{"id":9908,"date":"2017-10-16T10:17:20","date_gmt":"2017-10-16T18:17:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/16\/news-3681\/"},"modified":"2017-10-16T10:17:20","modified_gmt":"2017-10-16T18:17:20","slug":"news-3681","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/16\/news-3681\/","title":{"rendered":"Microsoft&#8217;s October Patch Batch Fixes 62 Flaws"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Oct 2017 14:18:40 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> on Tuesday released software updates to fix at least 62 security vulnerabilities in <strong>Windows<\/strong>, <strong>Office<\/strong> and other software. Two of those flaws were detailed publicly before yesterday&#8217;s patches were released, and one of them is already being exploited in active attacks, so attackers already have a head start.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"brokenwindows\" width=\"229\" height=\"240\" \/>Roughly half of the flaws Microsoft addressed this week are in the code that makes up various versions of Windows, and 28 of them were labeled &#8220;critical&#8221; &#8212; meaning malware or malicious attackers could use the weaknesses to break into Windows computers remotely with no help from users.<\/p>\n<p>One of the publicly disclosed Windows flaws (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8703\" target=\"_blank\" rel=\"noopener\">CVE-2017-8703<\/a>) fixed in this batch is a problem with a feature only present in Windows 10 known as the <a href=\"https:\/\/blogs.windows.com\/buildingapps\/2017\/08\/08\/windows-subsystem-linux-windows-server\/\" target=\"_blank\" rel=\"noopener\">Windows Subsystem for Linux<\/a>, which allows Windows 10 users to run unmodified Linux binary files. Researchers at <strong>CheckPoint<\/strong> recently released <a href=\"https:\/\/research.checkpoint.com\/beware-bashware-new-method-malware-bypass-security-solutions\/\" target=\"_blank\" rel=\"noopener\">some interesting research<\/a> worth reading about how attackers might soon use this capability to bypass antivirus and other security solutions on Windows.<span id=\"more-41130\"><\/span><\/p>\n<p>The bug quashed this week that&#8217;s being actively exploited resides in Microsoft Office (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11826\" target=\"_blank\" rel=\"noopener\">CVE-2017-11826<\/a>), and Redmond says attackers could seize control over a vulnerable system just by convincing someone to open a booby-trapped Word file. Another Office vulnerability, (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11776\" target=\"_blank\" rel=\"noopener\">CVE-2017-11776<\/a>), involves a flaw in <strong>Outlook&#8217;<\/strong>s ability to encrypt messages;<strong> SEC-Consult<\/strong> <a href=\"https:\/\/www.sec-consult.com\/en\/blog\/2017\/10\/fake-crypto-microsoft-outlook-smime-cleartext-disclosure-cve-2017-11776\/index.html\" target=\"_blank\" rel=\"noopener\">has more details<\/a> on this bug.<\/p>\n<p>Another critical flaw (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11779\" target=\"_blank\">CVE-2017-11779<\/a>) addresses a scary vulnerability in the domain name system (DNS) component of <strong>Windows 8<\/strong> and <strong>Windows Server 2012<\/strong>. According to <a href=\"https:\/\/www.bishopfox.com\/blog\/2017\/10\/a-bug-has-no-name-multiple-heap-buffer-overflows-in-the-windows-dns-client\/\" target=\"_blank\" rel=\"noopener\">research<\/a> from <strong>Bishop Fox<\/strong>, the security firm credited with finding and reporting the bug, this flaw could be exploited quite easily to gain complete control over vulnerable systems if the attacker controls or compromises a local network (think Wi-Fi hotspot).<\/p>\n<p>Normally, Adobe uses Microsoft&#8217;s Patch Tuesday (the second Tuesday of each month) to release its own fixes for <strong>Flash Player<\/strong>, <strong>Reader<\/strong> and other products. However, this time around the company has no security updates available. Adobe did release a new version of Flash that includes bug fixes (<em>v. 27.0.0.159<\/em>), but generally speaking only even-numbered Flash releases include security fixes.<\/p>\n<p>For additional commentary on October&#8217;s bundle of updates from Microsoft, see these blogs from security vendors <a href=\"https:\/\/www.ivanti.com\/blog\/october-patch-tuesday-2017\/\" target=\"_blank\">Ivanti<\/a> and <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2017\/10\/10\/october-patch-tuesday-28-critical-microsoft-vulnerabilities\" target=\"_blank\">Qualys<\/a>. For those looking for a straight-up list of which patches deserve priority, check out the <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/October+2017+Security+Updates\/22916\/\" target=\"_blank\">always useful roundup<\/a> from the <strong>SANS Internet Storm Center<\/strong>.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/10\/microsofts-october-patch-batch-fixes-62-flaws\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Oct 2017 14:18:40 +0000<\/strong><\/p>\n<p>Microsoft on Tuesday released software updates to fix at least 62 security vulnerabilities in Windows, Office and other software. Two of those flaws were detailed publicly before yesterday&#8217;s patches were released, and one of them is already being exploited in active attacks, so attackers already have a head start.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11414,15798,9709,11415,15799,3245,10644,15800,15801,15802,10525,15803,15804,15805],"class_list":["post-9908","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe","tag-bishop-fox","tag-checkpoint","tag-flash-player","tag-october-2017-patch-tuesday","tag-office","tag-other","tag-reader","tag-sans-internet-storm-center","tag-sec-consult","tag-windows","tag-windows-8","tag-windows-server-2012","tag-windows-subsystem-for-linux"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9908"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9908\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9908"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}