Menu
Microsoft moves to fix over 50 security issues in latest Patch Tuesday

Microsoft moves to fix over 50 security issues in latest Patch Tuesday

Adobe also released nine security advisories addressing vulnerabilities in their products

November’s Patch Tuesday saw Microsoft roll out fixes for more than 50 security issues, covering vulnerabilities and bugs in the Windows operating system, Internet Explorer, Edge, ASP .NET Core, Chakra Core browsing engine and Microsoft Office.

Microsoft also released a security advisory providing defense-in-depth mitigations against attacks abusing the Dynamic Data Exchange (DDE) protocol in light of recent attacks misusing this feature, which isn’t new according to security software vendor, Trend Micro.

However, the method has made a resurgence with reports of cyber espionage and cybercriminal groups such as Pawn Storm, Keyboy, and FIN7 leveraging it to deliver their payloads.

Microsoft said users with Windows 10 Fall Creators Update, are protected from DDE attacks through its Windows Defender Exploit Guard.

According to a blog post by Trend Micro, 20 of the vulnerabilities addressed by November’s Patch Tuesday were rated critical in terms of severity, with 31 rated important.

Trend Micro said that six of these vulnerabilities were disclosed via Trend Micro’s Zero Day Initiative, and were related to memory corruption, information disclosure, validation issues, security feature bypasses, and privilege escalation, the security vendor noted.

November’s Patch Tuesday, which saw updates released on 14 November, also addresses security flaws that have public exploits, including:

CVE-2017-11827: a memory corruption issue in IE and Edge that can lead to remote code execution (RCE); CVE-2017-11848: an information disclosure vulnerability that can let attackers track users when they leave a website; CVE-2017-11883: a denial-of-service vulnerability in ASP .NET Core; CVE-2017-8700: an information disclosure flaw in ASP .NET Core.

There were also fixes for CVE-2017-11830 and CVE-2017-11877. The former is a vulnerability that enables attackers to bypass Windows Device Guard’s security feature, while CVE-2017-11877 can let an attacker bypass the macro execution protection in Microsoft Excel.

Adobe also released nine security advisories addressing vulnerabilities in their products, including those in Adobe Acrobat and Reader (APSB17-36).

The security bulletin for Flash Player (APSB17-33), which affects Windows (10 and 8.1), Mac, Linux, and Chrome OS is also notable.

Three of these RCE vulnerabilities (CVE-2017-3112, CVE-2017-3114, and CVE-2017-11213), along with 14 others in other Adobe products, were also disclosed to Adobe through Trend Micro’s Zero Day Initiative.

Microsoft released its own versions of Adobe’s patches for Flash Player via ADV170019, Trend Micro said.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags MicrosoftadobePatch Tuesday

Brand Post

How to become the best IT MSP

This article provides guidance for managed service providers (MSPs) that want to grow their business. It is also useful for any IT service provider looking to move from the break-fix model to managed IT services.

Featured

Slideshows

Reseller News Innovation Awards 2019: meet the winners

Reseller News Innovation Awards 2019: meet the winners

Reseller News honoured the standout players of the New Zealand channel in front of more than 480 technology leaders in Auckland on 23 October, recognising the achievements of top partners, emerging entrants and innovative start-ups.

Reseller News Innovation Awards 2019: meet the winners
Malwarebytes shoots the breeze with channel, prospects

Malwarebytes shoots the breeze with channel, prospects

A Kumeu, Auckland, winery was the venue for a Malwarebytes event for partner and prospect MSPs - with some straight shooting on the side. The half-day getaway, which featured an archery competition, lunch and wine-tasting aimed at bringing Malwarebytes' local New Zealand and top and prospective MSP partners together to celebrate recent local successes, and discuss the current state of malware in New Zealand. This was also a unique opportunity for local MSPs to learn about how they can get the most out of Malwarebytes' MSP program and offering, as more Kiwi businesses are targeted by malware.

Malwarebytes shoots the breeze with channel, prospects
Show Comments