Community, System Administrators, and Patch Information
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Analysis of Microsoft “Patch Tuesday”
Report 2015 Microsoft Vulnerabilities Study: Mitigating risk by removing user privileges Analysis of Microsoft “Patch Tuesday” Security Bulletins from 2015 highlights that 85% of Critical Microsoft vulnerabilities would be mitigated by removing admin rights across an enterprise, with a 52% increase in the total volume of vulnerabilities compared to 2014. avecto.com Report Contents Introduction 2 Methodology 2 Key findings 3 Vulnerability Categories 4 Microsoft Windows vulnerabilites 5 Internet Explorer 6 Microsoft Office 7 Windows Servers 8 Additional Microsoft services 9 Conclusion 9 About Avecto 11 Appendix 12 avecto.com 1 Report Introduction Compiled by Avecto, this report analyzes the data from security bulletins issued by Microsoft throughout 2015. Microsoft bulletins are typically issued on the second Tuesday of each month, a date commonly referred to as “Patch Tuesday”, and contain fixes for vulnerabilities affecting Microsoft products that have been discovered since the last bulletin’s release. Network administrators, Security Managers and IT Professionals then respond to the update as quickly as they are able, ensuring the patches are rolled out across their systems to protect against the known vulnerabilities. In 2015, it was widely reported that Microsoft’s Patch Tuesday approach would change for all Windows 10 devices, with an approach of patches being released as soon as they are available. This effectively increases response time by as much as a month, cutting down the time between a vulnerability being discovered (Zero Day) and the patch being rolled and applied. The 2015 Microsoft Vulnerabilities Report is the third iteration of Avecto’s research. In 2014, the same report found a total of 240 vulnerabilities with a Critical rating. -
Systematization of Vulnerability Discovery Knowledge: Review
Systematization of Vulnerability Discovery Knowledge Review Protocol Nuthan Munaiah and Andrew Meneely Department of Software Engineering Rochester Institute of Technology Rochester, NY 14623 {nm6061,axmvse}@rit.edu February 12, 2019 1 Introduction As more aspects of our daily lives depend on technology, the software that supports this technology must be secure. We, as users, almost subconsciously assume the software we use to always be available to serve our requests while preserving the confidentiality and integrity of our information. Unfortunately, incidents involving catastrophic software vulnerabilities such as Heartbleed (in OpenSSL), Stagefright (in Android), and EternalBlue (in Windows) have made abundantly clear that software, like other engineered creations, is prone to mistakes. Over the years, Software Engineering, as a discipline, has recognized the potential for engineers to make mistakes and has incorporated processes to prevent such mistakes from becoming exploitable vulnerabilities. Developers leverage a plethora of processes, techniques, and tools such as threat modeling, static and dynamic analyses, unit/integration/fuzz/penetration testing, and code reviews to engineer secure software. These practices, while effective at identifying vulnerabilities in software, are limited in their ability to describe the engineering failures that may have led to the introduction of vulnerabilities. Fortunately, as researchers propose empirically-validated metrics to characterize historical vulnerabilities, the factors that may have led to the introduction of vulnerabilities emerge. Developers must be made aware of these factors to help them proactively consider security implications of the code that they contribute. In other words, we want developers to think like an attacker (i.e. inculcate an attacker mindset) to proactively discover vulnerabilities. -
August 11, 2020
August 11, 2020 Adobe Are you bored sitting at home in Covid Quarantine? We 19 1 1 0 1 have a little excitement for you this month with two zero Bulletin Critical Important User Targeted day releases from Microsoft. These vulnerabilities impact all New Bulletins Windows Operating System versions going back to Windows Apple 18 1 1 0 1 7 and Server 2008, and also Internet Explorer 11 across all Bulletin Critical Important User Targeted supported OSs. This release also includes the resolution of Critical Windows Print Spooler Elevation of Privilege vulnerability Microsoft (CVE-2020-1337) that made recent headlines. Adobe 16 17 16 1 14 Acrobat, Reader and Apple iCloud also have critical updates Bulletins Critical Important User Targeted User Targeted resolving 26 and 20 CVEs respectively. Privilege Management CVE Vendor Ivanti Threat User Mitigates Bulletins Count Impact Severity Priority Risk Notes Targeted Impact Adobe APSB20-48 Code Execution Critical Acrobat and Reader 26 1 Apple ICLOUD-200811 Code Execution Critical iCloud for Windows 11.3 20 1 MS20-08-IE Microsoft Remote Code Exploited: Internet Explorer 9 Critical 3 Execution 1 CVE-2020-1380 and 11 MS20-08-MR2K8-ESU Exploited and Remote Code Server 2008 and Critical Disclosed: 33 Execution 1 IE 9 - Extended Security CVE-2020-1464 MS20-08-MR2K8R2- Exploited: CVE-2020-1380 ESU Remote Code Critical Exploited and Server 2008 R2 + 56 Execution 1 Disclosed: IE - Extended Security CVE-2020-1464 Exploited: MS20-08-MR7-ESU CVE-2020-1380 Remote Code Windows 7 + IE - Critical Exploited and 56 -
Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE of CONTENTS 2016 Internet Security Threat Report 2
Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE OF CONTENTS 2016 Internet Security Threat Report 2 CONTENTS 4 Introduction 21 Tech Support Scams Go Nuclear, 39 Infographic: A New Zero-Day Vulnerability Spreading Ransomware Discovered Every Week in 2015 5 Executive Summary 22 Malvertising 39 Infographic: A New Zero-Day Vulnerability Discovered Every Week in 2015 8 BIG NUMBERS 23 Cybersecurity Challenges For Website Owners 40 Spear Phishing 10 MOBILE DEVICES & THE 23 Put Your Money Where Your Mouse Is 43 Active Attack Groups in 2015 INTERNET OF THINGS 23 Websites Are Still Vulnerable to Attacks 44 Infographic: Attackers Target Both Large and Small Businesses 10 Smartphones Leading to Malware and Data Breaches and Mobile Devices 23 Moving to Stronger Authentication 45 Profiting from High-Level Corporate Attacks and the Butterfly Effect 10 One Phone Per Person 24 Accelerating to Always-On Encryption 45 Cybersecurity, Cybersabotage, and Coping 11 Cross-Over Threats 24 Reinforced Reassurance with Black Swan Events 11 Android Attacks Become More Stealthy 25 Websites Need to Become Harder to 46 Cybersabotage and 12 How Malicious Video Messages Could Attack the Threat of “Hybrid Warfare” Lead to Stagefright and Stagefright 2.0 25 SSL/TLS and The 46 Small Business and the Dirty Linen Attack Industry’s Response 13 Android Users under Fire with Phishing 47 Industrial Control Systems and Ransomware 25 The Evolution of Encryption Vulnerable to Attacks 13 Apple iOS Users Now More at Risk than 25 Strength in Numbers 47 Obscurity is No Defense -
The Dark Reality of Open Source Spotlight Report
SPOTLIGHT The Dark Reality of Open Source Through the Lens of Threat and Vulnerability Management RiskSense Spotlight Report • May 2020 Executive Summary Open sourCe software (OSS) has quiCkly transformed both And while Heartbleed and the Apache Struts how modern applications are built and the underlying code vulnerabilities are the household names of open source they rely on. Access to high-quality and powerful open vulnerabilities, they are far from the only examples. Open source software projects has allowed developers to quickly source software is increasingly being targeted by integrate new capabilities into their applications without cryptominers, ransomware, and leveraged in DDoS having to reinvent the wheel. As a result, it is now estimated attacks. Unfortunately, OSS vulnerabilities are often a that between 80% and 90% of the code in most modern blind spot for many enterprises, who may not always be applications is made up of open source components. aware of all the open source projects and dependencies Likewise, many of the very tools that have enabled the that are used in their applications. growth of DevOps and CI/CD such as Jenkins, Kubernetes, and Docker are themselves open source projects. With this in mind, we have focused this version of the RiskSense Spotlight report on vulnerabilities in some of OSS also allows organizations to reduce their software today’s most popular open source software, including costs, and is often key to digital transformation efforts more than 50 OSS projects and over 2,600 vulnerabilities. and the transition of services to the cloud. It is no We then used this dataset to provide a risk-based surprise then that a 2020 report from Red Hat found that analysis of open source software to reveal the following: 95% of organizations view open source software as strategically important to their business. -
Microsoft Patch Tuesday March 2019
Microsoft Patch Tuesday March 2019 Dear Constituents, Microsoft has released its monthly roll-up of security patches known as Second Patch Tuesday. This means it's time to get those security updates installed. The March 2019 software updates addresses a total of 64 security vulnerabilities in its Windows operating systems and other products, 17 of which are rated critical, 45 important, one moderate and one low in severity. Included in this month's update are fixes for two vulnerabilities that are known to be actively exploited in the wild. Security updates for two actively exploited vulnerabilities Google stated that a vulnerability in Chrome and in Windows 7 was being chained together and actively exploited in the wild. While this vulnerability was mitigated by security features of Windows 10, Google warned that Windows 7 users were at risk. This vulnerability, has been fixed as part of this month's Patch Tuesday. Finally, Microsoft also fixed two bugs that are reported to be publicly disclosed. The first is a Windows denial of service vulnerability and a vulnerability in the NuGet Package Manager. What to do Users and system administrators are strongly recommended to update to the latest security patches to protect your computer from security risks. Reference Microsoft Security Update- https://portal.msrc.microsoft.com/en-us/security-guidance Please for more information you can contact us: Tonga National CERT Ministry of MEIDECC Nuku'alofa Tel: 2378 (CERT) email: [email protected] web: www.cert.gov.to 1 Disclaimer Notice: The information in this notice is intended solely for public knowledge and awareness, and not intending to harm, fright or disturb any person(s), legal entity or the receiver of this information. -
Windows Updates and Major Builds
WINDOWS UPDATES AND MAJOR BUILDS Updates install automatically, and you can’t pick and choose Another big change with Window 10 is that there will be automatic updates, so there’s less chance of you missing an important security update or bug fix. In addition, all Windows 10 systems will be on the same page at all times, whether it’s on a computer, a tablet, or a smart phone. Visit the Windows Update interface (type windows update in the search box) and you’ll find a single button — Check for updates. Click this button and Windows will check for available updates. If it finds any, it will automatically download and install them. Windows will also check for updates in the background and automatically download and install them the moment that they are released by Microsoft. Unlike on previous versions of Windows, there’s no way to select individual updates you want to download. All updates — from security updates and Windows Defender definition updates to optional updates and driver updates — will be installed automatically. The only option you can control is to select the “Advanced options” link and uncheck Give me updates for other Microsoft products when I update Windows. This will allow you to disable updates for Microsoft Office and other Microsoft programs. In Windows 10, Microsoft is committed to rolling out both security updates and feature updates. Most of the installed Modern applications will also automatically update themselves via the Windows Store. Microsoft is thinking of Windows 10 as the last version of Windows, so instead of a Windows 11 or Windows 10.1, we should see future updates and interface changes appear on an ongoing basis. -
Combat Top Security Vulnerabilities: HPE Tippingpoint Intrusion
Business white paper Combat top security vulnerabilities HPE TippingPoint intrusion prevention system Business white paper Page 2 The year 2014 marked a new pinnacle for hackers. Vulnerabilities were uncovered in some of the most widely deployed software in the world—some of it in systems actually intended to make you more secure. HPE TippingPoint next-generation intrusion prevention system (IPS) and next-generation firewall (NGFW) customers rely on us to keep their networks safe. And when it comes to cyber threats, every second matters. So how did HPE TippingPoint do? This brief highlights the top security vulnerabilities of 2014—the ones that sent corporate security executives scrambling to protect their businesses. And it describes how HPE TippingPoint responded to keep our customers safe. Heartbleed—HPE TippingPoint intrusion prevention system stops blood flow early Any vulnerability is concerning, but when a vulnerability is discovered in software designed to assure security, it leaves businesses exposed and vulnerable. That was the case with the Heartbleed vulnerability disclosed by the OpenSSL project on April 7, 2014. They found the vulnerability in versions of OpenSSL—the open-source cryptographic library widely used to encrypt Internet traffic. Heartbleed grew from a coding error that allowed remote attackers to read information from process memory by sending heartbeat packets that trigger a buffer over-read. As a demonstration of the vulnerability, the OpenSSL Project created a sample exploit that successfully stole private cryptography keys, user names and passwords, instant messages, emails, and business-critical documents and communications. We responded within hours to protect TippingPoint customers. On April 8, we released a custom filter package to defend against the vulnerability. -
PATCH TUESDAY April 11, 2017
PATCH TUESDAY April 11, 2017 19 Microsoft Given last month’s torrential patch downpour, 13 12 1 12 April Patch Tuesday was bound to make a quieter Bulletins Critical Important User Targeted New Bulletins entrance—but that doesn’t mean that it sprinkled. Adobe Anything but, in fact. The list includes swan song 14 5 1 1 2 security updates for one Windows OS and the Bulletins Critical Important User Targeted first of many for another. And speaking of Vista: User Targeted patch away, then deal with the aging software you Oracle can no longer patch. This month’s IIS 6.0 Zero Day 2 1 1 0 0 underlines the need for continued vigilance. Bulletin Critical Important User Targeted Zero Day Privilege Management CVE Vendor Shavlik Threat User Mitigates Bulletins Count Impact Severity Priority Risk Notes Targeted Impact MS17-IE-04 Remote Code Public Disclosure Microsoft Critical Internet Explorer 3 Execution 1 (CVE-2017-0210) Exploited (CVE-2017-0210) MS17-OFF-04 Remote Code Public Disclosure Critical Microsoft Office 8 Execution 1 (CVE-2017-0199) Exploited (CVE-2017-0199) MS17-W10-04 Remote Code Public Disclosure Critical Windows 10, 25 Execution 1 (CVE-2017-0203) Server 2016 MS17-SO7-04 Remote Code Critical Windows 7, Server 26 Execution 1 2008 R2 MS17-SO8-04 Remote Code Critical Server 2012 26 Execution 1 MS17-SO81-04 Remote Code Critical Windows 8.1, 26 Execution 1 Server 2012 R2 MS17-MR7-04 Remote Code Critical Windows 7, 26 Execution 1 Server 2008 R2 MS17-MR8-04 Remote Code Critical Server 2012 26 Execution 1 MS17-MR81-04 Remote Code Critical -
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries Ruian Duan:, Ashish Bijlani:, Yang Ji:, Omar Alrawi:, Yiyuan Xiong˚, Moses Ike:, Brendan Saltaformaggio,: and Wenke Lee: fruian, ashish.bijlani, yang.ji, alrawi, [email protected], [email protected] [email protected], [email protected] : Georgia Institute of Technology, ˚ Peking University Abstract—Mobile application developers rely heavily on open- while ensuring backward compatibility, and test for unin- source software (OSS) to offload common functionalities such tended side-effects. For the Android platform, Google has as the implementation of protocols and media format playback. initiated the App Security Improvement Program (ASIP) [21] Over the past years, several vulnerabilities have been found in to notify developers of vulnerable third-party libraries in popular open-source libraries like OpenSSL and FFmpeg. Mobile use. Unfortunately, many developers, as OSSPolice [15] and applications that include such libraries inherit these flaws, which LibScout [4] show, do not update or patch their application, make them vulnerable. Fortunately, the open-source community is responsive and patches are made available within days. However, which leaves end-users exposed. Android developers mainly mobile application developers are often left unaware of these use Java and C/C++ [1] libraries. While Derr et al. [14] flaws. The App Security Improvement Program (ASIP) isa show that vulnerable Java libraries can be fixed by library- commendable effort by Google to notify application developers level update, their C/C++ counterparts, which contain many of these flaws, but recent work has shown that many developers more documented security bugs in the National Vulnerability do not act on this information. -
Cyberwar: the ISIL Threat & Resiliency in Operational Technology
Cyberwar: The ISIL Threat & Resiliency in Operational Technology Thesis Presented to the Faculty of the Department of Information and Logistics Technology University of Houston In Partial Fulfillment of the Requirements for the Degree Master’s of Information Systems Security By Gregory S. Anderson May 2017 Cyberwar: The ISIL Threat & Resiliency in Operational Technology ____________________________________ Gregory S. Anderson Approved: Committee Chair: ____________________________________ Wm. Arthur Conklin, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Chris Bronk, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Paula deWitte, PhD Computer Information Systems and Information System Security ____________________________________ ____________________________________ Rupa Iyer, PhD Dan Cassler Associate Dean for Research and Graduate Interim Chair for Department of Information Studies, College of Technology and Logistics Technology THIS PAGE INTENTIONALLY LEFT BLANK Acknowledgments First, I would like to thank Dr. Chris Bronk and Dr. Art Conklin for their support and guidance throughout my time at the University of Houston. Their dedication to students is unparalleled for any other professor I have come across during my education. I would also like to thank my family for their ongoing encouragement and love. The fostering environment to peruse knowledge and “never settle for less” has been a constant inspiration throughout my life. Lastly, to my partner of 7 years, Lorelei. None of my achievements these past few years would have come to fruition without her continuous love, support, and willingness to sacrifice for the greater good is deeply appreciated. Thank you for being the most patient and steadfast person I have ever known, I love you. -
Make Technology Great Again
Make Technology Great Again Michał „rysiek” Woźniak [email protected] Everything is Broken – Quinn Norton https://medium.com/message/everything-is-broken-81e5f33a24e1 "Malicious Word Doc Uses ActiveX To Infect" https://www.vmray.com/blog/malicious-word-doc-uses-activex-infect/ "Word Malware: OLE Exploited in Zero-Day Attack" https://www.vadesecure.com/en/word-doc-malware/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Microsoft Ofce macro malware targets Macs" https://blog.malwarebytes.com/cybercrime/2017/02/microsoft-ofce-macro- malware-targets-macs/ "Beware PowerSniff Malware uses Word macros and PowerShell scripts" https://www.grahamcluley.com/beware-powersnif-malware/