SlideShare a Scribd company logo
1 of 59
Patch Tuesday Webinar
Wednesday, July 10, 2019
Hosted by: Chris Goettl & Todd Schell
Dial in: 1-877-668-4490 (US)
Event ID: 802 166 795
Copyright©2019Ivanti.Allrightsreserved
Agenda
July 2019 Patch Tuesday Overview
In the News
Bulletins
Q & A
1
2
3
4
Copyright©2019Ivanti.Allrightsreserved
 Overview
Copyright©2019Ivanti.Allrightsreserved
Copyright©2019Ivanti.Allrightsreserved
 In the News
Copyright©2019Ivanti.Allrightsreserved
In The News . . .
 BlueKeep
 July 1st Sophos Labs posts video showing an exploit of BlueKeep that granted
them root access to a system.
 https://news.sophos.com/en-us/2019/07/01/bluekeep-poc-demonstrates-
risk-of-remote-desktop-exploit/
 “Every CISO right now should have a plan already written down to deal with
BlueKeep once the exploit starts surfacing,”, Craig Williams, Cisco Talos’
director of outreach
 https://www.cyberscoop.com/bluekeep-removal-remote-desktop-
wannacry-notpetya/
 https://www.abc.net.au/news/2019-07-08/microsoft-windows-vulnerability-
bluekeep-and-cyber-security-risk/11277270
Copyright©2019Ivanti.Allrightsreserved
Windows 10 Lifecycle Awareness
 Windows 10 Branch Support
 Complete Lifecycle Fact Sheet
 https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet
Source: Microsoft
Copyright©2019Ivanti.Allrightsreserved
Zero-day Exploited Vulnerabilities
 CVE-2019-0880 Microsoft splwow64 Elevation of Privilege Vulnerability
 A local elevation of privilege vulnerability exists in how splwow64.exe handles
certain calls. An attacker who successfully exploited the vulnerability could
elevate privileges on an affected system from low-integrity to medium-integrity.
 This vulnerability by itself does not allow arbitrary code execution; however, it
could allow arbitrary code to be run if the attacker uses it in combination with
another vulnerability (such as a remote code execution vulnerability or another
elevation of privilege vulnerability) that is capable of leveraging the elevated
privileges when code execution is attempted.
Copyright©2019Ivanti.Allrightsreserved
Zero-day Exploited Vulnerabilities (cont)
 CVE-2019-1132 Win32k Elevation of Privilege Vulnerability
 An elevation of privilege vulnerability exists in Windows when the Win32k
component fails to properly handle objects in memory. An attacker who
successfully exploited this vulnerability could run arbitrary code in kernel mode.
An attacker could then install programs; view, change, or delete data; or create
new accounts with full user rights.
 To exploit this vulnerability, an attacker would first have to log on to the system.
An attacker could then run a specially crafted application that could exploit the
vulnerability and take control of an affected system.
 The update addresses this vulnerability by correcting how Win32k handles
objects in memory
Copyright©2019Ivanti.Allrightsreserved
Zero-day Exploited Vulnerabilities (cont)
 CVE-2019-11707 Type confusion in Array.pop
 A type confusion vulnerability can occur when manipulating JavaScript
objects due to issues in Array.pop. This can allow for an exploitable
crash. We are aware of targeted attacks in the wild abusing this flaw.
 Fixed in 67.0.3
 CVE-2019-11708 Sandbox escape using Prompt:Open
 Insufficient vetting of parameters passed with the Prompt:Open IPC
message between child and parent processes can result in the non-
sandboxed parent process opening web content chosen by a
compromised child process. When combined with additional
vulnerabilities this could result in executing arbitrary code on the user's
computer.
 Fixed in 67.0.4
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities
 CVE-2019-0865 SymCrypt Denial of Service Vulnerability
 A denial of service vulnerability exists when SymCrypt improperly handles a
specially crafted digital signature.
 An attacker could exploit the vulnerability by creating a specially crafted
connection or message.
 The security update addresses the vulnerability by correcting the way SymCrypt
handles digital signatures.
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities (cont)
 CVE-2019-0887 Remote Desktop Services Remote Code Execution
Vulnerability
 A remote code execution vulnerability exists in Remote Desktop Services –
formerly known as Terminal Services – when an authenticated attacker abuses
clipboard redirection. An attacker who successfully exploited this vulnerability
could execute arbitrary code on the victim system. An attacker could then install
programs; view, change, or delete data; or create new accounts with full user
rights.
 To exploit this vulnerability, an attacker must already have compromised a
system running Remote Desktop Services, and then wait for a victim system to
connect to Remote Desktop Services.
 The update addresses the vulnerability by correcting how Remote Desktop
Services handles clipboard redirection.
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities (cont)
 CVE-2019-1068 Microsoft SQL Server Remote Code Execution
Vulnerability
 A remote code execution vulnerability exists in Microsoft SQL Server when it
incorrectly handles processing of internal functions. An attacker who successfully
exploited this vulnerability could execute code in the context of the SQL Server
Database Engine service account.
 To exploit the vulnerability, an authenticated attacker would need to submit a
specially crafted query to an affected SQL server.
 The security update addresses the vulnerability by modifying how the Microsoft
SQL Server Database Engine handles the processing of functions.
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities (cont)
 CVE-2019-1129 Windows Elevation of Privilege Vulnerability
 An elevation of privilege vulnerability exists when Windows AppX Deployment
Service (AppXSVC) improperly handles hard links. An attacker who successfully
exploited this vulnerability could run processes in an elevated context. An
attacker could then install programs; view, change or delete data.
 To exploit this vulnerability, an attacker would first have to log on to the system.
An attacker could then run a specially crafted application that could exploit the
vulnerability and take control of an affected system.
 The security update addresses the vulnerability by correcting how Windows AppX
Deployment Service handles hard links.
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities (cont)
 CVE-2019-0962 Azure Automation Elevation of Privilege Vulnerability
 An elevation of privilege vulnerability exists in Azure Automation “RunAs account”
runbooks for users with contributor role. This vulnerability could potentially allow
members of an organization to access Key Vault secrets through a runbook,
even if these members would personally not have access to that Key Vault.
 To exploit this vulnerability, an attacker must be a member of an organization
who can run runbooks, with only global admins/co-admins who can create the
“run as” account.
 Microsoft is addressing the vulnerability by providing the following scripts for
existing RunAsAutomation accounts that modify existing roles by excluding
access to KeyVault within Azure Automation account.
 https://www.powershellgallery.com/packages/Check-AutomationRunAsAccountRoleAssignments
 https://www.powershellgallery.com/packages/Update-AutomationRunAsAccountRoleAssignments
 https://www.powershellgallery.com/packages/Extend-
AutomationRunAsAccountRoleAssignmentToKeyVault
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities (cont)
 CVE-2018-15664 Docker Elevation of Privilege Vulnerability
 CVE-2018-15664 describes a vulnerability in the Docker runtime (and the
underlying community project, Moby) wherein a malicious/compromised
container can acquire full read/write access to the host operating system where
that container is running. The vulnerability depends on the way that the Docker
runtime handles symbolic links and is most directly exploitable through the
Docker copy API (‘docker cp’ in the Docker CLI).To exploit this vulnerability, an
attacker must be a member of an organization who can run runbooks, with only
global admins/co-admins who can create the “run as” account.
 What is the risk for Azure Kubernetes Service (AKS) and Azure IoT Edge
customers?
 The risk for AKS and Azure IoT Edge customers is minimal as the following need to be
true:
 A container on the host must be compromised.
 The attacker must have access to the host machine, as the docker API is not
exposed by default from outside of the host.
Copyright©2019Ivanti.Allrightsreserved
Publicly Disclosed Vulnerabilities (cont)
 When will the vulnerability be fixed?
 There is a pull request in review to fix this vulnerability. After the fix
is merged in the upstream Moby project, we will build and release a
new Moby build for use with AKS. For Azure IoT Edge customers,
we will make the fixed Moby packages available along with
installation instructions.
 What can customers do in the interim?
 We recommend that customers refrain from allowing the use of the
Docker copy command on their AKS clusters and Azure IoT Edge
devices.
 Note that this article will be updated as additional details become
available.
Copyright©2019Ivanti.Allrightsreserved
Microsoft Exchange Server Advisory 190021
 https://portal.msrc.microsoft.com/en-US/security-
guidance/advisory/ADV190021
 Outlook on the web Cross-Site Scripting Vulnerability
 Affects Exchange Server 2010 SP3, 2013, 2016 and 2019
 Email recipient victim must drag and drop, or paste, a specially crafted SVG
image into a browser tab for exploit to work
 Mitigation per Microsoft - ‘We recommend that administrators for Outlook on
the web block SVG images. This can be accomplished via the Set-
OwaMailboxPolicy command.’
 Instructions - https://docs.microsoft.com/en-
us/powershell/module/exchange/client-access/set-
owamailboxpolicy?view=exchange-ps
Copyright©2019Ivanti.Allrightsreserved
Microsoft Finally Switching to SHA2 Certificates
 https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-signing-
support-requirement-for-windows-and-wsus
 Phased migration process from March to September 2019
 Dual signed SHA1/SHA2 migrating to SHA2 signed only
 Legacy OS and WSUS require updates
 As of July 9, the following OS updates are SHA2-signed only
 Server 2008 SP2
 Windows 10 1709, 1803, 1809, 1903 and Server 2019
 And after July 16 you can add
 Windows 10 1507, 1607 and 1703
 All current Ivanti products support this change
Copyright©2019Ivanti.Allrightsreserved
Microsoft Patch Tuesday Updates of Interest
 Advisory 990001 Latest Servicing Stack Updates
 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001
 July Releases
 KB 4504418 – Server 2012
 KB 4504418 – Windows 8.1/Server 2012 R2
 KB 4509090 – Windows 10
 KB 4499091 – Windows 10 1607/Server 2016 (pre-req for new updates)
 KB 4509092 – Windows 10 1703
 KB 4509093 – Windows 10 1709/Server version 1709
 KB 4509094 – Windows 10 1803/Server version 1803
 KB 4509095 – Windows 10 1809/Server 2019
 KB 4509096 – Windows 10 1903/Server version 1903
Copyright©2019Ivanti.Allrightsreserved
Microsoft Patch Tuesday Updates of Interest (cont)
 Development Tool Updates
 Azure DevOps Server 2019.0.1
 Azure IoT Edge
 Team Foundation Server 2010 SP1 and 2018 Update 3.2
 Updated Development Components/Packages
 ChakraCore
 ASP.NET core 2.1 and 2.2
 Visual Studio 2010 SP1 – 2019 version 16.1
Copyright©2019Ivanti.Allrightsreserved
Weekly Patch BLOG
 Latest Patch Releases
 Microsoft and Third-party
 Security and non-Security
 CVE Analysis
 Security Events of Interest
 Host: Brian Secrist
 https://www.ivanti.com/blog/
topics/patch-tuesday
Copyright©2019Ivanti.Allrightsreserved
Patch Content Announcement System
Announcements Now Posted on Community Forum Pages
 https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2
 Subscribe to receive email for the desired product(s)
Copyright©2019Ivanti.Allrightsreserved
 Bulletins
Copyright©2019Ivanti.Allrightsreserved
MSFA-2019-21: Security Update for Firefox
 Maximum Severity: Critical
 Affected Products: Mozilla Firefox
 Description: This update provides fixes for 21 vulnerabilities in Firefox 68.
 Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Elevation of
Privilege and Information Disclosure
 Fixes 21 Vulnerabilities: See https://www.mozilla.org/en-
US/security/advisories/mfsa2019-21 for a list and description of CVEs remediated.
 Restart Required: Requires restart
Copyright©2019Ivanti.Allrightsreserved
MSFA-2019-22: Security Update for Firefox ESR
 Maximum Severity: Critical
 Affected Products: Mozilla Firefox ESR
 Description: This update provides fixes for 11 vulnerabilities in Firefox 60.8.
 Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Elevation of
Privilege and Information Disclosure
 Fixes 11 Vulnerabilities: See https://www.mozilla.org/en-
US/security/advisories/mfsa2019-22 for a list and description of CVEs remediated.
 Restart Required: Requires restart
Copyright©2019Ivanti.Allrightsreserved
MS19-07-W10: Windows 10 Update
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803,
1809,1903, Server 2016, Server 2019, Server 1709, Server 1803, IE 11 and Microsoft
Edge
 Description: This bulletin references 10 KB articles. See KBs for the list of changes.
 Impact: Remote Code Execution, Security Feature Bypass, Denial of Service,
Elevation of Privilege, and Information Disclosure
 Fixes 53 Vulnerabilities: CVE-2019-0865, CVE-2019-0887 and CVE-2019-1129 are
publicly disclosed. CVE-2019-0880 is known exploited and publicly disclosed. See
Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slides
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 10
 KB 4507460 – Windows 10, Version 1607 and Server 2016
 For hosts managed by System Center Virtual Machine Manager (SCVMM), SCVMM cannot
enumerate and manage logical switches deployed on the host after installing the update.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the
hosts. Workaround: Run mofcomp on the following mof files on the affected host:
Scvmmswitchportsettings.mof and VMMDHCPSvr.mof. Follow the best practices.
 After installing KB 4467684, the cluster service may fail to start with the error “2245
(NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with
greater than 14 characters. Workaround: Set the domain default "Minimum Password Length"
policy to less than or equal to 14 characters. Microsoft is working on a resolution.
 [File Rename] Certain operations, such as rename, that you perform on files or folders that are
on a Cluster Shared Volume (CSV) may fail with the error,
“STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the
operation on a CSV owner node from a process that doesn’t have administrator privilege.
Workaround: Perform the operation from a process that has administrator privilege or perform
the operation from a node that doesn’t have CSV ownership. Microsoft is working on a
resolution.
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 10 (cont)
 KB 4507460 – Windows 10, Version 1607 and Server 2016
 Some applications may fail to run as expected on clients of Active Directory Federation Services
2016 (AD FS 2016) after installation of this update on the server. Applications that may exhibit
this behavior use an IFRAME during non-interactive authentication requests and receive X-
Frame Options set to DENY. Workaround: Use the Allow-From value of the header if the
IFRAME is only accessing pages from a single-origin URL. Directions in KB. Microsoft is
working on a resolution.
 [Window-Eyes] After installing this update, opening or using the Window-Eyes screen reader
app may result in an error and some features may not function as expected. Note: Users who
have already migrated from Window-Eyes to Freedom Scientific's other screen reader, JAWS,
should not be affected by this issue. Workaround: None. Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 10 (cont)
 KB 4507450 – Windows 10, Version 1703
 [File Rename] Issue
 [Window-Eyes] Issue
 KB 4507455 – Windows 10, Version 1709
 [File Rename] Issue
 [Window-Eyes] Issue
 KB 4507435 – Windows 10, Version 1803
 [File Rename] Issue
 [Window-Eyes] Issue
 [Black Logon] A small number of devices may startup to a black screen during the first logon
after installing updates. Workaround: Press Ctrl+Alt+Delete, then select the Power button in
the lower right corner of the screen and select Restart. Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 10 (cont)
 KB 4507469 – Windows 10, Version 1809, Server 2019 All Versions
 [File Rename] Issue
 [Window-Eyes] Issue
 [Black Logon] Issue
 After installing KB4493509, devices with some Asian language packs installed may receive the
error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“ Workaround:
Uninstall and reinstall any recently added language packs or select Check for Updates and
install the April 2019 Cumulative Update. See KB for more recovery details. Microsoft is
working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 10 (cont)
 KB 4507453 – Windows 10, Version 1903, Windows Server version 2019
 [Window-Eyes] Issue
 Windows Sandbox may fail to start with "ERROR_FILE_NOT_FOUND (0x80070002)" on
devices in which the operating system language is changed during the update process when
installing Windows 10, version 1903. Workaround: None. Microsoft is working on a resolution.
 The Remote Access Connection Manager (RASMAN) service may stop working and you may
receive the error “0xc0000005” on devices where the diagnostic data level is manually
configured to the non-default setting of 0. You may also receive an error in the Application
section of Windows Logs in Event Viewer with Event ID 1000 referencing
“svchost.exe_RasMan” and “rasman.dll”. This issue only occurs when a VPN profile is
configured as an Always On VPN (AOVPN) connection with or without device tunnel. This does
not affect manual only VPN profiles or connections. Workaround: See KB for detailed
instructions to configure one of the default telemetry settings. Microsoft is working on a
resolution.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-IE: Security Updates for Internet Explorer
 Maximum Severity: Critical
 Affected Products: Microsoft Internet Explorer 9,10,11
 Description: The fixes that are included in the cumulative Security Update for Internet
Explorer are also included in the July 2019 Security Monthly Quality Rollup. Installing
either the Security Update for Internet Explorer or the Security Monthly Quality Rollup
installs the fixes that are in the cumulative update. This bulletin references 12 KB
articles.
 Impact: Remote Code Execution
 Fixes 6 Vulnerabilities: CVE-2019-1001, CVE-2019-1004, CVE-2019-1056, CVE-
2019-1059, CVE-2019-1063, CVE-2019-1104
 Restart Required: Requires browser restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Internet Explorer
 KB 4507434 – Internet Explorer 11 on Windows Server 2012 R2, Internet
Explorer 11 on Windows Server 2012, Internet Explorer 11 on Windows Server
2008 R2 SP1, Internet Explorer 11 on Windows 8.1 Update, Internet Explorer
11 on Windows 7 SP1, Internet Explorer 10 on Windows Server 2012, Internet
Explorer 9 on Windows Server 2008 SP2
 [Window-Eyes] Issue
 This cumulative security update 4507434 for Internet Explorer 10 might be offered for installation
through Windows Server Update Services (WSUS) or other update management solutions, even
after you install KB4492872 (Internet Explorer 11 for Windows Server 2012 and Windows
Embedded 8 Standard) and upgrade to Internet Explorer 11. Workaround: Although this
cumulative security update for Internet Explorer 10 might be offered for installation, this issue will
not affect the functionality of Internet Explorer 11. However, you should also install KB4507434
to apply the security fixes that are resolved this month for Internet Explorer 11. Microsoft is
working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-MR2K8: Monthly Rollup for Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008 and IE 9
 Description: This security update includes improvements and fixes that were a part of
update KB 4503271 (released June 20, 2019). Security updates to Windows Server,
Microsoft Graphics Component, Windows Shell, Windows Input and Composition, and
Windows Kernel. This bulletin is based on KB 4507452.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 20 + 4 (IE) Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019-
1071, CVE-2019-1073, CVE-2019-1085, CVE-2019-1088, CVE-2019-1089, CVE-2019-
1093, CVE-2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-1097, CVE-2019-
1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-1102, CVE-2019-
1108, CVE-2019-1116, CVE-2019-1132.
 Restart Required: Requires restart
 Known Issues: Latest SSU (April KB 4493730) can hang during restart.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SO2K8: Security-only Update for Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008
 Description: Security updates to Windows Server, Microsoft Graphics Component,
Windows Shell, Windows Input and Composition, and Windows Kernel. This bulletin is
based on KB 4507461.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 20 Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019-1071, CVE-
2019-1073, CVE-2019-1085, CVE-2019-1088, CVE-2019-1089, CVE-2019-1093, CVE-
2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-1097, CVE-2019-1098, CVE-
2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-1102, CVE-2019-1108, CVE-
2019-1116, CVE-2019-1132.
 Restart Required: Requires restart
 Known Issues: Latest SSU (April KB 4493730) can hang during restart.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-MR7: Monthly Rollup for Win 7 and Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7, Server 2008 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4503277 (released June 20, 2019). Security updates to Windows Server,
Microsoft Graphics Component, Windows Storage and Filesystems, Windows Shell,
Windows Input and Composition, and Windows Kernel. This bulletin is based on KB
4507449.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 21 + 6 (IE) Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019-
1071, CVE-2019-1073, CVE-2019-1082, CVE-2019-1085, CVE-2019-1088, CVE-2019-
1089, CVE-2019-1093, CVE-2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-
1097, CVE-2019-1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-
1102, CVE-2019-1108, CVE-2019-1116, CVE-2019-1132.
 Restart Required: Requires restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 7 and Server 2008 R2
 KB 4507449 – Windows 7 SP1 and Server 2008 R2 SP1 (Monthly Rollup)
 [McAfee] Microsoft and McAfee have identified an issue on devices with McAfee Endpoint
Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or
McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup
or become unresponsive at restart after installing this update.
 Workarounds:
 McAfee Security(ENS) Threat Prevention 10.x
 McAfee Host Intrusion Prevention (Host IPS) 8.0
 McAfee VirusScan Enterprise (VSE) 8.8
 Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SO7: Security-only Update for Win 7 and Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7 SP1, Server 2008 R2 SP1
 Description: Security updates to Windows Server, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Shell, Windows Input and Composition,
and Windows Kernel. This bulletin is based on KB 4507456.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 21 Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019-1071, CVE-
2019-1073, CVE-2019-1082, CVE-2019-1085, CVE-2019-1088, CVE-2019-1089, CVE-
2019-1093, CVE-2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-1097, CVE-
2019-1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-1102, CVE-
2019-1108, CVE-2019-1116, CVE-2019-1132.
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-07-MR8: Monthly Rollup for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012 and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4503295 (released June 21, 2019). Security updates to Windows Server,
Windows Storage and Filesystems, Microsoft Graphics Component, Windows Kernel,
Windows App Platform and Frameworks, and Windows Server. This bulletin is based
on KB 4507462.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 18 + 6 (IE) Vulnerabilities: CVE-2019-0785, CVE-2019-0880, CVE-2019-
0887, CVE-2019-1006, CVE-2019-1071, CVE-2019-1073, CVE-2019-1082, CVE-2019-
1085, CVE-2019-1088, CVE-2019-1089, CVE-2019-1093, CVE-2019-1094, CVE-2019-
1095, CVE-2019-1096, CVE-2019-1097, CVE-2019-1102, CVE-2019-1108, CVE-2019-
1130.
 Restart Required: Requires restart
 Known Issues: [File Rename] Issue
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SO8: Security-only Update for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012
 Description: Security updates to Windows Server, Windows Storage and Filesystems,
Microsoft Graphics Component, Windows Kernel, Windows App Platform and
Frameworks, and Windows Server. This bulletin is based on KB 4507464.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 18 Vulnerabilities: CVE-2019-0785, CVE-2019-0880, CVE-2019-0887, CVE-
2019-1006, CVE-2019-1071, CVE-2019-1073, CVE-2019-1082, CVE-2019-1085, CVE-
2019-1088, CVE-2019-1089, CVE-2019-1093, CVE-2019-1094, CVE-2019-1095, CVE-
2019-1096, CVE-2019-1097, CVE-2019-1102, CVE-2019-1108, CVE-2019-1130.
 Restart Required: Requires restart
 Known Issues: [File Rename] Issue
Copyright©2019Ivanti.Allrightsreserved
MS19-07-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4503283 (released June 20, 2019). Security updates to Windows Wireless
Networking, Windows Server, Windows Storage and Filesystems, Microsoft Graphics
Component, Windows Input and Composition, Windows Kernel, and Windows App
Platform and Frameworks. This bulletin is based on KB 4507448.
 Impact: Remote Code Execution, Security Feature Bypass, Denial of Service,
Elevation of Privilege, and Information Disclosure
 Fixes 22 + 6 (IE) Vulnerabilities: CVE-2019-0880 is known exploited and CVE-
2019-0887 is publicly disclosed. See Details column of Security Update Guide for the
complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
July Known Issues for Windows 8.1 and Server 2012 R2
 KB 4507448 – Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)
 [File Rename] Issue
 [McAfee] Issue
 [Windows-Eyes] Issue
 KB 4507457 – Windows 8.1, Windows Server 2012 R2 (Security-only Update)
 [File Rename] Issue
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SO81: Security-only Update for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2
 Description: Security updates to Windows Wireless Networking, Windows Server,
Windows Storage and Filesystems, Microsoft Graphics Component, Windows Input
and Composition, Windows Kernel, and Windows App Platform and Frameworks. This
bulletin is based on KB 4507457.
 Impact: Remote Code Execution, Security Feature Bypass, Denial of Service,
Elevation of Privilege, and Information Disclosure
 Fixes 22 Vulnerabilities: CVE-2019-0880 is known exploited and CVE-2019-0887 is
publicly disclosed. See Details column of Security Update Guide for the complete list
of CVEs.
 Restart Required: Requires restart
 Known Issues: See previous slide
Copyright©2019Ivanti.Allrightsreserved
MS19-07-MRNET: Monthly Rollup for Microsoft .Net
 Maximum Severity: Critical
 Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8
 Description: Security updates address a remote code execution vulnerability where
the software fails to check the source markup of a file; an Authentication Bypass
vulnerability in WCF and WIF, allowing signing of SAML tokens with arbitrary symmetric
keys; and an information disclosure vulnerability where Exchange and Azure Active
Directory allow creation of entities with Display Names having non-printable characters.
This bulletin references 19 KB articles.
 Impact: Remote Code Execution, Denial of Service, and Elevation of Privilege
 Fixes 3 Vulnerabilities: CVE-2019-1006, CVE-2019-1083, CVE-2019-1113
 Restart Required: Does not require a system restart after you apply it unless files
that are being updated are locked or are being used.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SONET: Security-only Update for Microsoft .Net
 Maximum Severity: Critical
 Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8
 Description: Security updates address a remote code execution vulnerability where
the software fails to check the source markup of a file; an Authentication Bypass
vulnerability in WCF and WIF, allowing signing of SAML tokens with arbitrary symmetric
keys; and an information disclosure vulnerability where Exchange and Azure Active
Directory allow creation of entities with Display Names having non-printable characters.
This bulletin references 19 KB articles.
 Impact: Remote Code Execution, Denial of Service, and Elevation of Privilege
 Fixes 3 Vulnerabilities: CVE-2019-1006, CVE-2019-1083, CVE-2019-1113
 Restart Required: Does not require a system restart after you apply it unless files
that are being updated are locked or are being used.
Copyright©2019Ivanti.Allrightsreserved
MS19-07-OFF: Security Updates for Microsoft Office
 Maximum Severity: Important
 Affected Products: Excel 2010-2016, Lync 2013, Office 2010-2016, Office 2016 and
2019 for Mac, Outlook 2010-2016, Skype for Business 2016
 Description: This security update resolves vulnerabilities in several Microsoft Office
applications. This bulletin references 16 KB articles plus release notes for MacOS.
 Impact: Remote Code Execution, Spoofing, Information Disclosure
 Fixes 4 Vulnerabilities: CVE-2019-1084, CVE-2019-1109, CVE-2019-1110, CVE-
2019-1111
 Restart Required: Requires application restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-07-O365: Security Updates for Office 365 ProPlus
 Maximum Severity: Important
 Affected Products: Office 365 ProPlus, Office 2019
 Description: This month’s update resolved various bugs and performance issues in
Microsoft Office 365 applications. Information on Office 365 ProPlus updates is
available at https://docs.microsoft.com/en-us/officeupdates/release-notes-office365-
proplus
 Impact: Remote Code Execution, Spoofing, Information Disclosure
 Fixes 5 Vulnerabilities: CVE-2019-1084, CVE-2019-1109, CVE-2019-1110, CVE-
2019-1111, CVE-2019-1112
 Restart Required: Requires application restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SPT: Security Updates for SharePoint Server
 Maximum Severity: Important
 Affected Products: Microsoft Enterprise SharePoint Server 2010-2019
 Description: This security update resolves vulnerabilities in Microsoft Office that could
allow remote code execution if a user opens a specially crafted Office file. This bulletin
is based on 5 KB articles.
 Impact: Spoofing and Elevation of Privilege
 Fixes 2 Vulnerabilities: CVE-2019-1006, CVE-2019-1134
 Restart Required: Requires Restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-07-SQL: Security Updates for SQL Server
 Maximum Severity: Important
 Affected Products: Microsoft SQL Server 2014-2017
 Description: This security update fixes a remote code execution vulnerability in
Microsoft SQL Server where it incorrectly handles processing of internal functions. An
attacker who successfully exploited this vulnerability could execute code in the context
of the SQL Server Database Engine service account. This bulletin is based on 9 KB
articles.
 Impact: Remote Code Execution
 Fixes 1 Vulnerability: CVE-2019-1068
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-07-EX: Security Updates for Exchange Server
 Maximum Severity: Important
 Affected Products: Microsoft Exchange Server 2010-2019
 Description: This security update validates display names upon creation in Microsoft
Exchange, and renders invalid display names correctly in Microsoft Outlook clients;
ensures that Exchange Server properly sanitizes web requests; and changes the way
EWS handles NTLM tokens to prevent access to other user’s mailboxes. This bulletin
is based on KBs 4509408, 4509409 and 4509410.
 Impact: Spoofing, Elevation of Privilege, and Information Disclosure
 Fixes 3 Vulnerabilities: CVE-2019-1084, CVE-2019-1136 and CVE-2019-1137
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
Between Patch Tuesday’s
New Product Support: None
Security Updates: Adobe Acrobat (3), Camtasia (1), CCleaner (2), Citrix Receiver (1),
DropBox (1), Evernote (1), Firefox (2), Firefox ESR (2), FileZilla (1), GIMP (1), GOM
Player (1), Google Chrome (2), Microsoft (1), Nitro Pro (2), Node.JS (2), Notepad++ (1),
Opera (3), Power BI Desktop (3), Plex Media Server (2), PeaZip (1), Slack (2), Tableau
Desktop (5), Tableau Prep (1), Tableau Reader (1), Thunderbird (2), VLC Player (1),
VMware Horizon Client (2), Visual Studio Code (1)
Non-Security Updates: Box Edit (1), Blue Jeans (1), GoodSync (4), Google Backup
and Sync (3), Microsoft (50), Plex Media Player (2), Skype (1), Zoom Client (1), Zoom
Outlook Plugin (1)
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information
 Firefox 67.0.3, Firefox 67.0.4
 FF19-015, QFF6703, QFF6704
 Fixes 2 Vulnerabilities: CVE-2019-11707, CVE-2019-11708
 Firefox ESR 60.7.1, Firefox ESR 60.7.2
 FF19-6072, QFFE6071, QFFE6072
 Fixes 2 Vulnerabilities: CVE-2019-11707, CVE-2019-11708
 Google Chrome 75.0.3770.100
 CHROME-256, QGC7503770100
 Fixes 1 Vulnerability: CVE-2019-5842
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 Thunderbird 60.7.1
 TB19-6071, QTB6071
 Fixes 4 Vulnerabilities: CVE-2019-11703, CVE-2019-11704, CVE-2019-11705,
CVE-2019-11706
 Thunderbird 60.7.2
 TB19-6072, QTB6072
 Fixes 2 Vulnerability: CVE-2019-11707, CVE-2019-11708
Copyright©2019Ivanti.Allrightsreserved
 Wanted!
Copyright©2019Ivanti.Allrightsreserved
Ivanti Cloud and Patch Intelligence
 What is Patch Intelligence?
 Patch Intelligence is part of our Ivanti Cloud platform and is focused on solving
the next big challenges in patching your environment.
 Bridging the gap between Security and Operations
 Prioritization of updates
 Reconciling Risk vs Reliability
 Understanding known issues
 Crowd sourcing testing and issue gathering
 We are looking for early adopters who want to help us build the experience around
Patch Intelligence
 Contact Patch Intelligence Product Manager Helen Brown at
helen.brown@Ivanti.com
Copyright©2019Ivanti.Allrightsreserved
Ivanti Security Controls 2019.2
 What is coming in ISEC 2019.2?
 CentOS support
 3 Canned Multi-Platform reports
 Updated report views with Linux tables for Xtraction or integration with other solutions
 Machine View that shows a combined view of all discovered machines (Windows and
Linux)
 Added an ‘audit history’ of patch deployments
 Updated CVE Import to show more metadata and import now consolidates Windows and
Linux into a single step
 API has been updated to support a connector into Ivanti Cloud to feed data into Patch
Intelligence and other parts of Ivanti Cloud
 We are looking for early adopters who want to help us build the experience around
Patch Intelligence
 Contact Patch Intelligence Product Manager Helen Brown at
Sara.Otremba@Ivanti.com
Copyright©2019Ivanti.Allrightsreserved
Thank You

More Related Content

What's hot

There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806Ivanti
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisIvanti
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019Ivanti
 
January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018Ivanti
 
October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018Ivanti
 
December 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday AnalysisDecember 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday AnalysisIvanti
 
July Patch Tuesday 2020
July Patch Tuesday 2020July Patch Tuesday 2020
July Patch Tuesday 2020Dan Lalli
 
July 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisJuly 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisIvanti
 
September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018Ivanti
 
Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti
 
MIIM v4 Installation Guide - Server 2012
MIIM v4 Installation Guide - Server 2012MIIM v4 Installation Guide - Server 2012
MIIM v4 Installation Guide - Server 2012samuelhuber
 
Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020
Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020
Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020Ivanti
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti
 
Patch Tuesday Analysis - October 2015
Patch Tuesday Analysis - October 2015Patch Tuesday Analysis - October 2015
Patch Tuesday Analysis - October 2015Ivanti
 
Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016Ivanti
 
Patch Tuesday Analysis - May 2016
Patch Tuesday Analysis - May 2016Patch Tuesday Analysis - May 2016
Patch Tuesday Analysis - May 2016Ivanti
 
Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016Ivanti
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEAjith Kp
 
Open Source for You: Etherios Cloud Connector
Open Source for You: Etherios Cloud ConnectorOpen Source for You: Etherios Cloud Connector
Open Source for You: Etherios Cloud ConnectorEtherios
 

What's hot (20)

There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806There's more to third-party patching than SCCM 1806
There's more to third-party patching than SCCM 1806
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday Analysis
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
 
January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018
 
October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018
 
December 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday AnalysisDecember 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday Analysis
 
July Patch Tuesday 2020
July Patch Tuesday 2020July Patch Tuesday 2020
July Patch Tuesday 2020
 
July 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisJuly 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday Analysis
 
September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018September Patch Tuesday Analysis 2018
September Patch Tuesday Analysis 2018
 
Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019
 
MIIM v4 Installation Guide - Server 2012
MIIM v4 Installation Guide - Server 2012MIIM v4 Installation Guide - Server 2012
MIIM v4 Installation Guide - Server 2012
 
Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020
Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020
Présentation webinar Ivanti - Analyse du Patch Tuesday - Janvier 2020
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020
 
Patch Tuesday Analysis - October 2015
Patch Tuesday Analysis - October 2015Patch Tuesday Analysis - October 2015
Patch Tuesday Analysis - October 2015
 
Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016
 
Patch Tuesday Analysis - May 2016
Patch Tuesday Analysis - May 2016Patch Tuesday Analysis - May 2016
Patch Tuesday Analysis - May 2016
 
Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
Masque attack
Masque attackMasque attack
Masque attack
 
Open Source for You: Etherios Cloud Connector
Open Source for You: Etherios Cloud ConnectorOpen Source for You: Etherios Cloud Connector
Open Source for You: Etherios Cloud Connector
 

Similar to July Patch Tuesday 2019

Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020Ivanti
 
August Patch Tuesday Analysis
August Patch Tuesday AnalysisAugust Patch Tuesday Analysis
August Patch Tuesday AnalysisIvanti
 
Français Patch Tuesday – Novembre
Français Patch Tuesday – NovembreFrançais Patch Tuesday – Novembre
Français Patch Tuesday – NovembreIvanti
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti
 
Patch Tuesday de Noviembre
Patch Tuesday de NoviembrePatch Tuesday de Noviembre
Patch Tuesday de NoviembreIvanti
 
2023 November Patch Tuesday
2023 November Patch Tuesday2023 November Patch Tuesday
2023 November Patch TuesdayIvanti
 
Patch Tuesday Italia Novembre
Patch Tuesday Italia NovembrePatch Tuesday Italia Novembre
Patch Tuesday Italia NovembreIvanti
 
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti MohulCsa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti MohulCloud Security Alliance, UK chapter
 
Patch Tuesday de Julio
Patch Tuesday de JulioPatch Tuesday de Julio
Patch Tuesday de JulioIvanti
 
2023 July Patch Tuesday
2023 July Patch Tuesday2023 July Patch Tuesday
2023 July Patch TuesdayIvanti
 
Analyse Patch Tuesday - Juillet
Analyse Patch Tuesday - JuilletAnalyse Patch Tuesday - Juillet
Analyse Patch Tuesday - JuilletIvanti
 
October2020 patchtuesday[1] read-only
October2020 patchtuesday[1]     read-onlyOctober2020 patchtuesday[1]     read-only
October2020 patchtuesday[1] read-onlyIvanti
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020Ivanti
 
Français Patch Tuesday – Octobre
Français Patch Tuesday – OctobreFrançais Patch Tuesday – Octobre
Français Patch Tuesday – OctobreIvanti
 
2023 Patch Tuesday de Octubre
2023 Patch Tuesday de Octubre2023 Patch Tuesday de Octubre
2023 Patch Tuesday de OctubreIvanti
 
2023 October Patch Tuesday
2023 October Patch Tuesday2023 October Patch Tuesday
2023 October Patch TuesdayIvanti
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020 Ivanti
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 

Similar to July Patch Tuesday 2019 (20)

Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020
 
August Patch Tuesday Analysis
August Patch Tuesday AnalysisAugust Patch Tuesday Analysis
August Patch Tuesday Analysis
 
Français Patch Tuesday – Novembre
Français Patch Tuesday – NovembreFrançais Patch Tuesday – Novembre
Français Patch Tuesday – Novembre
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020
 
Patch Tuesday de Noviembre
Patch Tuesday de NoviembrePatch Tuesday de Noviembre
Patch Tuesday de Noviembre
 
2023 November Patch Tuesday
2023 November Patch Tuesday2023 November Patch Tuesday
2023 November Patch Tuesday
 
Patch Tuesday Italia Novembre
Patch Tuesday Italia NovembrePatch Tuesday Italia Novembre
Patch Tuesday Italia Novembre
 
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti MohulCsa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
Csa UK agm 2019 - Web API attacks - Trends seen in the field Kriti Mohul
 
Patch Tuesday de Julio
Patch Tuesday de JulioPatch Tuesday de Julio
Patch Tuesday de Julio
 
2023 July Patch Tuesday
2023 July Patch Tuesday2023 July Patch Tuesday
2023 July Patch Tuesday
 
Analyse Patch Tuesday - Juillet
Analyse Patch Tuesday - JuilletAnalyse Patch Tuesday - Juillet
Analyse Patch Tuesday - Juillet
 
October2020 patchtuesday[1] read-only
October2020 patchtuesday[1]     read-onlyOctober2020 patchtuesday[1]     read-only
October2020 patchtuesday[1] read-only
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
 
50679.pdf
50679.pdf50679.pdf
50679.pdf
 
Français Patch Tuesday – Octobre
Français Patch Tuesday – OctobreFrançais Patch Tuesday – Octobre
Français Patch Tuesday – Octobre
 
2023 Patch Tuesday de Octubre
2023 Patch Tuesday de Octubre2023 Patch Tuesday de Octubre
2023 Patch Tuesday de Octubre
 
2023 October Patch Tuesday
2023 October Patch Tuesday2023 October Patch Tuesday
2023 October Patch Tuesday
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 

More from Ivanti

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de AbrilIvanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia AprileIvanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - MarsIvanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de MarzoIvanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia MarzoIvanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de FebreroIvanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - FévrierIvanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioIvanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch TuesdayIvanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch TuesdayIvanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch TuesdayIvanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch TuesdayIvanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de EneroIvanti
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – JanvierIvanti
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch TuesdayIvanti
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de DiciembreIvanti
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – DécembreIvanti
 

More from Ivanti (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – Janvier
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch Tuesday
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de Diciembre
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – Décembre
 

Recently uploaded

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 

Recently uploaded (20)

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 

July Patch Tuesday 2019

  • 1. Patch Tuesday Webinar Wednesday, July 10, 2019 Hosted by: Chris Goettl & Todd Schell Dial in: 1-877-668-4490 (US) Event ID: 802 166 795
  • 2. Copyright©2019Ivanti.Allrightsreserved Agenda July 2019 Patch Tuesday Overview In the News Bulletins Q & A 1 2 3 4
  • 6. Copyright©2019Ivanti.Allrightsreserved In The News . . .  BlueKeep  July 1st Sophos Labs posts video showing an exploit of BlueKeep that granted them root access to a system.  https://news.sophos.com/en-us/2019/07/01/bluekeep-poc-demonstrates- risk-of-remote-desktop-exploit/  “Every CISO right now should have a plan already written down to deal with BlueKeep once the exploit starts surfacing,”, Craig Williams, Cisco Talos’ director of outreach  https://www.cyberscoop.com/bluekeep-removal-remote-desktop- wannacry-notpetya/  https://www.abc.net.au/news/2019-07-08/microsoft-windows-vulnerability- bluekeep-and-cyber-security-risk/11277270
  • 7. Copyright©2019Ivanti.Allrightsreserved Windows 10 Lifecycle Awareness  Windows 10 Branch Support  Complete Lifecycle Fact Sheet  https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet Source: Microsoft
  • 8. Copyright©2019Ivanti.Allrightsreserved Zero-day Exploited Vulnerabilities  CVE-2019-0880 Microsoft splwow64 Elevation of Privilege Vulnerability  A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.  This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.
  • 9. Copyright©2019Ivanti.Allrightsreserved Zero-day Exploited Vulnerabilities (cont)  CVE-2019-1132 Win32k Elevation of Privilege Vulnerability  An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.  To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.  The update addresses this vulnerability by correcting how Win32k handles objects in memory
  • 10. Copyright©2019Ivanti.Allrightsreserved Zero-day Exploited Vulnerabilities (cont)  CVE-2019-11707 Type confusion in Array.pop  A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.  Fixed in 67.0.3  CVE-2019-11708 Sandbox escape using Prompt:Open  Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non- sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.  Fixed in 67.0.4
  • 11. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities  CVE-2019-0865 SymCrypt Denial of Service Vulnerability  A denial of service vulnerability exists when SymCrypt improperly handles a specially crafted digital signature.  An attacker could exploit the vulnerability by creating a specially crafted connection or message.  The security update addresses the vulnerability by correcting the way SymCrypt handles digital signatures.
  • 12. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities (cont)  CVE-2019-0887 Remote Desktop Services Remote Code Execution Vulnerability  A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an authenticated attacker abuses clipboard redirection. An attacker who successfully exploited this vulnerability could execute arbitrary code on the victim system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.  To exploit this vulnerability, an attacker must already have compromised a system running Remote Desktop Services, and then wait for a victim system to connect to Remote Desktop Services.  The update addresses the vulnerability by correcting how Remote Desktop Services handles clipboard redirection.
  • 13. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities (cont)  CVE-2019-1068 Microsoft SQL Server Remote Code Execution Vulnerability  A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account.  To exploit the vulnerability, an authenticated attacker would need to submit a specially crafted query to an affected SQL server.  The security update addresses the vulnerability by modifying how the Microsoft SQL Server Database Engine handles the processing of functions.
  • 14. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities (cont)  CVE-2019-1129 Windows Elevation of Privilege Vulnerability  An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.  To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.  The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
  • 15. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities (cont)  CVE-2019-0962 Azure Automation Elevation of Privilege Vulnerability  An elevation of privilege vulnerability exists in Azure Automation “RunAs account” runbooks for users with contributor role. This vulnerability could potentially allow members of an organization to access Key Vault secrets through a runbook, even if these members would personally not have access to that Key Vault.  To exploit this vulnerability, an attacker must be a member of an organization who can run runbooks, with only global admins/co-admins who can create the “run as” account.  Microsoft is addressing the vulnerability by providing the following scripts for existing RunAsAutomation accounts that modify existing roles by excluding access to KeyVault within Azure Automation account.  https://www.powershellgallery.com/packages/Check-AutomationRunAsAccountRoleAssignments  https://www.powershellgallery.com/packages/Update-AutomationRunAsAccountRoleAssignments  https://www.powershellgallery.com/packages/Extend- AutomationRunAsAccountRoleAssignmentToKeyVault
  • 16. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities (cont)  CVE-2018-15664 Docker Elevation of Privilege Vulnerability  CVE-2018-15664 describes a vulnerability in the Docker runtime (and the underlying community project, Moby) wherein a malicious/compromised container can acquire full read/write access to the host operating system where that container is running. The vulnerability depends on the way that the Docker runtime handles symbolic links and is most directly exploitable through the Docker copy API (‘docker cp’ in the Docker CLI).To exploit this vulnerability, an attacker must be a member of an organization who can run runbooks, with only global admins/co-admins who can create the “run as” account.  What is the risk for Azure Kubernetes Service (AKS) and Azure IoT Edge customers?  The risk for AKS and Azure IoT Edge customers is minimal as the following need to be true:  A container on the host must be compromised.  The attacker must have access to the host machine, as the docker API is not exposed by default from outside of the host.
  • 17. Copyright©2019Ivanti.Allrightsreserved Publicly Disclosed Vulnerabilities (cont)  When will the vulnerability be fixed?  There is a pull request in review to fix this vulnerability. After the fix is merged in the upstream Moby project, we will build and release a new Moby build for use with AKS. For Azure IoT Edge customers, we will make the fixed Moby packages available along with installation instructions.  What can customers do in the interim?  We recommend that customers refrain from allowing the use of the Docker copy command on their AKS clusters and Azure IoT Edge devices.  Note that this article will be updated as additional details become available.
  • 18. Copyright©2019Ivanti.Allrightsreserved Microsoft Exchange Server Advisory 190021  https://portal.msrc.microsoft.com/en-US/security- guidance/advisory/ADV190021  Outlook on the web Cross-Site Scripting Vulnerability  Affects Exchange Server 2010 SP3, 2013, 2016 and 2019  Email recipient victim must drag and drop, or paste, a specially crafted SVG image into a browser tab for exploit to work  Mitigation per Microsoft - ‘We recommend that administrators for Outlook on the web block SVG images. This can be accomplished via the Set- OwaMailboxPolicy command.’  Instructions - https://docs.microsoft.com/en- us/powershell/module/exchange/client-access/set- owamailboxpolicy?view=exchange-ps
  • 19. Copyright©2019Ivanti.Allrightsreserved Microsoft Finally Switching to SHA2 Certificates  https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-signing- support-requirement-for-windows-and-wsus  Phased migration process from March to September 2019  Dual signed SHA1/SHA2 migrating to SHA2 signed only  Legacy OS and WSUS require updates  As of July 9, the following OS updates are SHA2-signed only  Server 2008 SP2  Windows 10 1709, 1803, 1809, 1903 and Server 2019  And after July 16 you can add  Windows 10 1507, 1607 and 1703  All current Ivanti products support this change
  • 20. Copyright©2019Ivanti.Allrightsreserved Microsoft Patch Tuesday Updates of Interest  Advisory 990001 Latest Servicing Stack Updates  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001  July Releases  KB 4504418 – Server 2012  KB 4504418 – Windows 8.1/Server 2012 R2  KB 4509090 – Windows 10  KB 4499091 – Windows 10 1607/Server 2016 (pre-req for new updates)  KB 4509092 – Windows 10 1703  KB 4509093 – Windows 10 1709/Server version 1709  KB 4509094 – Windows 10 1803/Server version 1803  KB 4509095 – Windows 10 1809/Server 2019  KB 4509096 – Windows 10 1903/Server version 1903
  • 21. Copyright©2019Ivanti.Allrightsreserved Microsoft Patch Tuesday Updates of Interest (cont)  Development Tool Updates  Azure DevOps Server 2019.0.1  Azure IoT Edge  Team Foundation Server 2010 SP1 and 2018 Update 3.2  Updated Development Components/Packages  ChakraCore  ASP.NET core 2.1 and 2.2  Visual Studio 2010 SP1 – 2019 version 16.1
  • 22. Copyright©2019Ivanti.Allrightsreserved Weekly Patch BLOG  Latest Patch Releases  Microsoft and Third-party  Security and non-Security  CVE Analysis  Security Events of Interest  Host: Brian Secrist  https://www.ivanti.com/blog/ topics/patch-tuesday
  • 23. Copyright©2019Ivanti.Allrightsreserved Patch Content Announcement System Announcements Now Posted on Community Forum Pages  https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2  Subscribe to receive email for the desired product(s)
  • 25. Copyright©2019Ivanti.Allrightsreserved MSFA-2019-21: Security Update for Firefox  Maximum Severity: Critical  Affected Products: Mozilla Firefox  Description: This update provides fixes for 21 vulnerabilities in Firefox 68.  Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Elevation of Privilege and Information Disclosure  Fixes 21 Vulnerabilities: See https://www.mozilla.org/en- US/security/advisories/mfsa2019-21 for a list and description of CVEs remediated.  Restart Required: Requires restart
  • 26. Copyright©2019Ivanti.Allrightsreserved MSFA-2019-22: Security Update for Firefox ESR  Maximum Severity: Critical  Affected Products: Mozilla Firefox ESR  Description: This update provides fixes for 11 vulnerabilities in Firefox 60.8.  Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Elevation of Privilege and Information Disclosure  Fixes 11 Vulnerabilities: See https://www.mozilla.org/en- US/security/advisories/mfsa2019-22 for a list and description of CVEs remediated.  Restart Required: Requires restart
  • 27. Copyright©2019Ivanti.Allrightsreserved MS19-07-W10: Windows 10 Update  Maximum Severity: Critical  Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803, 1809,1903, Server 2016, Server 2019, Server 1709, Server 1803, IE 11 and Microsoft Edge  Description: This bulletin references 10 KB articles. See KBs for the list of changes.  Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 53 Vulnerabilities: CVE-2019-0865, CVE-2019-0887 and CVE-2019-1129 are publicly disclosed. CVE-2019-0880 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slides
  • 28. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 10  KB 4507460 – Windows 10, Version 1607 and Server 2016  For hosts managed by System Center Virtual Machine Manager (SCVMM), SCVMM cannot enumerate and manage logical switches deployed on the host after installing the update. Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts. Workaround: Run mofcomp on the following mof files on the affected host: Scvmmswitchportsettings.mof and VMMDHCPSvr.mof. Follow the best practices.  After installing KB 4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters. Workaround: Set the domain default "Minimum Password Length" policy to less than or equal to 14 characters. Microsoft is working on a resolution.  [File Rename] Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Workaround: Perform the operation from a process that has administrator privilege or perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution.
  • 29. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 10 (cont)  KB 4507460 – Windows 10, Version 1607 and Server 2016  Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016) after installation of this update on the server. Applications that may exhibit this behavior use an IFRAME during non-interactive authentication requests and receive X- Frame Options set to DENY. Workaround: Use the Allow-From value of the header if the IFRAME is only accessing pages from a single-origin URL. Directions in KB. Microsoft is working on a resolution.  [Window-Eyes] After installing this update, opening or using the Window-Eyes screen reader app may result in an error and some features may not function as expected. Note: Users who have already migrated from Window-Eyes to Freedom Scientific's other screen reader, JAWS, should not be affected by this issue. Workaround: None. Microsoft is working on a resolution.
  • 30. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 10 (cont)  KB 4507450 – Windows 10, Version 1703  [File Rename] Issue  [Window-Eyes] Issue  KB 4507455 – Windows 10, Version 1709  [File Rename] Issue  [Window-Eyes] Issue  KB 4507435 – Windows 10, Version 1803  [File Rename] Issue  [Window-Eyes] Issue  [Black Logon] A small number of devices may startup to a black screen during the first logon after installing updates. Workaround: Press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Microsoft is working on a resolution.
  • 31. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 10 (cont)  KB 4507469 – Windows 10, Version 1809, Server 2019 All Versions  [File Rename] Issue  [Window-Eyes] Issue  [Black Logon] Issue  After installing KB4493509, devices with some Asian language packs installed may receive the error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“ Workaround: Uninstall and reinstall any recently added language packs or select Check for Updates and install the April 2019 Cumulative Update. See KB for more recovery details. Microsoft is working on a resolution.
  • 32. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 10 (cont)  KB 4507453 – Windows 10, Version 1903, Windows Server version 2019  [Window-Eyes] Issue  Windows Sandbox may fail to start with "ERROR_FILE_NOT_FOUND (0x80070002)" on devices in which the operating system language is changed during the update process when installing Windows 10, version 1903. Workaround: None. Microsoft is working on a resolution.  The Remote Access Connection Manager (RASMAN) service may stop working and you may receive the error “0xc0000005” on devices where the diagnostic data level is manually configured to the non-default setting of 0. You may also receive an error in the Application section of Windows Logs in Event Viewer with Event ID 1000 referencing “svchost.exe_RasMan” and “rasman.dll”. This issue only occurs when a VPN profile is configured as an Always On VPN (AOVPN) connection with or without device tunnel. This does not affect manual only VPN profiles or connections. Workaround: See KB for detailed instructions to configure one of the default telemetry settings. Microsoft is working on a resolution.
  • 33. Copyright©2019Ivanti.Allrightsreserved MS19-07-IE: Security Updates for Internet Explorer  Maximum Severity: Critical  Affected Products: Microsoft Internet Explorer 9,10,11  Description: The fixes that are included in the cumulative Security Update for Internet Explorer are also included in the July 2019 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in the cumulative update. This bulletin references 12 KB articles.  Impact: Remote Code Execution  Fixes 6 Vulnerabilities: CVE-2019-1001, CVE-2019-1004, CVE-2019-1056, CVE- 2019-1059, CVE-2019-1063, CVE-2019-1104  Restart Required: Requires browser restart  Known Issues: See next slide
  • 34. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Internet Explorer  KB 4507434 – Internet Explorer 11 on Windows Server 2012 R2, Internet Explorer 11 on Windows Server 2012, Internet Explorer 11 on Windows Server 2008 R2 SP1, Internet Explorer 11 on Windows 8.1 Update, Internet Explorer 11 on Windows 7 SP1, Internet Explorer 10 on Windows Server 2012, Internet Explorer 9 on Windows Server 2008 SP2  [Window-Eyes] Issue  This cumulative security update 4507434 for Internet Explorer 10 might be offered for installation through Windows Server Update Services (WSUS) or other update management solutions, even after you install KB4492872 (Internet Explorer 11 for Windows Server 2012 and Windows Embedded 8 Standard) and upgrade to Internet Explorer 11. Workaround: Although this cumulative security update for Internet Explorer 10 might be offered for installation, this issue will not affect the functionality of Internet Explorer 11. However, you should also install KB4507434 to apply the security fixes that are resolved this month for Internet Explorer 11. Microsoft is working on a resolution.
  • 35. Copyright©2019Ivanti.Allrightsreserved MS19-07-MR2K8: Monthly Rollup for Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008 and IE 9  Description: This security update includes improvements and fixes that were a part of update KB 4503271 (released June 20, 2019). Security updates to Windows Server, Microsoft Graphics Component, Windows Shell, Windows Input and Composition, and Windows Kernel. This bulletin is based on KB 4507452.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 20 + 4 (IE) Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019- 1071, CVE-2019-1073, CVE-2019-1085, CVE-2019-1088, CVE-2019-1089, CVE-2019- 1093, CVE-2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-1097, CVE-2019- 1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-1102, CVE-2019- 1108, CVE-2019-1116, CVE-2019-1132.  Restart Required: Requires restart  Known Issues: Latest SSU (April KB 4493730) can hang during restart.
  • 36. Copyright©2019Ivanti.Allrightsreserved MS19-07-SO2K8: Security-only Update for Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008  Description: Security updates to Windows Server, Microsoft Graphics Component, Windows Shell, Windows Input and Composition, and Windows Kernel. This bulletin is based on KB 4507461.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 20 Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019-1071, CVE- 2019-1073, CVE-2019-1085, CVE-2019-1088, CVE-2019-1089, CVE-2019-1093, CVE- 2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-1097, CVE-2019-1098, CVE- 2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-1102, CVE-2019-1108, CVE- 2019-1116, CVE-2019-1132.  Restart Required: Requires restart  Known Issues: Latest SSU (April KB 4493730) can hang during restart.
  • 37. Copyright©2019Ivanti.Allrightsreserved MS19-07-MR7: Monthly Rollup for Win 7 and Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7, Server 2008 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB 4503277 (released June 20, 2019). Security updates to Windows Server, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Shell, Windows Input and Composition, and Windows Kernel. This bulletin is based on KB 4507449.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 21 + 6 (IE) Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019- 1071, CVE-2019-1073, CVE-2019-1082, CVE-2019-1085, CVE-2019-1088, CVE-2019- 1089, CVE-2019-1093, CVE-2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019- 1097, CVE-2019-1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019- 1102, CVE-2019-1108, CVE-2019-1116, CVE-2019-1132.  Restart Required: Requires restart  Known Issues: See next slide
  • 38. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 7 and Server 2008 R2  KB 4507449 – Windows 7 SP1 and Server 2008 R2 SP1 (Monthly Rollup)  [McAfee] Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update.  Workarounds:  McAfee Security(ENS) Threat Prevention 10.x  McAfee Host Intrusion Prevention (Host IPS) 8.0  McAfee VirusScan Enterprise (VSE) 8.8  Microsoft is working on a resolution.
  • 39. Copyright©2019Ivanti.Allrightsreserved MS19-07-SO7: Security-only Update for Win 7 and Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7 SP1, Server 2008 R2 SP1  Description: Security updates to Windows Server, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Shell, Windows Input and Composition, and Windows Kernel. This bulletin is based on KB 4507456.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 21 Vulnerabilities: CVE-2019-0887, CVE-2019-1006, CVE-2019-1071, CVE- 2019-1073, CVE-2019-1082, CVE-2019-1085, CVE-2019-1088, CVE-2019-1089, CVE- 2019-1093, CVE-2019-1094, CVE-2019-1095, CVE-2019-1096, CVE-2019-1097, CVE- 2019-1098, CVE-2019-1099, CVE-2019-1100, CVE-2019-1101, CVE-2019-1102, CVE- 2019-1108, CVE-2019-1116, CVE-2019-1132.  Restart Required: Requires restart  Known Issues: None reported
  • 40. Copyright©2019Ivanti.Allrightsreserved MS19-07-MR8: Monthly Rollup for Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012 and IE  Description: This security update includes improvements and fixes that were a part of update KB 4503295 (released June 21, 2019). Security updates to Windows Server, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Kernel, Windows App Platform and Frameworks, and Windows Server. This bulletin is based on KB 4507462.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 18 + 6 (IE) Vulnerabilities: CVE-2019-0785, CVE-2019-0880, CVE-2019- 0887, CVE-2019-1006, CVE-2019-1071, CVE-2019-1073, CVE-2019-1082, CVE-2019- 1085, CVE-2019-1088, CVE-2019-1089, CVE-2019-1093, CVE-2019-1094, CVE-2019- 1095, CVE-2019-1096, CVE-2019-1097, CVE-2019-1102, CVE-2019-1108, CVE-2019- 1130.  Restart Required: Requires restart  Known Issues: [File Rename] Issue
  • 41. Copyright©2019Ivanti.Allrightsreserved MS19-07-SO8: Security-only Update for Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012  Description: Security updates to Windows Server, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Kernel, Windows App Platform and Frameworks, and Windows Server. This bulletin is based on KB 4507464.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 18 Vulnerabilities: CVE-2019-0785, CVE-2019-0880, CVE-2019-0887, CVE- 2019-1006, CVE-2019-1071, CVE-2019-1073, CVE-2019-1082, CVE-2019-1085, CVE- 2019-1088, CVE-2019-1089, CVE-2019-1093, CVE-2019-1094, CVE-2019-1095, CVE- 2019-1096, CVE-2019-1097, CVE-2019-1102, CVE-2019-1108, CVE-2019-1130.  Restart Required: Requires restart  Known Issues: [File Rename] Issue
  • 42. Copyright©2019Ivanti.Allrightsreserved MS19-07-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB 4503283 (released June 20, 2019). Security updates to Windows Wireless Networking, Windows Server, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Input and Composition, Windows Kernel, and Windows App Platform and Frameworks. This bulletin is based on KB 4507448.  Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 22 + 6 (IE) Vulnerabilities: CVE-2019-0880 is known exploited and CVE- 2019-0887 is publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slide
  • 43. Copyright©2019Ivanti.Allrightsreserved July Known Issues for Windows 8.1 and Server 2012 R2  KB 4507448 – Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)  [File Rename] Issue  [McAfee] Issue  [Windows-Eyes] Issue  KB 4507457 – Windows 8.1, Windows Server 2012 R2 (Security-only Update)  [File Rename] Issue
  • 44. Copyright©2019Ivanti.Allrightsreserved MS19-07-SO81: Security-only Update for Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2  Description: Security updates to Windows Wireless Networking, Windows Server, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Input and Composition, Windows Kernel, and Windows App Platform and Frameworks. This bulletin is based on KB 4507457.  Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 22 Vulnerabilities: CVE-2019-0880 is known exploited and CVE-2019-0887 is publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See previous slide
  • 45. Copyright©2019Ivanti.Allrightsreserved MS19-07-MRNET: Monthly Rollup for Microsoft .Net  Maximum Severity: Critical  Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8  Description: Security updates address a remote code execution vulnerability where the software fails to check the source markup of a file; an Authentication Bypass vulnerability in WCF and WIF, allowing signing of SAML tokens with arbitrary symmetric keys; and an information disclosure vulnerability where Exchange and Azure Active Directory allow creation of entities with Display Names having non-printable characters. This bulletin references 19 KB articles.  Impact: Remote Code Execution, Denial of Service, and Elevation of Privilege  Fixes 3 Vulnerabilities: CVE-2019-1006, CVE-2019-1083, CVE-2019-1113  Restart Required: Does not require a system restart after you apply it unless files that are being updated are locked or are being used.
  • 46. Copyright©2019Ivanti.Allrightsreserved MS19-07-SONET: Security-only Update for Microsoft .Net  Maximum Severity: Critical  Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8  Description: Security updates address a remote code execution vulnerability where the software fails to check the source markup of a file; an Authentication Bypass vulnerability in WCF and WIF, allowing signing of SAML tokens with arbitrary symmetric keys; and an information disclosure vulnerability where Exchange and Azure Active Directory allow creation of entities with Display Names having non-printable characters. This bulletin references 19 KB articles.  Impact: Remote Code Execution, Denial of Service, and Elevation of Privilege  Fixes 3 Vulnerabilities: CVE-2019-1006, CVE-2019-1083, CVE-2019-1113  Restart Required: Does not require a system restart after you apply it unless files that are being updated are locked or are being used.
  • 47. Copyright©2019Ivanti.Allrightsreserved MS19-07-OFF: Security Updates for Microsoft Office  Maximum Severity: Important  Affected Products: Excel 2010-2016, Lync 2013, Office 2010-2016, Office 2016 and 2019 for Mac, Outlook 2010-2016, Skype for Business 2016  Description: This security update resolves vulnerabilities in several Microsoft Office applications. This bulletin references 16 KB articles plus release notes for MacOS.  Impact: Remote Code Execution, Spoofing, Information Disclosure  Fixes 4 Vulnerabilities: CVE-2019-1084, CVE-2019-1109, CVE-2019-1110, CVE- 2019-1111  Restart Required: Requires application restart  Known Issues: None reported
  • 48. Copyright©2019Ivanti.Allrightsreserved MS19-07-O365: Security Updates for Office 365 ProPlus  Maximum Severity: Important  Affected Products: Office 365 ProPlus, Office 2019  Description: This month’s update resolved various bugs and performance issues in Microsoft Office 365 applications. Information on Office 365 ProPlus updates is available at https://docs.microsoft.com/en-us/officeupdates/release-notes-office365- proplus  Impact: Remote Code Execution, Spoofing, Information Disclosure  Fixes 5 Vulnerabilities: CVE-2019-1084, CVE-2019-1109, CVE-2019-1110, CVE- 2019-1111, CVE-2019-1112  Restart Required: Requires application restart  Known Issues: None reported
  • 49. Copyright©2019Ivanti.Allrightsreserved MS19-07-SPT: Security Updates for SharePoint Server  Maximum Severity: Important  Affected Products: Microsoft Enterprise SharePoint Server 2010-2019  Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. This bulletin is based on 5 KB articles.  Impact: Spoofing and Elevation of Privilege  Fixes 2 Vulnerabilities: CVE-2019-1006, CVE-2019-1134  Restart Required: Requires Restart  Known Issues: None reported
  • 50. Copyright©2019Ivanti.Allrightsreserved MS19-07-SQL: Security Updates for SQL Server  Maximum Severity: Important  Affected Products: Microsoft SQL Server 2014-2017  Description: This security update fixes a remote code execution vulnerability in Microsoft SQL Server where it incorrectly handles processing of internal functions. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account. This bulletin is based on 9 KB articles.  Impact: Remote Code Execution  Fixes 1 Vulnerability: CVE-2019-1068  Restart Required: Requires restart  Known Issues: None reported
  • 51. Copyright©2019Ivanti.Allrightsreserved MS19-07-EX: Security Updates for Exchange Server  Maximum Severity: Important  Affected Products: Microsoft Exchange Server 2010-2019  Description: This security update validates display names upon creation in Microsoft Exchange, and renders invalid display names correctly in Microsoft Outlook clients; ensures that Exchange Server properly sanitizes web requests; and changes the way EWS handles NTLM tokens to prevent access to other user’s mailboxes. This bulletin is based on KBs 4509408, 4509409 and 4509410.  Impact: Spoofing, Elevation of Privilege, and Information Disclosure  Fixes 3 Vulnerabilities: CVE-2019-1084, CVE-2019-1136 and CVE-2019-1137  Restart Required: Requires restart  Known Issues: None reported
  • 52. Copyright©2019Ivanti.Allrightsreserved Between Patch Tuesday’s New Product Support: None Security Updates: Adobe Acrobat (3), Camtasia (1), CCleaner (2), Citrix Receiver (1), DropBox (1), Evernote (1), Firefox (2), Firefox ESR (2), FileZilla (1), GIMP (1), GOM Player (1), Google Chrome (2), Microsoft (1), Nitro Pro (2), Node.JS (2), Notepad++ (1), Opera (3), Power BI Desktop (3), Plex Media Server (2), PeaZip (1), Slack (2), Tableau Desktop (5), Tableau Prep (1), Tableau Reader (1), Thunderbird (2), VLC Player (1), VMware Horizon Client (2), Visual Studio Code (1) Non-Security Updates: Box Edit (1), Blue Jeans (1), GoodSync (4), Google Backup and Sync (3), Microsoft (50), Plex Media Player (2), Skype (1), Zoom Client (1), Zoom Outlook Plugin (1)
  • 53. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information  Firefox 67.0.3, Firefox 67.0.4  FF19-015, QFF6703, QFF6704  Fixes 2 Vulnerabilities: CVE-2019-11707, CVE-2019-11708  Firefox ESR 60.7.1, Firefox ESR 60.7.2  FF19-6072, QFFE6071, QFFE6072  Fixes 2 Vulnerabilities: CVE-2019-11707, CVE-2019-11708  Google Chrome 75.0.3770.100  CHROME-256, QGC7503770100  Fixes 1 Vulnerability: CVE-2019-5842
  • 54. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information (cont)  Thunderbird 60.7.1  TB19-6071, QTB6071  Fixes 4 Vulnerabilities: CVE-2019-11703, CVE-2019-11704, CVE-2019-11705, CVE-2019-11706  Thunderbird 60.7.2  TB19-6072, QTB6072  Fixes 2 Vulnerability: CVE-2019-11707, CVE-2019-11708
  • 56. Copyright©2019Ivanti.Allrightsreserved Ivanti Cloud and Patch Intelligence  What is Patch Intelligence?  Patch Intelligence is part of our Ivanti Cloud platform and is focused on solving the next big challenges in patching your environment.  Bridging the gap between Security and Operations  Prioritization of updates  Reconciling Risk vs Reliability  Understanding known issues  Crowd sourcing testing and issue gathering  We are looking for early adopters who want to help us build the experience around Patch Intelligence  Contact Patch Intelligence Product Manager Helen Brown at helen.brown@Ivanti.com
  • 57. Copyright©2019Ivanti.Allrightsreserved Ivanti Security Controls 2019.2  What is coming in ISEC 2019.2?  CentOS support  3 Canned Multi-Platform reports  Updated report views with Linux tables for Xtraction or integration with other solutions  Machine View that shows a combined view of all discovered machines (Windows and Linux)  Added an ‘audit history’ of patch deployments  Updated CVE Import to show more metadata and import now consolidates Windows and Linux into a single step  API has been updated to support a connector into Ivanti Cloud to feed data into Patch Intelligence and other parts of Ivanti Cloud  We are looking for early adopters who want to help us build the experience around Patch Intelligence  Contact Patch Intelligence Product Manager Helen Brown at Sara.Otremba@Ivanti.com

Editor's Notes

  1. Note: Server 2008 limited to .NET 2.0 thru 4.6. Windows 7 and newer use 3.5.1 thru 4.7.2.
  2. Note: Server 2008 limited to .NET 2.0 thru 4.6. Windows 7 and newer use 3.5.1 thru 4.7.2.