updates to Windows, Edge, Microsoft Office, and Exchange Server. This update also includes minor updates to Visual Studio. Three zero-days (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-44487\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-44487<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36563\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-36563<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-41763\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-41763<\/a>) require &#8220;Patch Now&#8221; updates for both Windows and the Edge browser for this October update cycle.<\/p>\n<p>Microsoft has also updated its <a href=\"https:\/\/msrc.microsoft.com\/blog\/2022\/10\/14921\/\" rel=\"noopener nofollow\" target=\"_blank\">patch release and notification<\/a> system with support for RSS feeds and has published its latest <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" rel=\"noopener nofollow\" target=\"_blank\">Digital Defense Report<\/a> for this year. The team at <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Application Readiness<\/a> has provided a helpful <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-october-2023\/\" rel=\"noopener nofollow\" target=\"_blank\">infographic<\/a> that outlines the risks associated with each of the updates for this October update cycle.<\/p>\n<p>Each month, Microsoft includes a list of known issues that relate to the operating system and platforms that are included in this update cycle.<\/p>\n<p>Microsoft has published one major revision this month:<\/p>\n<p>Microsoft has published the following vulnerability related mitigations for this month&#8217;s Patch Tuesday release cycle:<\/p>\n<p>Some may question the efficacy of these proffered mitigations.<\/p>\n<p>Each month, the team at <a href=\"https:\/\/applicationreadiness.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Readiness<\/a> analyses the latest Patch Tuesday updates from Microsoft and provides detailed, actionable testing guidance. This guidance is based on assessing a large application portfolio and a detailed analysis of the Microsoft patches and their potential impact on the Windows platforms and application installations.<\/p>\n<p>One of the hardest areas on the Windows platform (both desktop and server) to update is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Architecture_of_Windows_NT\" rel=\"noopener nofollow\" target=\"_blank\">Windows Kernel<\/a> subsystem. This core subsystem manages security, access to low-level services, drivers, and the Hardware Abstraction Layer (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware_abstraction\" rel=\"noopener nofollow\" target=\"_blank\">HAL<\/a>). Given its importance, the Kernel layer is key to delivering most services and applications on Windows. Changing this core system generally translates to a high-risk of a component, service, or application not behaving as expected. Thus, testing is key and also very difficult to do right.<\/p>\n<p>This month Microsoft has updated both the Kernel and GDI subsystems at a <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/api\/winddi\/ns-winddi-surfobj\" rel=\"noopener nofollow\" target=\"_blank\">core level<\/a>. At Readiness, we have looked at these (GDI and Kernel level) changes, and they are both minor and far-reaching. (This is not a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Tautology_(language)\" rel=\"noopener nofollow\" target=\"_blank\">tautology<\/a>.) Rather than a specific test guidance plan, we recommend a &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Smoke_testing_(software)\" rel=\"noopener nofollow\" target=\"_blank\">smoke test<\/a>&#8221; for your commonly used applications and a business logic focused test effort for your critical or line-of-business applications. (Perhaps your top 20 apps?)<\/p>\n<p>All these scenarios will require significant application-level testing before a general deployment of this month&#8217;s update. In addition to these listed specific testing requirements, we suggest a general test of the following Windows features:<\/p>\n<p>Stressing about the latest <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36563\" rel=\"noopener nofollow\" target=\"_blank\">WordPad<\/a> security vulnerability? Unfortunately, we still have to test our rich-text-formatted (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Rich_Text_Format\" rel=\"noopener nofollow\" target=\"_blank\">RTF<\/a>) files this month as well. This follows on from last month&#8217;s Notepad++ <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/notepad-plus-plus-857-released-with-fixes-for-four-security-vulnerabilities\/\" rel=\"noopener nofollow\" target=\"_blank\">vulnerabilities<\/a>, which included <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-40031\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-40031<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-40036\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-40036<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-40164\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-40164<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-40166\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-40166<\/a>. At this rate, Microsoft may just decide to remove all (free) text editors from Windows. Office, anyone?<\/p>\n<p>Over the past few months, we have used this section to detail the forthcoming changes to the Windows ecosystem, such as end of platform support or changes to security updates. This month, we have two major Windows deprecations that have been announced by Microsoft:<\/p>\n<p>And speaking of life cycles, <a href=\"https:\/\/www.theregister.com\/2023\/10\/11\/microsoft_patch_tuesday_turns_20\/\" rel=\"noopener nofollow\" target=\"_blank\">Happy Birthday<\/a> to Patch Tuesday \u2014 it&#8217;s been 20 years since the first properly scheduled update to the Windows ecosystem. Things were pretty chaotic back then, with unscheduled updates distributed through the month. I doubt anyone would have considered just how important security patches\/updates would become to the IT community. More than a tradition, Patch Tuesday is now an essential part of IT best practices.<\/p>\n<p>Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/p>\n<p>Microsoft has adapted to the <a href=\"https:\/\/www.chromium.org\/developers\/calendar\/\" rel=\"noopener nofollow\" target=\"_blank\">Chromium release schedule<\/a> and no longer specifically publishes updates on the second Tuesday of every month. That said, Microsoft has used the release of the patch of <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-5346\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-5346<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-5217\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-5217<\/a> this week as a sort of &#8220;stub&#8221; or proxy for Patch Tuesday <a href=\"https:\/\/www.chromium.org\/chromium-projects\/\" rel=\"noopener nofollow\" target=\"_blank\">Chromium<\/a> (Edge) updates.<\/p>\n<p>For more information on Microsoft Edge security updates, please refer to the weekly updated <a href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft support page<\/a>. Both of these vulnerabilities are extremely serious (we consider them zero-days) and should be added to your &#8220;Patch Now&#8221; browser update schedule, Patch Tuesday or not.<\/p>\n<p>This October, Microsoft released 13 critical updates and 68 patches rated as important to the Windows platform that cover the following key components:<\/p>\n<p>The key challenges relate to the critical updates to the Message Queuing feature in Windows. Adding the kernel, core GDI updates, and networking issues means that this month we need to add this Windows update to your &#8220;Patch Now&#8221; release schedule.<\/p>\n<p>We can breathe a little easier this month as Microsoft has released only seven updates (all rated as important) for the Office platform. Ignoring Skype for Business (which everyone else does), this month Microsoft delivers patches to complex, difficult-to-exploit security vulnerabilities that have not been publicly disclosed. Add these low-profile Office updates to your standard release schedule.<\/p>\n<p>Microsoft has released a single update for Microsoft Exchange this month. This vulnerability affects all supported versions of Exchange Server and has been rated as important by Microsoft. Microsoft Exchange server updates this month will require a server reboot \u2014 for all versions. Add this update to your standard update release schedule for this October Patch Tuesday.<\/p>\n<p>Excluding the Mitre Rapid Reset (<a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/10\/10\/http2-rapid-reset-vulnerability-cve-2023-44487\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-44487<\/a>) issue covered below, Microsoft has released three relatively straightforward updates to the Visual Studio development platform. Add these updates to your standard developer release schedule.<\/p>\n<p>No updates from Adobe for Reader or Acrobat this month.<\/p>\n<p>Finally, let\u2019s discuss the HTTP\/2 Rapid Reset (<a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/10\/10\/http2-rapid-reset-vulnerability-cve-2023-44487\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-44487<\/a>) vulnerability. This distributed denial-of-service (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" rel=\"noopener nofollow\" target=\"_blank\">DDOS<\/a>) attack has been reported as exploited in the wild since this past August. As it affects more than just Microsoft Windows, I have included some helpful links (provided by <a href=\"https:\/\/www.cisa.gov\/\" rel=\"noopener nofollow\" target=\"_blank\">CISA<\/a>) on this serious vulnerability.<\/p>\n<p>Microsoft has posted a detailed<a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/10\/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http\/2\/\" rel=\"noopener nofollow\" target=\"_blank\"> detailed blog entry<\/a> entry on the Rapid Reset issue that includes advice on patching web applications, enabling<a href=\"https:\/\/learn.microsoft.com\/azure\/web-application-firewall\/overview?ocid=magicti_ta_learndoc\" rel=\"noopener nofollow\" target=\"_blank\"> Azure Web Application firewall<\/a> and configuring <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/web-application-firewall\/afds\/waf-front-door-policy-configure-bot-protection\" rel=\"noopener nofollow\" target=\"_blank\">Azure Front Door<\/a>.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3708732\/microsoft-addresses-three-zero-days-for-october-s-patch-tuesday.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>This month, Microsoft has released 103 updates to Windows, Edge, Microsoft Office, and Exchange Server. This update also includes minor updates to Visual Studio. Three zero-days (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-44487\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-44487<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36563\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-36563<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-41763\" rel=\"noopener nofollow\" target=\"_blank\">CVE-2023-41763<\/a>) require &#8220;Patch Now&#8221; updates for both Windows and the Edge browser for this October update cycle.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3708732\/microsoft-addresses-three-zero-days-for-october-s-patch-tuesday.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11270,10700,10909,714,24580,10525],"class_list":["post-23131","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-it-management","tag-microsoft-edge","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23131"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23131\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23131"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}