Lucene search

K
krebsBrianKrebsKREBS:6172D354376A559F0FD7E586CF25234F
HistoryNov 14, 2018 - 1:25 p.m.

Patch Tuesday, November 2018 Edition

2018-11-1413:25:13
BrianKrebs
krebsonsecurity.com
68

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

41.2%

Microsoft on Tuesday released 16 software updates to fix more than 60 security holes in various flavors ofWindowsand other Microsoft products.Adobealso has security patches available forFlash Player,AcrobatandReader users.

As per usual, most of the critical flaws โ€“ those that can be exploited by malware or miscreants without any help from users โ€“ reside in Microsoftโ€™s Web browsers Edge andInternet Explorer.

This weekโ€™s patch batch addresses two flaws of particular urgency: One is a zero-day vulnerability (CVE-2018-8589) that is already being exploited to compromise Windows 7 andServer 2008 systems.

The other is a publicly disclosed bug in Microsoftโ€™s Bitlocker encryption technology (CVE-2018-8566) that could allow an attacker to get access to encrypted data. One mitigating factor with both security holes is that the attacker would need to be already logged in to the targeted system to exploit them.

Of course, if the target has Adobe Reader or Acrobat installed, it might be easier for attackers to achieve that log in. According to analysis from security vendor Qualys, there is now code publicly available that could force these two products to leak a hash of the userโ€™s Windows password (which could then be cracked with open-source tools). A new update for Acrobat/Reader fixes this bug, and Adobe has published some mitigation suggestions as well.

In addition, Adobe pushed out a security update for Windows, Mac, Linux and Chrome versions of Flash Player. The update fixes just one vulnerability in Flash, but Iโ€™m sure most of us would rather Flash died off completely already. Adobe said it plans to end support for the plugin in 2020.Google Chrome is now making users explicitly enable Flash every time they want to use it, and by the summer of 2019 it will make users go into their settings to enable it every time they want to run it.

KrebsOnSecurity has frequently suggested that Windows users wait a day or two after Microsoft releases monthly security updates before installing the fixes, with the rationale that occasionally buggy patches can cause serious headaches for users who install them before all the kinks are worked out.

Windows 10 likes to install patches all in one go and reboot your computer on its own schedule. Microsoft doesnโ€™t make it easy for Windows 10 users to change this setting, but it is possible. For all other Windows OS users, if youโ€™d rather be alerted to new updates when theyโ€™re available so you can choose when to install them, thereโ€™s a setting for that inWindows Update.

In either case, itโ€™s a good idea to get in the habit of backing up your data before installing Windows updates. Unlike last month, when many Windows users saw the contents of their โ€œMy Documentsโ€ folder erased by a buggy update, Iโ€™m not aware of any major issues this time around.

If you experience any problems installing any of these patches this month, please feel free to leave a comment about it below; thereโ€™s a good chance other readers have experienced the same and may even chime in here with some helpful tips.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

41.2%