Microsoft released updates today to insert at least 120 security holes in it Windows operating systems and software supported, including two newly discovered vulnerabilities that are being actively exploited. Yes, good people of the Windows world, it’s time to copy and copy once again!
At least 17 of the bugs accumulated in the patent group in August address Microsoft vulnerabilities as “critical”, meaning they could be exploited by malware or malware to gain complete, remote control over a system affected by little or no help from users. This is the sixth month in a row that Microsoft has submitted fixes for more than 100 bugs in its products.
Most troubling of these seems to be CVE-2020-1380, which is a weakness in Internet Explorer which can result in system compromise only by browsing IE on a hacked or malicious website. Microsoft Advice says this flaw is currently being exploited in active attacks.
The other drawback that enjoys active exploitation is CVE-2020-1464, which is a “rest” problem in the virtually Windows-based version, which allows an attacker to bypass Windows security features and upload signed files to Windows. improper way.
Micro’s Zero Day Trend Initiative indicates another adjustment – CVE-2020-1472 – which includes a critical issue in Windows Server versions that may allow an unauthorized attacker to gain administrative access to a Windows domain controller and execute an application of their choice. A domain controller is a server that responds to security authentication requests in a Windows environment, and a compromised domain controller can give attackers the keys to the kingdom within a corporate network.
“It’s rare to see a critically acclaimed rise in privilege, but he deserves it,” ZDI’S said. Dustin Childs. “What ‘s worse is that there is no complete overhaul available.”
Perhaps the most “elite” vulnerability addressed this month gained the name distinction called CVE-2020-1337, and refers to a security hole in Windows Print Spooler service that could allow an attacker or malware to escalate their privileges on a system if they were already registered as a regular (non-administrator) user.
Saturn narang in strong notes that CVE-2020-1337 is a patch bypass for CVE-2020-1048, another Windows Print Spooler vulnerability that met in May 2020. Narang said researchers found the patch for CVE-2020-1048 was incomplete and presented their findings for CVE-2020-1337 at Black hat security conference earlier this month. More information on CVE-2020-1337, including a video demonstration of a concept test usage, is available here.
adobe has kindly given us another month pardon from the patch Flash Player bugs, but it released critical security updates for it balancer and PDF reader products. More information on those updates can be found here.
Keep in mind that while staying updated on Windows patches is a must, it is important to make sure you are only updating after you have backed up your important data and files. A reliable backup means you are less likely to pull your hair out when the strange bumpy piece causes problems with the booting system.
So do yourself a favor and copy your files before installing any patches. Windows 10 even has several built-in tools to help you do it, either based on a file / folder or making a full and bootable copy of your hard drive all at once.
And as always, if you have experience or problems installing any of these patches this month, please consider leaving a comment about it below; there is a better chance that — even — other readers have experienced the same thing and can start here with some helpful tips.
Tags: adobe acrobat, Adobe Reader, Black Hat, CVE-2020-1048, CVE-2020-1337, CVE-2020-1380, CVE-2020-1464, CVE-2020-1472, Dustin Childs, Internet Explorer zero-day, Microsoft Patch Tuesday August 2020, Satnam Narang, Tenable, Trend Micro Zero Day Initiative
This entry was posted on Tuesday, August 11th 2020 at 4:55 pm and is filed under Latest Warnings, Next, Patch Time. You can follow any comments on this entry through the RSS 2.0 feed. You can skip to the end and leave a comment. Pinging is currently not allowed.