Navigation
Recherche
|
For July, Microsoft’s Patch Tuesday update fixes four zero-day flaws
vendredi 12 juillet 2024, 21:00 , par ComputerWorld
Microsoft released 132 updates in its July Patch Tuesday update while addressing four zero-days (CVE-2024-35264, CVE-2024-37985, CVE-2024-38080 and CVE-2024-38112) affecting Windows desktop, Microsoft.NET and Visual Studio. This is a very significant patch cycle for Microsoft SQL Server, but there are no updates for Microsoft browsers and a low profile set of patches for Microsoft Office. No major revisions require attention, with testing focused squarely on SQL dependent applications.
The team at Readiness has provided a useful infographic detailing the risks with each of the updates this cycle. Known issues Each month, Microsoft publishes a list of known issues included in its latest release, including two reported minor issues: After you install KB5034203 (dated 01/23/2024) or later updates, some Windows devices that use the DHCP Option 235 to discover Microsoft Connected Cache (MCC) nodes in their network might be unable to use those nodes. Microsoft offered two options to mitigate the issue through setting the Cache Hostname or using group policies. Microsoft is still working on a resolution. Context menus and dialog buttons in some Windows apps, or parts of the Windows OS user interface (UI), might display in English when English is not set as the display language. This might also affect font size. We fully expect to see more issues relating to how the Windows UI presented over the coming months as Microsoft works through some of the core level issues with new ARM builds. This means that even non-ARM builds will be affected (see CVE-2024-37985). Look out for input method editor, language pack, and dialog box language issues for non-English builds. Major revisions This Patch Tuesday saw Microsoft publishing the following major revisions to past security and feature updates, including: CVE-2024-30098 : Windows Cryptographic Services Security Feature Bypass. Microsoft has added a FAQ to explain how this vulnerability is being addressed and further actions customers must take to be protected from it. This is an informational change only; no further action is required. Mitigations and workarounds Microsoft published the following vulnerability-related mitigations for this month’s release cycle: CVE-2024-38077, CVE-2024-38076 and CVE-2024-38074: Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability. Microsoft has (rather helpfully) offered guidance that disabling the Remote Desktop licensing feature mitigates this vulnerability. CVE-2024-38030: Windows Themes Spoofing Vulnerability. If you have Windows NTLM disabled, this vulnerability will not affect your system. Each month, the Readiness team analyses the latest Patch Tuesday updates and provides detailed, actionable testing guidance based on assessing a large application portfolio and a detailed analysis of the patches and their potential impact on the Windows platforms and app installations. For this cycle, we have grouped the critical updates and required testing efforts into different functional areas: Microsoft Office Test out your Teams logins (which shouldn’t take too long). Because SharePoint was updated, third-party extensions or dependencies will require testing. Due to the change in Outlook, Internet Calendars (ICS files) will require testing. With the Visio update, large CAD drawings will require a basic import and load test. Microsoft.NET and developer tools Microsoft has updated the Microsoft.NET, MSI Installer and Visual Studio with the following testing guidance: PowerShell updates will require a diagnostics test. Try the command, “import-module Microsoft.powershell.diagnostics – verbose” and validate that you are getting the correct results from your home directory. Due to the change in the Windows core installation technology (MSI), please validate that User Account Control (UAC) still functions as expected. Microsoft SQL Server This month is a big update for both Microsoft SQL Server and the local, or workstation supporting elements of OLE. The primary focus for this kind of complex effort should be your line-of-business or core applications. These are the applications that have multiple data connections and rely on complex, multiple object/session requirements. Due to the changes this month, we can’t recommend specific Windows feature testing regimes, as we are most concerned that the business logic (and resulting data) of the application in question might be affected. Only you will know what looks good; we advise a comparative testing regime across unpatched and newly patched systems looking for data disparities. Windows Microsoft made another update to the Win32 and GDI subsystems with a recommendation to test out a significant portion of your application portfolio. We also recommend that you test the following functional areas in the Windows platform: File compression has been updated, so file and archive extraction scenarios will need to be exercised. Due to the Microsoft codec updates, perform a system reboot and test that your audio and camera still work together. Security updates will require the testing of the creation of new Windows certificates. Networking changes will require a test of DNS and DHCP, specifically the DHCP R_DhcpAddSubnetElement API. As part of these changes, testing VPN authentication will be required. Try to include your Network Policy Server (NPS) as part of the connection creation and deletion effort. This month’s update to Remote Desktop Services (RDS) will require the creation and revocation of license requests. A significant update to the Network Driver Interface Specification (NDIS) will require testing of network traffic involving repeated bursts of large files. Try using Teams while this networking burst testing is in progress. Backup and printing have been updated, so test your volumes and ensure that when you print out a test page, your OS does not crash (yes, really). Try printing out TIFF files. (Hey, you might like it.) As part of the ongoing effort to support the new ARM architecture, Microsoft released the first patch for this new platform, CVE-2024-37985. This is an Intel assigned processor-level vulnerability that has been mitigated by a Microsoft OS level patch. The Readiness team has provided guidance on potential ARM-related compatibility and testing issues. Specifically, the Readiness team was concerned with Input Method Editors (IMEs). We suggest a full test cycle of Windows input related features such as keyboard, mouse, touch, pen, gesture and dictation. Some internet shortcuts might be affected as well as wallpapers. Windows lifecycle update This section contains important changes to servicing (and most security updates) to Windows desktop and server platforms. Home and Pro editions of Windows 11, version 22H2 will reach end of service on Oct. 8, 2024. Until then, these editions will only receive security updates. They will no longer receive non-security, preview updates. Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings: Browsers (Microsoft IE and Edge); Microsoft Windows (both desktop and server); Microsoft Office; Microsoft Exchange Server; Microsoft Development platforms (ASP.NET Core,.NET Core and Chakra Core) Adobe (if you get this far). Browsers Microsoft did not release any updates for its non-Chromium browsers. Following the stable channel release of Chrome (applicable until July 25, 2024) we have not seen any changes, deprecations or testing profile updates to this browser. No further action required. Windows Microsoft released four critical and 83 updates rated as important with two zero-day patches (CVE-2024-38080 and CVE-2024-38112) affecting the Microsoft Hyper-V and MSHTML feature groups, respectively. In addition to these critical updates, Microsoft patches for July affect the following Windows feature groups: Windows NTLM, Kernel, GDI and Graphics; Windows Backup; Windows Codecs; Microsoft Hyper-V; Windows (Line) Print and Fax; Windows Remote Desktop and Gateway; Windows Secure Boot and Enrolment Manager. Add these Windows updates to your Patch Now release cycle. Microsoft Office Microsoft returns to form with a critical update for Office this month (CVE-2024-38023) for the SharePoint platform. We have another update for Outlook related to spoofing (CVE-2024-38020), but this vulnerability is not wormable and requires user interaction. There are four more, lower rated updates; please add all of these updates to your standard release schedule. Microsoft SQL (nee Exchange) Server There were no updates for Microsoft Exchange Server this month. However, we have seen the largest release of Microsoft SQL updates in the past few years. These SQL-related updates cover 37 separate reported vulnerabilities (CVEs) and the following main product features SQL Server Native Client OLE DB Provider; Microsoft OLE DB Driver for SQL. We covered the testing requirements for this SQL update in our testing guidance section above. This month’s SQL updates will require some preparation and dedicated testing before adding to your standard release schedule. Microsoft development platforms Microsoft released four, low-profile updates to the Microsoft.NET and Visual Studio platforms. We do not expect serious testing requirements for these vulnerabilities. However, CVE-2024-35264 has been reported as publicly disclosed by Microsoft. This makes this an unusually urgent patch for Microsoft Visual Studio attracting a “Patch Now” rating this month. Adobe Reader (and other third-party updates) Very much as our Microsoft Exchange section has been “hijacked” by SQL Server updates this month, we’re using the Adobe section for third-party updates. (There are no updates to Adobe Reader.) CVE-2024-3596: NPS RADIUS Server. A vulnerability exists in the RADIUS protocol that potentially affects many products and implementations of the RFC 2865 in the UDP version of the RADIUS protocol. CVE-2024-38517 and CVE-2024-39684: GitHub Active Directory Management Rights. The vulnerability assigned to this CVE is in the RapidJSON library which is consumed by the Microsoft Active Directory Rights Management Services Client, hence the inclusion of this CVE with this update. CVE-2024-37985: This memory related update from Intel relates to its prefetcher technology. Affected: Core Windows OS memory related components — particularly the new ARM builds, which I find both confusing and ironic. Read Greg Lambert‘s 2024 Patch Tuesday reports: June May April March February January
https://www.computerworld.com/article/2516836/for-july-microsofts-patch-tuesday-update-fixes-four-ze...
Voir aussi |
56 sources (32 en français)
Date Actuelle
jeu. 21 nov. - 21:27 CET
|