{"id":12764,"date":"2018-07-11T01:17:11","date_gmt":"2018-07-11T09:17:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/11\/news-6532\/"},"modified":"2018-07-11T01:17:11","modified_gmt":"2018-07-11T09:17:11","slug":"news-6532","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/07\/11\/news-6532\/","title":{"rendered":"Patch Tuesday, July 2018 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Jul 2018 02:34:41 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> and <strong>Adobe<\/strong> each issued security updates for their products today. Microsoft&#8217;s July patch batch includes 14 updates to fix more than 50 security flaws in <strong>Windows<\/strong> and associated software. Separately, Adobe has pushed out an update for\u00a0its\u00a0<strong>Flash Player\u00a0<\/strong>browser plugin, as well as a monster patch bundle for\u00a0<strong>Adobe Reader\/Acrobat<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"212\" height=\"222\" \/>According to security firm <a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2018\/07\/10\/july-patch-tuesday-critical-browser-patches-lazy-fp-exchange-adobe-vulns\" target=\"_blank\" rel=\"noopener\">Qualys<\/a>, all but two of the &#8220;critical&#8221; fixes in this round of updates apply to vulnerabilities in Microsoft&#8217;s browsers &#8212; <strong>Internet Explorer<\/strong> and <strong>Edge<\/strong>. Critical patches mend software flaws that can be exploited remotely by malicious software or bad guys with little to no help from the user, save for perhaps visiting a Web site or opening a booby-trapped link.<\/p>\n<p>Microsoft also patched dangerous vulnerabilities in its <strong>.NET Framework<\/strong> (a Windows development platform required by many third-party programs and commonly found on most versions of Windows), as well as <strong>Microsoft Office<\/strong>. With both of these weaknesses, an attacker could trick a victim into opening an email that contained a specially crafted Office document which loads malicious code, says <strong>Allan Liska<\/strong>, a threat intelligence analyst at <a href=\"https:\/\/www.recordedfuture.com\/\" target=\"_blank\" rel=\"noopener\">Recorded Future<\/a>.<\/p>\n<p>One of the more nettlesome features of Windows 10 is the operating system by default decides on its own when to install updates, very often shutting down open programs and restarting your PC in the middle of the night to do so unless you change the defaults.<\/p>\n<p>Not infrequently, Redmond ships updates that end up causing stability issues for some users, and it doesn&#8217;t hurt to wait a day or two before seeing if any major problems are reported with new updates before installing them. Microsoft doesn\u2019t make it easy for <strong>Windows 10<\/strong> users to change this setting, but\u00a0<a href=\"https:\/\/www.howtogeek.com\/224471\/how-to-prevent-windows-10-from-automatically-downloading-updates\/\" target=\"_blank\" rel=\"noopener\">it is possible<\/a>. For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in\u00a0<strong>Windows Update<\/strong>.<span id=\"more-44375\"><\/span><\/p>\n<p>It\u2019s a good idea to get in the habit of backing up your computer before applying monthly updates from Microsoft. Windows has some built-in tools that can help recover from bad patches, but restoring the system to a backup image taken just before installing updates is often much less hassle and an added piece of mind while you\u2019re sitting there praying for the machine to reboot successfully after patching.<\/p>\n<p>As per usual on Microsoft&#8217;s Patch Tuesday, Adobe issued <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-24.html\" target=\"_blank\" rel=\"noopener\">an update<\/a> to its Flash Player browser plugin. The latest update brings Flash to <em>version 30.0.0.134<\/em>, and patches at least two security vulnerabilities in the program. Microsoft&#8217;s patch bundle includes the Flash update as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-18875\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\" alt=\"\" width=\"211\" height=\"180\" \/>Adobe says the Flash update addresses &#8220;critical&#8221; security holes, meaning they could be exploited by malware or miscreants to take complete, remote control over vulnerable systems. My standard advice is for readers to kick Flash to the curb, as it&#8217;s a buggy program that is a perennial favorite target of malware purveyors.<\/p>\n<p>For readers still unwilling to cut the Flash cord, there are half-measures that work almost as well. Fortunately,\u00a0<a href=\"https:\/\/support.google.com\/chrome\/answer\/108086?hl=en\" target=\"_blank\" rel=\"noopener\">disabling Flash in Chrome<\/a>\u00a0is simple enough. Paste \u201c<a href=\"chrome:\/\/settings\/content\" target=\"_blank\" rel=\"noopener\">chrome:\/\/settings\/content<\/a>\u201d into a Chrome browser bar and then select \u201cFlash\u201d from the list of items. By default it should be set to \u201cAsk first\u201d before running Flash, although users also can disable Flash entirely here or whitelist and blacklist specific sites.<\/p>\n<p>By default,\u00a0<strong>Mozilla Firefox<\/strong>\u00a0on Windows computers with Flash installed runs Flash in a \u201c<a href=\"http:\/\/blogs.adobe.com\/security\/2012\/06\/inside-flash-player-protected-mode-for-firefox.html\" target=\"_blank\" rel=\"noopener\">protected mode<\/a>,\u201d which prompts the user to decide if they want to enable the plugin before Flash content runs on a Web site.<\/p>\n<p>Another, perhaps less elegant, alternative to wholesale junking Flash is keeping it installed in a browser that you don\u2019t normally use, and then only using that browser on sites that require Flash.<\/p>\n<p>If you use <strong>Adobe Reader<\/strong> or <strong>Acrobat<\/strong> to manage PDF documents, you&#8217;re probably going to want to update these products soon: Adobe <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb18-21.html\" target=\"_blank\" rel=\"noopener\">released updates<\/a> for both today that <em>fix more than 100 security vulnerabilities in the software titles<\/em>.<\/p>\n<p>Some folks may be unaware that there are other free PDF readers which aren&#8217;t quite as bloated as Adobe&#8217;s. Whether these alternative readers are more secure is another question; they certainly seem to be updated less frequently, but that may have something to do with the fact that they include far fewer features and likely less overall attack surface area.<\/p>\n<p>I can&#8217;t recall the last time I had Adobe Reader installed on anything I own. My preferred PDF reader for Windows is <a href=\"https:\/\/www.sumatrapdfreader.org\/free-pdf-reader.html\" target=\"_blank\" rel=\"noopener\">Sumatra PDF<\/a>, which is comparatively lightweight and very fast. Unfortunately, no matter how many times you change Sumatra to the default PDF reader on Windows 10, the operating system keeps defaulting to opening PDFs in Microsoft Edge.<\/p>\n<p>For a detailed rundown of the individual vulnerabilities patched by Microsoft today, check out the <a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+Patch+Tuesday+July+2018+now+with+Dashboard\/23858\/\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center<\/a>, which indexes the fixes by severity, how likely it is that each vulnerability will be exploited anytime soon, and whether specific flaws were publicly disclosed prior to today&#8217;s patch release.<\/p>\n<p>According to SANS, at least three of the flaws &#8212;\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8278\" target=\"_blank\" rel=\"noopener\">CVE-2018-8278<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8313\" target=\"_blank\" rel=\"noopener\">CVE-2018-8313<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8314\" target=\"_blank\" rel=\"noopener\">CVE-2018-8314<\/a>\u00a0&#8212; were previously disclosed publicly, meaning that attackers may have had a head start figuring out how to exploit these flaws for criminal gain.<\/p>\n<p>As always, if you experience any problems installing or downloading these updates, please don&#8217;t hesitate to leave a comment. If past Patch Tuesday posts are any indicator, you may even find helpful responses or solutions from other readers experiencing the same issues.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/patch-tuesday-july-2018-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Jul 2018 02:34:41 +0000<\/strong><\/p>\n<p>Microsoft and Adobe each issued security updates for their products today. Microsoft&#8217;s July patch batch includes 14 updates to fix more than 50 security flaws in Windows and associated software. Separately, Adobe has pushed out an update for\u00a0its\u00a0Flash Player\u00a0browser plugin, as well as a monster patch bundle for\u00a0Adobe Reader\/Acrobat.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[11283,18424,18927,18928,18929,18930,18931,16936],"class_list":["post-12764","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe-flash-player","tag-adobe-reader","tag-cve-2018-8278","tag-cve-2018-8313","tag-cve-2018-8314","tag-flash-version-30-0-0-134","tag-microsoft-patch-tuesday-july-2018","tag-time-to-patch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12764"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12764\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}