{"id":9796,"date":"2017-10-10T14:30:08","date_gmt":"2017-10-10T22:30:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/10\/news-3569\/"},"modified":"2017-10-10T14:30:08","modified_gmt":"2017-10-10T22:30:08","slug":"news-3569","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/10\/news-3569\/","title":{"rendered":"Another banner Patch Tuesday, with a Word zero-day and several bugs"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security9-100734738-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 10 Oct 2017 13:28:00 -0700<\/strong><\/p>\n<p>It&#8217;s going to be a banner patching month.\u00a0I count 151 separate <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" rel=\"nofollow\">security patches<\/a>\u00a0and 48 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/summary\" rel=\"nofollow\">Knowledge Base articles<\/a>,\u00a0as well as the odd Security Advisory.<\/p>\n<p>The Windows patch <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/313ae481-3088-e711-80e2-000d3a32fc99\" rel=\"nofollow\">Release Notes <\/a>point to four known bugs:<\/p>\n<p>The <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4041676\/windows-10-update-kb4041676\" rel=\"nofollow\">cumulative update for Win10 Creators Update<\/a>, version <strong>1703<\/strong>\u00a0\u2014 which sports dozens of fixes \u2014 has a couple of problems: Systems with support enabled for USB Type-C Connector System Software Interface (UCSI) may experience a blue screen or stop responding with a black screen when a system shutdown is initiated, and it may change Czech and Arabic languages to English for Microsoft Edge and other applications.<\/p>\n<p>The <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4041691\/windows-10-update-kb4041691\" rel=\"nofollow\">cumulative update for Win10 Anniversary Update<\/a>, version <strong>1607<\/strong>, has a handful of problems: Downloading updates using express installation files may fail, after installing a delta update package; the KB numbers appear twice under Installed Updates; and package users may see an error dialog that indicates that an application exception has occurred when closing some applications.\u00a0<\/p>\n<p>The <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4042895\/windows-10-update-kb4042895\" rel=\"nofollow\">cumulative update for the original version of Win10<\/a>, usually called <strong>1507<\/strong>, has a similar problem: Package users may see an error dialog that indicates that an application exception has occurred when closing some applications. Apparently this fix is only for the LTSC version.<\/p>\n<p>The <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4041681\/windows-7-update-kb4041681\" rel=\"nofollow\">Monthly Rollup for Win7<\/a> also has an acknowledged bug: an error dialog that indicates that an application exception has occurred when closing some applications.<\/p>\n<p>Martin Brinkmann has his usual <a href=\"https:\/\/www.ghacks.net\/2017\/10\/10\/microsoft-security-updates-october-2017-release\/\" rel=\"nofollow\">exhaustive list on ghacks<\/a>:<\/p>\n<p><strong>Windows 7<\/strong>: 20 vulnerabilities of which 5 are rated critical, 15 important<\/p>\n<p><strong>Windows 8.1<\/strong>: 23 vulnerabilities of which 6 are rated critical, 17 important<\/p>\n<p><strong>Windows 10 version 1607<\/strong>: 29 vulnerabilities, 6 critical, 23 important<\/p>\n<p><strong>Windows 10 version 1703<\/strong>: 29 vulnerabilities of which 6 are rated critical, 23 important<\/p>\n<p>SANS Internet Storm Center has <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/October+2017+Security+Updates\/22916\" rel=\"nofollow\">released its list<\/a> \u2014 as has the <a href=\"https:\/\/www.thezdi.com\/blog\/2017\/10\/10\/the-october-2017-security-update-review\" rel=\"nofollow\">Zero Day Initiative<\/a>.<\/p>\n<p>There are some worrisome exposures that we\u2019ll be following closely:<\/p>\n<p><strong>CVE-2017-11779<\/strong>\u00a0\u2014 a major problem with DNS security, but it\u2019s only a problem if your DNS server has been overtaken. <a href=\"https:\/\/www.bishopfox.com\/blog\/2017\/10\/a-bug-has-no-name-multiple-heap-buffer-overflows-in-the-windows-dns-client\/\" rel=\"nofollow\">Nick Freeman at Bishop Fox<\/a> notes:<\/p>\n<p>if an attacker controls your DNS server (e.g., through a man-in-the-middle attack or a malicious coffee-shop hotspot) \u2014\u00a0<strong>they can gain access to your system<\/strong>. This doesn\u2019t only affect web browsers \u2014 your computer makes DNS queries in the background all the time, and any query can be responded to in order to trigger this issue.<\/p>\n<p>Sounds grisly, but <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11779\" rel=\"nofollow\">Microsoft says<\/a> the flaw hasn\u2019t been exploited, and rates it as \u201cExploitation less likely.\u201d If somebody can hijack your DNS server, you\u2019re in a world of hurt anyway.<\/p>\n<p><strong>CVE-2017-11826<\/strong>\u00a0\u2014 a known, and exploited, zero-day attack in Word, discovered by <a href=\"http:\/\/360coresec.blogspot.com\/2017\/10\/new-office-0day-cve-2017-11826.html\" rel=\"nofollow\">Qihoo 360<\/a>. It\u2019s another attack that relies on disguising an RTF file as a Word DOC or DOCX, then using the good services of Word (or its Viewer) to pounce on your machine. The Microsoft <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11826\" rel=\"nofollow\">security advisory<\/a> says it\u2019s been fixed this month in all versions of Word, the Word Viewer and the Office Compatibility Pack.\u00a0<\/p>\n<p>Finally, <strong>Security Advisory ADV170012<\/strong> \u2014 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170012\" rel=\"nofollow\">Vulnerability in TPM could allow Security Feature Bypass<\/a> contains this little gotcha:<\/p>\n<p>WARNING: Do NOT apply the TPM firmware update prior to applying the Windows operating system mitigation update. Doing so will render your system unable to determine if your system is affected. You will need this information to conduct full remedation.<\/p>\n<p>ZDI goes on to explain:<\/p>\n<p>The patch provided by Microsoft is only a temporary measure though, and here\u2019s where it gets truly complicated. The TPM manufacturers need to produce a firmware update to completely resolve this, as the bug itself is present in the TPM firmware \u2014 not in Windows itself. This patch is one of several designed to offer a workaround by generating software-based keys whenever possible. Even after a vendor\u2019s firmware update is applied, you\u2019ll need to re-generate new keys to replace the previously generated weak ones.<\/p>\n<p>This is just a stop-gap measure and still requires manual intervention. When the actual firmware updates roll out from TPM vendors, the process will need to happen all over again \u2014 except this time, new TPM firmware needs to be installed on every affected device.<\/p>\n<p>Sounds like it\u2019s going to be a woolly month.<\/p>\n<p>As <em>Computerworld<\/em>&#8216;s\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3231661\/microsoft-windows\/microsoft-sunsets-windows-10s-first-feature-upgrade.html\">Gregg Keizer notes<\/a>, today marks the last update for the Windows 10 Fall Update (later called the November Update), version 1511. Those of you on the Long Term Servicing Channel (formerly the Long Term Servicing Branch) need not fear \u2014 1511 will be supported forever, or at least until Oct. 14, 2025. But those of you who don\u2019t have LTSC and its requisite Volume License with Software Assurance better move beyond 1511. Pro tip: If you\u2019re on 1511, move to 1703 before Oct. 17, after which it\u2019ll be much harder to avoid 1709.<\/p>\n<p>Note that Microsoft has, in the past, released truly critical security patches for versions of Windows that are beyond end of life. Which is an interesting philosophical observation.<\/p>\n<p>Today also memorializes the demise of Office 2007. No, you don\u2019t need to run out and buy Office 2016 or rent Office 365. But you do need to be aware that Office 2007 is going to sprout security holes \u2014 and you won\u2019t be getting any patches, unless Redmond relents and figures that fixing the elderly branches of the Office ecosystem is worth the time and effort.<\/p>\n<p><em>Hit a problematic patch? Holler on the <a href=\"https:\/\/askwoody.com\/forums\/topic\/patch-tuesday-patches-are-out-2\/\" rel=\"nofollow\">AskWoody Lounge<\/a>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3230140\/microsoft-windows\/another-banner-patch-tuesday-with-a-word-zero-day-and-several-bugs.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security9-100734738-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 10 Oct 2017 13:28:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>It&#8217;s going to be a banner patching month.\u00a0I count 151 separate <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" rel=\"nofollow\">security patches<\/a>\u00a0and 48 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/summary\" rel=\"nofollow\">Knowledge Base articles<\/a>,\u00a0as well as the odd Security Advisory.<\/p>\n<p>The Windows patch <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/313ae481-3088-e711-80e2-000d3a32fc99\" rel=\"nofollow\">Release Notes <\/a>point to four known bugs:<\/p>\n<p>The <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4041676\/windows-10-update-kb4041676\" rel=\"nofollow\">cumulative update for Win10 Creators Update<\/a>, version <strong>1703<\/strong>\u00a0\u2014 which sports dozens of fixes \u2014 has a couple of problems: Systems with support enabled for USB Type-C Connector System Software Interface (UCSI) may experience a blue screen or stop responding with a black screen when a system shutdown is initiated, and it may change Czech and Arabic languages to English for Microsoft Edge and other applications.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3230140\/microsoft-windows\/another-banner-patch-tuesday-with-a-word-zero-day-and-several-bugs.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[15605,714,10525],"class_list":["post-9796","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-office-software","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9796"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9796\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9796"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}