{"id":15055,"date":"2019-04-09T19:17:01","date_gmt":"2019-04-10T03:17:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8804\/"},"modified":"2019-04-09T19:17:01","modified_gmt":"2019-04-10T03:17:01","slug":"news-8804","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8804\/","title":{"rendered":"Patch Tuesday Lowdown, April 2019 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 10 Apr 2019 00:07:33 +0000<\/strong><\/p>\n<p>Microsoft today released fifteen software updates to fix more than 70 unique security vulnerabilities in various flavors of its\u00a0<strong>Windows<\/strong> operating systems and supported software, including at least two <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\" target=\"_blank\" rel=\"noopener\">zero-day<\/a> bugs. These patches apply to <strong>Windows<\/strong>, <strong>Internet Explorer<\/strong> (IE) and <strong>Edge<\/strong> browsers, <strong>Office,<\/strong> <strong>Sharepoint<\/strong> and <strong>Exchange<\/strong>. Separately, <strong>Adobe<\/strong> has issued security updates for <strong>Acrobat\/Reader<\/strong> and\u00a0<strong>Flash Player<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-26837\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\" alt=\"\" width=\"229\" height=\"240\" \/>According to security firm <a href=\"https:\/\/www.rapid7.com\/\" target=\"_blank\" rel=\"noopener\">Rapid 7<\/a>, two of the vulnerabilities &#8212; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0803\" target=\"_blank\" rel=\"noopener\">CVE-2019-0803<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0859\" target=\"_blank\" rel=\"noopener\">CVE-2019-0859<\/a> &#8212; are already being exploited in the wild. They can result in unauthorized elevation of privilege, and affect all supported versions of Windows.<\/p>\n<p>&#8220;An attacker must already have local access to an affected system to use these to gain kernel-level code execution capabilities,&#8221; Rapid7 researcher <strong>Greg Wiseman<\/strong> observed. &#8220;However, one of the 32 Remote Code Execution (RCE) vulnerabilities patched today could potentially be used with them in an exploit chain to obtain full control of a system.&#8221;<\/p>\n<p>Aside from these zero-day privilege escalation flaws, Wiseman said, it&#8217;s a fairly standard Patch Tuesday.<\/p>\n<p>&#8220;Which of course still means that there are bugs that should be patched as soon as possible, such as the eight vulnerabilities classified as critical in the scripting engine used by Microsoft browsers, and CVE-<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0822\" target=\"_blank\" rel=\"noopener\">2019-0822<\/a> (an RCE in Microsoft Office that can be exploited by convincing a user to open a malicious file).&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2614\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2010\/04\/shockwave.jpg\" alt=\"\" width=\"197\" height=\"120\" \/>Adobe&#8217;s Patch Tuesday includes security updates for its <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb19-19.html\" target=\"_blank\" rel=\"noopener\">Flash Player and AIR software<\/a>,\u00a0 as well as\u00a0<a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb19-17.html\" target=\"_blank\" rel=\"noopener\">Adobe Reader and Acrobat.<\/a><\/p>\n<p>Flash updates are installed along with other monthly Windows patch rollups for consumers, and auto-installed by Google Chrome, but users may need to reboot the operating system (in the case of IE\/Edge) or the browser (in Chrome) for the new updates to take effect.<\/p>\n<p>Adobe&#8217;s actions also sound the death knell for <strong>Adobe Shockwave Player<\/strong>, which has at long last reached end-of-life.<\/p>\n<p>That means no more security updates for Shockwave, which has always been something of an ugly stepchild to Flash. That is to say, Shockwave <a href=\"https:\/\/krebsonsecurity.com\/2014\/05\/why-you-should-ditch-adobe-shockwave\/\" target=\"_blank\" rel=\"noopener\">never really got the security attention Flash has received<\/a> but nevertheless has been just as vulnerable and often <a href=\"https:\/\/krebsonsecurity.com\/2012\/12\/shocking-delay-in-fixing-adobe-shockwave-bug\/\" target=\"_blank\" rel=\"noopener\">lagging months or years behind Flash in terms of updates<\/a>.<span id=\"more-47263\"><\/span><\/p>\n<p><strong>Chris Goettl<\/strong>, director of product management and security for security firm\u00a0<a href=\"https:\/\/www.ivanti.com\/company\/about-ivanti\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.ivanti.com\/company\/about-ivanti&amp;source=gmail&amp;ust=1554924550527000&amp;usg=AFQjCNEyhYTU-sy-ui_6EPJOOr5uF_g6qw\">Ivanti<\/a>, <a href=\"https:\/\/www.ivanti.com\/blog\/april-patch-tuesday-2019\" target=\"_blank\" rel=\"noopener\">said<\/a> Windows users need to get any existing Shockwave installations out of their environments now.<\/p>\n<p>&#8220;There are 7 vulnerabilities that are going to be vulnerable for the majority of Shockwave installs still in existence,&#8221; Goettl said. &#8220;You can bet an exploit is imminent there.&#8221;<\/p>\n<p>Standard advice:\u00a0Staying up-to-date on Windows patches is good. Updating only after you\u2019ve backed up your important data and files is even better. A good backup means you\u2019re not pulling your hair out if the odd buggy patch causes problems booting the system.<\/p>\n<p><strong>Windows 10<\/strong>\u00a0likes to install patches all in one go and reboot your computer on its own schedule. Microsoft doesn\u2019t make it easy for Windows 10 users to change this setting,\u00a0<a href=\"https:\/\/www.howtogeek.com\/224471\/how-to-prevent-windows-10-from-automatically-downloading-updates\/\" target=\"_blank\" rel=\"noopener\">but it is possible<\/a>. For all other Windows OS users, if you\u2019d rather be alerted to new updates when they\u2019re available so you can choose when to install them, there\u2019s a setting for that in\u00a0<strong>Windows Update<\/strong>.<\/p>\n<p>As always, if you experience any problems installing any of these patches this month, please feel free to leave a comment about it below; there\u2019s a good chance other readers have experienced the same and may even chime in here with some helpful tips.<\/p>\n<p>Further reading:<\/p>\n<p><a href=\"https:\/\/blog.qualys.com\/laws-of-vulnerabilities\/2019\/04\/09\/april-2019-patch-tuesday-74-vulns-16-critical-2-actively-attacked-1-poc-exploit-adobe-vulns\" target=\"_blank\" rel=\"noopener\">Qualys on Patch Tuesday<\/a><\/p>\n<p><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+April+2019+Patch+Tuesday\/24826\/\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center&#8217;s Patch Tuesday Priorities.<\/a><\/p>\n<p><a href=\"https:\/\/www.ghacks.net\/2019\/04\/09\/microsoft-windows-security-updates-april-2019-overview\/\" target=\"_blank\" rel=\"noopener\">Martin Brinkmann of Ghacks.net<\/a><\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2019\/04\/patch-tuesday-lowdown-april-2019-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2014\/07\/brokenwindows.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 10 Apr 2019 00:07:33 +0000<\/strong><\/p>\n<p>Microsoft today released fifteen software updates to fix more than 70 unique security vulnerabilities in various flavors of its\u00a0Windows operating systems and supported software, including at least two zero-day bugs. These patches apply to Windows, Internet Explorer (IE) and Edge browsers, Office, Sharepoint and Exchange. Separately, Adobe has issued security updates for Acrobat\/Reader and\u00a0Flash Player.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[17774,21514,21515,20625,21516,14947,20626,21517,13457,15086,15801,16936],"class_list":["post-15055","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-chris-goettl","tag-cve-2019-0803","tag-cve-2019-0859","tag-ghacks-net","tag-greg-wiseman","tag-ivanti","tag-martin-brinkmann","tag-microsoft-patch-tuesday-april-2019","tag-qualys","tag-rapid7","tag-sans-internet-storm-center","tag-time-to-patch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15055"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15055\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}