SlideShare a Scribd company logo
1 of 40
Patch Tuesday Webinar
Wednesday, Jun 13, 2018
Hosted by: Chris Goettl & Todd Schell
Dial in: 1-877-668-4490 (US)
Event ID: 804 121 959
Agenda
June 2018 Patch Tuesday Overview
In the News
Bulletins
Q & A
1
2
3
4
 Overview
 In the News
In the News
 Zero Day Flash Flaw
 https://threatpost.com/zero-day-flash-exploit-targeting-middle-east/132659/
Known Exploited Vulnerabilities
 CVE-2018-5002 - Stack Based Buffer Overflow Vulnerability
 A remote code execution vulnerability exists in the way that Adobe Flash Player
handles objects in memory. The vulnerability could corrupt memory in such a way
that an attacker could execute arbitrary code in the context of the current user.
An attacker who successfully exploited the vulnerability could gain the same user
rights as the current user. If the current user is logged on with administrative user
rights, an attacker who successfully exploited the vulnerability could take control
of an affected system.
 This vulnerability requires the system user to open a document containing a
weaponized Flash Player object. The buffer overflow is exploited as the flash
object opens and additional shell code is downloaded to the system for deeper
exploitation.
Publicly Disclosed Vulnerabilities
 CVE-2018-8267 - Scripting Engine Memory Corruption Vulnerability
 A remote code execution vulnerability exists in the way that the scripting engine
handles objects in memory in Internet Explorer. The vulnerability could corrupt
memory in such a way that an attacker could execute arbitrary code in the
context of the current user. An attacker who successfully exploited the
vulnerability could gain the same user rights as the current user. If the current
user is logged on with administrative user rights, an attacker who successfully
exploited the vulnerability could take control of an affected system.
 In a web-based attack scenario, an attacker could host a specially crafted
website that is designed to exploit the vulnerability through Internet Explorer and
then convince a user to view the website. An attacker could also embed an
ActiveX control marked "safe for initialization" in an application or Microsoft Office
document that hosts the IE rendering engine. The attacker could also take
advantage of compromised websites and websites that accept or host user-
provided content or advertisements. These websites could contain specially
crafted content that could exploit the vulnerability.
Spectre and Meltdown Update
 New Generation of Spectre Vulnerabilities Found in Intel CPUs
 https://www.ghacks.net/2018/05/03/spectre-next-generation-vulnerabilities/
 Security status after applying June updates
Microsoft June 2018 Release Notes
Windows 10 Lifecycle Awareness
 Windows 10 Branch Support: End of Service for 2018
 Branch 1703 scheduled for October 9 (extended from September 2018)
 Windows 10 Version 1607, 1703, and 1709 will continue to receive security-
only updates for 6 months past EOS dates
 Supported Editions
 Windows 10 Education
 Windows 10 Enterprise
 Unsupported Editions
 Windows 10 Home
 Windows 10 Pro
 Windows 10 Version 1607 is in extended support now until October 9
 Everyone strongly urged to update to latest version of Windows 10
 Windows lifecycle fact sheet
Microsoft Notable May Out-of-Band Releases
 MSNS18-05-4090007_V3 (Q4090007): Intel microcode updates for Windows 10
Version 1709 and Windows Server 2016 (1709): KB 4090007
 MSNS18-05-4091663_V3 (Q4091663): Intel microcode updates for Windows 10
Version 1703: KB 4091663
 MSNS18-05-4091664_V3 (Q4091664): Intel microcode updates for Windows 10
Version 1607 and Windows Server 2016: KB 4091663
 MSNS18-05-4091666_V2 (Q4091666): Intel microcode updates for Windows 10
Version 1507: KB 4091666
 MSNS18-05-4100347 (Q4100347): Intel microcode updates for Windows 10 Version
1803: KB 4100347
Other Microsoft Information
 Service Stack Update KB 4132216 required for Windows 10 Version 1607
before installing June 2018 cumulative update
 XP Embedded Patches Released this Patch Tuesday
 MS18-06-XPE-4230467
 MS18-06-XPE-4293928
 MS18-06-XPE-4294413
 Microsoft Security Advisory 4338110
 https://docs.microsoft.com/en-us/security-
updates/securityadvisories/2018/4338110
 Microsoft guidance for CBC Symmetric Encryption Security Feature
Bypass
 Bulletins
MS18-06-AFP: Security Update for Adobe Flash Player
 Maximum Severity: Critical
 Affected Products: Adobe Flash Player
 Description: This security update resolves vulnerabilities in Adobe Flash Player that is
installed on any supported edition of Windows Server Version 1803, Windows 10
Version 1803, Windows Server 2016 Version 1709, Windows 10 Version 1709,
Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows
10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. This bulletin is
based on KB 4287903 and ADV180014.
 Impact: Remote Code Execution
 Fixes 4 Vulnerabilities: CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE-
2018-5002
 Restart Required: Requires application restart
 NOTE: Released June 7 with known Zero Day vulnerability
APSB18-19: Security Update for Adobe Flash Player
 Maximum Severity: Critical
 Affected Products: Adobe Flash Player
 Description: Adobe has released security updates for Adobe Flash Player for
Windows, macOS, Linux and Chrome OS. These updates address critical
vulnerabilities in Adobe Flash Player 29.0.0.171 and earlier versions. Successful
exploitation could lead to arbitrary code execution in the context of the current user.
 Impact: Remote Code Execution
 Fixes 4 Vulnerabilities: CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE-
2018-5002
 Restart Required: Requires application restart
 NOTE: Released June 7 with known Zero Day vulnerability
MS18-06-W10: Windows 10 Update
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803, Server
2016, Server 1709, Server 1803, IE 11 and Microsoft Edge
 Description: This bulletin references 5 KB articles. See KBs for the list of changes.
 Impact: Remote Code Execution, Security Feature Bypass, Denial of Service,
Elevation of Privilege, and Information Disclosure
 Fixes 41 Vulnerabilities: CVE-2018-8267 is publicly disclosed. See Details column
of Security Update Guide for complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next two slides
June’s Known Issues for Windows 10
 KB 4284880 - Windows 10 Version 1607, Windows Server 2016
 Reliability issues have been observed during the creation of shielded VMs and the required
artifacts for their deployment. There are also reliability issues for the Shielding File Wizard with
or without the SCVMM interface. Note: Existing shielded VMs and HGSs are not affected.
 Workaround - None. Microsoft is working on a resolution.
 KB 4284819 - Windows 10 version 1709
 Some non-English platforms may display the following string in English instead of the localized
language: ”Reading scheduled jobs from file is not supported in this language mode.” This error
appears when you try to read the scheduled jobs you've created and Device Guard is enabled.
 When Device Guard is enabled, some non-English platforms may display the following strings in
English instead of the localized language:
 "Cannot use '&' or '.' operators to invoke a module scope command across language boundaries."
 "'Script' resource from 'PSDesiredStateConfiguration' module is not supported when Device Guard is
enabled. Please use 'Script' resource published by PSDscResources module from PowerShell Gallery."
 Workaround – None. Microsoft is working on a resolution.
June’s Known Issues for Windows 10 (cont)
 KB 4284819 - Windows 10 version 1803
 Some users running Windows 10 version 1803 may receive an error "An invalid argument was
supplied" when accessing files or running programs from a shared folder using the SMBv1
protocol.
 Workaround – Enable SMBv2 or SMBv3 on both the SMB server and the SMB client, as
described in KB2696547. Microsoft is working on a resolution that will be available later in June.
MS18-06-IE: Security Updates for Internet Explorer
 Maximum Severity: Critical
 Affected Products: Microsoft Internet Explorer 9, 10 and 11
 Description: These security updates resolve several reported vulnerabilities in Internet
Explorer. The fixes that are included in this Security Update for Internet Explorer (KB
4230450) are also included in the June 2018 Security Monthly Quality Rollup. Installing
either the Security Update for Internet Explorer or the Security Monthly Quality Rollup
installs the fixes that are in this update. This bulletin references 9 KB articles.
 Impact: Remote Code Execution and Security Bypass
 Fixes 4 vulnerabilities: CVE-2018-0978, CVE-2018-8113, CVE-2018-8249, CVE-
2018-8267
 Restart Required: Requires browser restart
 Known Issues: None reported
MS18-06-2K8: Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008
 Description: Security updates to fix vulnerabilities associated with the HIDParser,
Windows Code Integrity Module, Windows DNSAPI, NTFS and the Windows kernel
module. This bulletin references 3 KB articles.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and
Information Disclosure
 Fixes 6 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE-
2018-8207, CVE-2018-8224, CVE-2018-8225
 Restart Required: Requires restart
 Known Issues: None reported
MS18-06-MR7: Monthly Rollup for Win 7 and Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7, Server 2008 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB4103713 (released May 17, 2018). It includes security updates for Internet
Explorer, Windows apps, Windows Server, Windows storage and filesystems, Windows
wireless networking, and Windows virtualization and kernel. This bulletin is based on
KB 4284826.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 8 (shown) + 4 (IE) Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-
2018-8169, CVE-2018-8205, CVE-2018-8207, CVE-2018-8224, CVE-2018-8225, CVE-
2018-8251
 Restart Required: Requires restart
 Known Issues: See upcoming slide
MS18-06-SO7: Security-only Update for Win 7 and Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7 and Server 2008 R2
 Description: Security updates to Windows apps, Windows Server, Windows storage and
filesystems, Windows wireless networking, and Windows virtualization and kernel. This
bulletin is based on KB 4284867.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 8 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE-2018-
8205, CVE-2018-8207, CVE-2018-8224, CVE-2018-8225, CVE-2018-8251
 Restart Required: Requires restart
 Known Issues: See next slide
June’s Known Issues for Windows 7 and Server 2008 R2
 KB 4284826 - Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1
 A Stop error occurs on machines that don't support Streaming Single Instructions Multiple Data
(SIMD) Extensions 2 (SSE2).
 Workaround – None. Microsoft is working on a resolution.
 There is an issue with Windows and third-party software that is related to a missing file
(oem<number>.inf). Because of this issue, after you apply this update, the network interface
controller will stop working.
 Workaround –
1.To locate the network device, launch devmgmt.msc; it may appear under Other Devices.
2.To automatically rediscover the NIC and install drivers, select Scan for Hardware Changes
from the Action menu.
a. Alternatively, install the drivers for the network device by right-clicking the device and
selecting Update. Then select Search automatically for updated driver software or Browse
my computer for driver software.
 KB 4284867 – Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1
 Same issues for this Security Only update as listed above for Monthly Rollup
MS18-06-MR8: Monthly Rollup for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012 and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4103719 (released May 17, 2018). Security updates to Internet Explorer,
Windows apps, Windows storage and filesystems, Windows Server, and Windows
wireless networking. This bulletin is based on KB 4284855.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 8 (shown) + 4 (IE) Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-
2018-8169, CVE-2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE-
2018-8251
 Restart Required: Requires restart
 Known Issues: None reported
MS18-06-SO8: Security-only Update for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012
 Description: Security updates to Windows apps, Windows storage and filesystems,
Windows Server, and Windows wireless networking. This bulletin is based on KB
4284826.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 8 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE-
2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE-2018-8251
 Restart Required: Requires restart
 Known Issues: None reported
MS18-06-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB4103724 (released May 17, 2018). It includes security updates to Internet
Explorer, Windows apps, remote code execution, Windows Server, Windows storage
and filesystems, and Windows wireless networking. This bulletin is based on KB
4284815.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 8 (shown) + 4 (IE) Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-
2018-8169, CVE-2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE-
2018-8251
 Restart Required: Requires restart
 Known Issues: None reported
MS18-06-SO81: Security-only Update for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2
 Description: Security updates to Windows apps, remote code execution, Windows
Server, Windows storage and filesystems, and Windows wireless networking. This
bulletin is based on KB 4284878.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 8 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE-
2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE-2018-8251
 Restart Required: Requires restart
 Known Issues: None reported
MS18-06-OFF: Security Updates for Microsoft Office
 Maximum Severity: Important
 Affected Products: Office 2010-2016, Excel 2010-2016, Outlook 2010-2016, Web
Apps Server, and Project Server
 Description: This security update resolves vulnerabilities in most Microsoft Office
applications. This bulletin references 22 KB articles.
 Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure and
Defense in Depth
 Fixes 6 Vulnerabilities: CVE-2018-8244, CVE-2018-8245, CVE-2018-8246, CVE-
2018-8247, CVE-2018-8248, CVE-2018-8254 and ADV180015
 Restart Required: Requires application restart
 Known Issues: None reported
MS18-06-O365: Security Updates for Microsoft Office 365
 Maximum Severity: Important
 Affected Products: Office 2016
 Description: This security update resolves vulnerabilities in most Microsoft Office 365
applications. Information on Office 365 updates is available at
https://technet.microsoft.com/en-us/office/mt465751
 Impact: Remote Code Execution, Elevation of Privilege and Information Disclosure
 Fixes 3 Vulnerabilities: CVE-2018-8244, CVE-2018-8246, CVE-2018-8248
 Restart Required: Requires application restart
 Known Issues: None reported
MS18-06-SPT: Security Updates for SharePoint Server
 Maximum Severity: Important
 Affected Products: Microsoft Enterprise SharePoint Server 2013, 2016
 Description: This security update resolves vulnerabilities in Microsoft Office that could
allow remote code execution if a user opens a specially crafted Office file. This update
contains many non-security fixes as well. This bulletin is based on KB 4022190 and
KB 4022173.
 Impact: Remote Code Execution, Elevation of Privilege and Information Disclosure
 Fixes 2 Vulnerabilities: CVE-2018-8252, CVE-2018-8254
 Restart Required: Requires Restart
 Known Issues: None reported
 NOTE: After installing the updates for SharePoint Foundation 2013 Service Pack 1 or
SharePoint Enterprise Server 2016, you need to run psconfig.exe.
Chrome-228: Security Update for Chrome
 Maximum Severity: Critical (High by Google)
 Affected Products: Google Chrome
 Description: The stable channel has been updated to 67.0.3396.87 for Windows,
Mac, and Linux, which will roll out over the coming days/weeks.
 Impact: Out of bounds write
 Fixes 1 Vulnerability: CVE-2018-6149
 Restart Required: Requires restart
Non-Security Updates
 Maximum Severity: Recommended
 Affected Products: Opera, Nitro-Pro, Blue Jeans, Shockwave
 Description: Non-Security updates may include critical bug fixes and feature
updates. Depending on what version you are updating from a Non-Security
update could include security fixes from previous updates you have not yet
applied. Ivanti recommends updating 3rd party applications as regularly as
possible to ensure additional security threats are not exposed.
Between Patch Tuesday’s
New Product Support: Google Drive File Stream, Zoom Client, Zoom Outlook Plugin
Security Updates: Apple Mobile Device Support (1), Adobe Acrobat(1), Adobe Reader
(1), Adobe Creative Cloud (1), Adobe Flash Player (1), CCleaner (3), Google Chrome (4),
CoreFTP (2), Firefox (2), Firefox ESR (3), GIMP (1), HP System Management Homepage
(1), iCloud (1), iTunes (1), LibreOffice (2). Malwarebytes (1), Microsoft (2), Opera (4),
RealPlayer (1), Slack (1), Splunk Forwarder (1), Shockwave (1), Thunderbird (1), Apache
Tomcat (1), VLC Player (1), VMware Player (1), VMware Workstation (1), WinSCP (1),
Wireshark (1)
Non-Security Updates: AIMP (1), Bandicut (1), Box Sync (1), Dropbox (4), Google
Drive File Stream (1), GOM Player (1), Goodsync (4), GoToMeeting (2), Google Backup
and Sync (2), Blue Jeans (1), KeePass Pro (1), LogMeIn (1), Microsoft (50), Oracle
VirtualBox (1), Plex Media Player (2), Plex Media Server (3), Prezi Desktop (1), Skype (4),
Sublime Text Editor (1), TightVNC (1), Webex Productivity Tools (1), XnView (1), Zoom
Client (3), Zoom Outlook Plugin (1)
Third Party CVE Information
 Firefox ESR 52.8.1
 FFE18-5281, QFFE5281
 Fixes 1 Vulnerability: CVE-2018-6126
 Firefox 60.0.2
 Bulletin FF18-011, QFF6002
 Fixes 1 Vulnerability: CVE-2018-6126
 Firefox ESR 60.0.2
 Bulletin 7ZIP-011, Q7ZIP1805
 Fixes 16 Vulnerabilities: CVE-2018-4188, CVE-2018-4190, CVE-2018-4192,
CVE-2018-4199, CVE-2018-4200, CVE-2018-4201, CVE-2018-4204, CVE-2018-
4214, CVE-2018-4218, CVE-2018-4222, CVE-2018-4224, CVE-2018-4225, CVE-
2018-4226, CVE-2018-4232, CVE-2018-4233, CVE-2018-4246
Third Party CVE Information (cont)
 Visual Studio 2017 version 15.7.3
 Bulletin MS18-0531-VS2017, QVS20171573
 Fixes 2 Vulnerabilities: CVE-2018-11233, CVE-2018-11235
 Wireshark 2.6.1
 Bulletin WIRES-078, QWIRES261
 Fixes 8 Vulnerabilities: CVE-2018-11354, CVE-2018-11355, CVE-2018-11356,
CVE-2018-11357, CVE-2018-11358, CVE-2018-11359, CVE-2018-11360, CVE-
2018-11361
 Thunderbird 52.8.0
 Bulletin TB18-5280, QTB5280
 Fixes 13 Vulnerabilities: CVE-2018-5150, CVE-2018-5154, CVE-2018-5155,
CVE-2018-5159, CVE-2018-5161, CVE-2018-5162, CVE-2018-5168, CVE-2018-
5170, CVE-2018-5174, CVE-2018-5178, CVE-2018-5183, CVE-2018-5184, CVE-
2018-5185
Third Party CVE Information (cont)
 VMware Workstation 14.1.2 Player
 Bulletin VMWP-036, QVMWP1412
 Fixes 3 Vulnerabilities: CVE-2018-3639, CVE-2018-3640, CVE-2018-6963
 VMware Workstation 14.1.2 Pro
 Bulletin VMWW-012, QVMWW1412
 Fixes 3 Vulnerabilities: CVE-2018-3639, CVE-2018-3640, CVE-2018-6963
Third Party CVE Information (cont)
 Adobe Acrobat/Reader
 Bulletin APSB18-09, QARDC1801120040MUI, QARDC1801120040,
QARDC1701130080MUI, QARDC1500630418MUI, QADC1801120040,
QADC1701130080, QADC1500630418
 Fixes 13 Vulnerabilities: CVE-2018-4946,CVE-2018-4947,CVE-2018-4948,CVE-
2018-4949,CVE-2018-4950,CVE-2018-4951,CVE-2018-4952,CVE-2018-
4953,CVE-2018-4954,CVE-2018-4955,CVE-2018-4956,CVE-2018-4957,CVE-
2018-4958,CVE-2018-4959,CVE-2018-4960,CVE-2018-4961,CVE-2018-
4962,CVE-2018-4963,CVE-2018-4964,CVE-2018-4965,CVE-2018-4966,CVE-
2018-4967,CVE-2018-4968,CVE-2018-4969,CVE-2018-4970,CVE-2018-
4971,CVE-2018-4972,CVE-2018-4973,CVE-2018-4974,CVE-2018-4975,CVE-
2018-4976,CVE-2018-4977,CVE-2018-4978,CVE-2018-4979,CVE-2018-
4980,CVE-2018-4981,CVE-2018-4982,CVE-2018-4983,CVE-2018-4984,CVE-
2018-4985,CVE-2018-4986,CVE-2018-4987,CVE-2018-4988,CVE-2018-
4989,CVE-2018-4990,CVE-2018-4993,CVE-2018-4994
New Webinars
 Second ‘Patch Tuesday Webinar’ recording at a Europe-friendly time
 Hosted by Chris Goettl and Todd Schell
 July 12 at 1pm BST | 2pm CEST
 https://go.ivanti.com/Webinar-July-Patch-Tuesday-071218.html
 New bi-monthly series - Windows 10 Insights for the Enterprise
 Hosted by Rex McMillan and Adam Smith
 Insider preview of upcoming changes at Microsoft, interview industry experts and
customers, migration tips, best practices, Q&A
 June 20 at 8am PT | 11am ET
 https://go.ivanti.com/Webinar-0620-Windows-10-Enterprise.html
Thank You

More Related Content

What's hot

January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019Ivanti
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisIvanti
 
December 2017 Patch Tuesday
December 2017 Patch TuesdayDecember 2017 Patch Tuesday
December 2017 Patch TuesdayIvanti
 
Ivanti Patch Tuesday November 2017
Ivanti Patch Tuesday November 2017Ivanti Patch Tuesday November 2017
Ivanti Patch Tuesday November 2017Ivanti
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisIvanti
 
Windows 10 and the cloud: Why the future needs hybrid solutions
Windows 10 and the cloud: Why the future needs hybrid solutionsWindows 10 and the cloud: Why the future needs hybrid solutions
Windows 10 and the cloud: Why the future needs hybrid solutionsAlexander Benoit
 
July 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisJuly 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisIvanti
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Alexander Benoit
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'tsAlexander Benoit
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 
Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016Ivanti
 
Patch Tuesday Analysis - April 2016
Patch Tuesday Analysis - April 2016Patch Tuesday Analysis - April 2016
Patch Tuesday Analysis - April 2016Ivanti
 
Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016Ivanti
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
Patch Tuesday Analysis - March 2016
Patch Tuesday Analysis - March 2016Patch Tuesday Analysis - March 2016
Patch Tuesday Analysis - March 2016Ivanti
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti
 
August Patch Tuesday 2016
August Patch Tuesday 2016August Patch Tuesday 2016
August Patch Tuesday 2016LANDESK
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch TuesdayIvanti
 
Patch Tuesday Analysis - June 2016
Patch Tuesday Analysis - June 2016Patch Tuesday Analysis - June 2016
Patch Tuesday Analysis - June 2016Ivanti
 

What's hot (20)

January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday Analysis
 
December 2017 Patch Tuesday
December 2017 Patch TuesdayDecember 2017 Patch Tuesday
December 2017 Patch Tuesday
 
Ivanti Patch Tuesday November 2017
Ivanti Patch Tuesday November 2017Ivanti Patch Tuesday November 2017
Ivanti Patch Tuesday November 2017
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday Analysis
 
Windows 10 and the cloud: Why the future needs hybrid solutions
Windows 10 and the cloud: Why the future needs hybrid solutionsWindows 10 and the cloud: Why the future needs hybrid solutions
Windows 10 and the cloud: Why the future needs hybrid solutions
 
July 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisJuly 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday Analysis
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016Patch Tuesday Analysis - February 2016
Patch Tuesday Analysis - February 2016
 
Patch Tuesday Analysis - April 2016
Patch Tuesday Analysis - April 2016Patch Tuesday Analysis - April 2016
Patch Tuesday Analysis - April 2016
 
Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016Patch Tuesday Analysis - January 2016
Patch Tuesday Analysis - January 2016
 
Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020Ivanti Patch Tuesday for April 2020
Ivanti Patch Tuesday for April 2020
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Patch Tuesday Analysis - March 2016
Patch Tuesday Analysis - March 2016Patch Tuesday Analysis - March 2016
Patch Tuesday Analysis - March 2016
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020
 
August Patch Tuesday 2016
August Patch Tuesday 2016August Patch Tuesday 2016
August Patch Tuesday 2016
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch Tuesday
 
Patch Tuesday Analysis - June 2016
Patch Tuesday Analysis - June 2016Patch Tuesday Analysis - June 2016
Patch Tuesday Analysis - June 2016
 

Similar to June Patch Tuesday 2018

April Patch Tuesday Analysis 2018
April Patch Tuesday Analysis 2018April Patch Tuesday Analysis 2018
April Patch Tuesday Analysis 2018Ivanti
 
August Patch Tuesday Analysis
August Patch Tuesday AnalysisAugust Patch Tuesday Analysis
August Patch Tuesday AnalysisIvanti
 
May 2018 Patch Tuesday Analysis
May 2018 Patch Tuesday AnalysisMay 2018 Patch Tuesday Analysis
May 2018 Patch Tuesday AnalysisIvanti
 
March 2018 Patch Tuesday Ivanti
March 2018 Patch Tuesday IvantiMarch 2018 Patch Tuesday Ivanti
March 2018 Patch Tuesday IvantiIvanti
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020 Ivanti
 
August 2019 Patch Tuesday Analysis
August 2019 Patch Tuesday AnalysisAugust 2019 Patch Tuesday Analysis
August 2019 Patch Tuesday AnalysisIvanti
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020Ivanti
 
April 2019 Patch Tuesday
April 2019 Patch TuesdayApril 2019 Patch Tuesday
April 2019 Patch TuesdayIvanti
 
Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti
 
2021 September Patch Tuesday
2021 September Patch Tuesday2021 September Patch Tuesday
2021 September Patch TuesdayIvanti
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti
 
Français Patch Tuesday – Novembre
Français Patch Tuesday – NovembreFrançais Patch Tuesday – Novembre
Français Patch Tuesday – NovembreIvanti
 
July Patch Tuesday 2020
July Patch Tuesday 2020July Patch Tuesday 2020
July Patch Tuesday 2020Dan Lalli
 
May Patch Tuesday Analysis 2019
May Patch Tuesday Analysis 2019May Patch Tuesday Analysis 2019
May Patch Tuesday Analysis 2019Ivanti
 
June Patch Tuesday 2019
June Patch Tuesday 2019June Patch Tuesday 2019
June Patch Tuesday 2019Ivanti
 
Patch Tuesday de Noviembre
Patch Tuesday de NoviembrePatch Tuesday de Noviembre
Patch Tuesday de NoviembreIvanti
 
Patch Tuesday Analysis - October 2016
Patch Tuesday Analysis - October 2016Patch Tuesday Analysis - October 2016
Patch Tuesday Analysis - October 2016Ivanti
 
October2016 patchtuesdayshavlik
October2016 patchtuesdayshavlikOctober2016 patchtuesdayshavlik
October2016 patchtuesdayshavlikLANDESK
 
Ivanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti
 

Similar to June Patch Tuesday 2018 (20)

April Patch Tuesday Analysis 2018
April Patch Tuesday Analysis 2018April Patch Tuesday Analysis 2018
April Patch Tuesday Analysis 2018
 
August Patch Tuesday Analysis
August Patch Tuesday AnalysisAugust Patch Tuesday Analysis
August Patch Tuesday Analysis
 
May 2018 Patch Tuesday Analysis
May 2018 Patch Tuesday AnalysisMay 2018 Patch Tuesday Analysis
May 2018 Patch Tuesday Analysis
 
March 2018 Patch Tuesday Ivanti
March 2018 Patch Tuesday IvantiMarch 2018 Patch Tuesday Ivanti
March 2018 Patch Tuesday Ivanti
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020
 
August 2019 Patch Tuesday Analysis
August 2019 Patch Tuesday AnalysisAugust 2019 Patch Tuesday Analysis
August 2019 Patch Tuesday Analysis
 
Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
 
April 2019 Patch Tuesday
April 2019 Patch TuesdayApril 2019 Patch Tuesday
April 2019 Patch Tuesday
 
Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020
 
2021 September Patch Tuesday
2021 September Patch Tuesday2021 September Patch Tuesday
2021 September Patch Tuesday
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019
 
Français Patch Tuesday – Novembre
Français Patch Tuesday – NovembreFrançais Patch Tuesday – Novembre
Français Patch Tuesday – Novembre
 
July Patch Tuesday 2020
July Patch Tuesday 2020July Patch Tuesday 2020
July Patch Tuesday 2020
 
May Patch Tuesday Analysis 2019
May Patch Tuesday Analysis 2019May Patch Tuesday Analysis 2019
May Patch Tuesday Analysis 2019
 
June Patch Tuesday 2019
June Patch Tuesday 2019June Patch Tuesday 2019
June Patch Tuesday 2019
 
Patch Tuesday de Noviembre
Patch Tuesday de NoviembrePatch Tuesday de Noviembre
Patch Tuesday de Noviembre
 
Patch Tuesday Analysis - October 2016
Patch Tuesday Analysis - October 2016Patch Tuesday Analysis - October 2016
Patch Tuesday Analysis - October 2016
 
October2016 patchtuesdayshavlik
October2016 patchtuesdayshavlikOctober2016 patchtuesdayshavlik
October2016 patchtuesdayshavlik
 
Ivanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti May 2020 Patch Tuesday
Ivanti May 2020 Patch Tuesday
 

More from Ivanti

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de AbrilIvanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia AprileIvanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - MarsIvanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de MarzoIvanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia MarzoIvanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de FebreroIvanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - FévrierIvanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioIvanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch TuesdayIvanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch TuesdayIvanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch TuesdayIvanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch TuesdayIvanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de EneroIvanti
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – JanvierIvanti
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch TuesdayIvanti
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de DiciembreIvanti
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – DécembreIvanti
 

More from Ivanti (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – Janvier
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch Tuesday
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de Diciembre
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – Décembre
 

Recently uploaded

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Recently uploaded (20)

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

June Patch Tuesday 2018

  • 1. Patch Tuesday Webinar Wednesday, Jun 13, 2018 Hosted by: Chris Goettl & Todd Schell Dial in: 1-877-668-4490 (US) Event ID: 804 121 959
  • 2. Agenda June 2018 Patch Tuesday Overview In the News Bulletins Q & A 1 2 3 4
  • 4.
  • 5.  In the News
  • 6. In the News  Zero Day Flash Flaw  https://threatpost.com/zero-day-flash-exploit-targeting-middle-east/132659/
  • 7. Known Exploited Vulnerabilities  CVE-2018-5002 - Stack Based Buffer Overflow Vulnerability  A remote code execution vulnerability exists in the way that Adobe Flash Player handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system.  This vulnerability requires the system user to open a document containing a weaponized Flash Player object. The buffer overflow is exploited as the flash object opens and additional shell code is downloaded to the system for deeper exploitation.
  • 8. Publicly Disclosed Vulnerabilities  CVE-2018-8267 - Scripting Engine Memory Corruption Vulnerability  A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system.  In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user- provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.
  • 9. Spectre and Meltdown Update  New Generation of Spectre Vulnerabilities Found in Intel CPUs  https://www.ghacks.net/2018/05/03/spectre-next-generation-vulnerabilities/  Security status after applying June updates Microsoft June 2018 Release Notes
  • 10. Windows 10 Lifecycle Awareness  Windows 10 Branch Support: End of Service for 2018  Branch 1703 scheduled for October 9 (extended from September 2018)  Windows 10 Version 1607, 1703, and 1709 will continue to receive security- only updates for 6 months past EOS dates  Supported Editions  Windows 10 Education  Windows 10 Enterprise  Unsupported Editions  Windows 10 Home  Windows 10 Pro  Windows 10 Version 1607 is in extended support now until October 9  Everyone strongly urged to update to latest version of Windows 10  Windows lifecycle fact sheet
  • 11. Microsoft Notable May Out-of-Band Releases  MSNS18-05-4090007_V3 (Q4090007): Intel microcode updates for Windows 10 Version 1709 and Windows Server 2016 (1709): KB 4090007  MSNS18-05-4091663_V3 (Q4091663): Intel microcode updates for Windows 10 Version 1703: KB 4091663  MSNS18-05-4091664_V3 (Q4091664): Intel microcode updates for Windows 10 Version 1607 and Windows Server 2016: KB 4091663  MSNS18-05-4091666_V2 (Q4091666): Intel microcode updates for Windows 10 Version 1507: KB 4091666  MSNS18-05-4100347 (Q4100347): Intel microcode updates for Windows 10 Version 1803: KB 4100347
  • 12. Other Microsoft Information  Service Stack Update KB 4132216 required for Windows 10 Version 1607 before installing June 2018 cumulative update  XP Embedded Patches Released this Patch Tuesday  MS18-06-XPE-4230467  MS18-06-XPE-4293928  MS18-06-XPE-4294413  Microsoft Security Advisory 4338110  https://docs.microsoft.com/en-us/security- updates/securityadvisories/2018/4338110  Microsoft guidance for CBC Symmetric Encryption Security Feature Bypass
  • 14. MS18-06-AFP: Security Update for Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player  Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on any supported edition of Windows Server Version 1803, Windows 10 Version 1803, Windows Server 2016 Version 1709, Windows 10 Version 1709, Windows 10 Version 1703, Windows Server 2016, Windows 10 Version 1607, Windows 10 (RTM), Windows Server 2012 R2, Windows 8.1, or Windows RT 8.1. This bulletin is based on KB 4287903 and ADV180014.  Impact: Remote Code Execution  Fixes 4 Vulnerabilities: CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE- 2018-5002  Restart Required: Requires application restart  NOTE: Released June 7 with known Zero Day vulnerability
  • 15. APSB18-19: Security Update for Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player  Description: Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address critical vulnerabilities in Adobe Flash Player 29.0.0.171 and earlier versions. Successful exploitation could lead to arbitrary code execution in the context of the current user.  Impact: Remote Code Execution  Fixes 4 Vulnerabilities: CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE- 2018-5002  Restart Required: Requires application restart  NOTE: Released June 7 with known Zero Day vulnerability
  • 16. MS18-06-W10: Windows 10 Update  Maximum Severity: Critical  Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803, Server 2016, Server 1709, Server 1803, IE 11 and Microsoft Edge  Description: This bulletin references 5 KB articles. See KBs for the list of changes.  Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 41 Vulnerabilities: CVE-2018-8267 is publicly disclosed. See Details column of Security Update Guide for complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next two slides
  • 17. June’s Known Issues for Windows 10  KB 4284880 - Windows 10 Version 1607, Windows Server 2016  Reliability issues have been observed during the creation of shielded VMs and the required artifacts for their deployment. There are also reliability issues for the Shielding File Wizard with or without the SCVMM interface. Note: Existing shielded VMs and HGSs are not affected.  Workaround - None. Microsoft is working on a resolution.  KB 4284819 - Windows 10 version 1709  Some non-English platforms may display the following string in English instead of the localized language: ”Reading scheduled jobs from file is not supported in this language mode.” This error appears when you try to read the scheduled jobs you've created and Device Guard is enabled.  When Device Guard is enabled, some non-English platforms may display the following strings in English instead of the localized language:  "Cannot use '&' or '.' operators to invoke a module scope command across language boundaries."  "'Script' resource from 'PSDesiredStateConfiguration' module is not supported when Device Guard is enabled. Please use 'Script' resource published by PSDscResources module from PowerShell Gallery."  Workaround – None. Microsoft is working on a resolution.
  • 18. June’s Known Issues for Windows 10 (cont)  KB 4284819 - Windows 10 version 1803  Some users running Windows 10 version 1803 may receive an error "An invalid argument was supplied" when accessing files or running programs from a shared folder using the SMBv1 protocol.  Workaround – Enable SMBv2 or SMBv3 on both the SMB server and the SMB client, as described in KB2696547. Microsoft is working on a resolution that will be available later in June.
  • 19. MS18-06-IE: Security Updates for Internet Explorer  Maximum Severity: Critical  Affected Products: Microsoft Internet Explorer 9, 10 and 11  Description: These security updates resolve several reported vulnerabilities in Internet Explorer. The fixes that are included in this Security Update for Internet Explorer (KB 4230450) are also included in the June 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update. This bulletin references 9 KB articles.  Impact: Remote Code Execution and Security Bypass  Fixes 4 vulnerabilities: CVE-2018-0978, CVE-2018-8113, CVE-2018-8249, CVE- 2018-8267  Restart Required: Requires browser restart  Known Issues: None reported
  • 20. MS18-06-2K8: Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008  Description: Security updates to fix vulnerabilities associated with the HIDParser, Windows Code Integrity Module, Windows DNSAPI, NTFS and the Windows kernel module. This bulletin references 3 KB articles.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure  Fixes 6 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE- 2018-8207, CVE-2018-8224, CVE-2018-8225  Restart Required: Requires restart  Known Issues: None reported
  • 21. MS18-06-MR7: Monthly Rollup for Win 7 and Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7, Server 2008 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB4103713 (released May 17, 2018). It includes security updates for Internet Explorer, Windows apps, Windows Server, Windows storage and filesystems, Windows wireless networking, and Windows virtualization and kernel. This bulletin is based on KB 4284826.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 8 (shown) + 4 (IE) Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE- 2018-8169, CVE-2018-8205, CVE-2018-8207, CVE-2018-8224, CVE-2018-8225, CVE- 2018-8251  Restart Required: Requires restart  Known Issues: See upcoming slide
  • 22. MS18-06-SO7: Security-only Update for Win 7 and Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7 and Server 2008 R2  Description: Security updates to Windows apps, Windows Server, Windows storage and filesystems, Windows wireless networking, and Windows virtualization and kernel. This bulletin is based on KB 4284867.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 8 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE-2018- 8205, CVE-2018-8207, CVE-2018-8224, CVE-2018-8225, CVE-2018-8251  Restart Required: Requires restart  Known Issues: See next slide
  • 23. June’s Known Issues for Windows 7 and Server 2008 R2  KB 4284826 - Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1  A Stop error occurs on machines that don't support Streaming Single Instructions Multiple Data (SIMD) Extensions 2 (SSE2).  Workaround – None. Microsoft is working on a resolution.  There is an issue with Windows and third-party software that is related to a missing file (oem<number>.inf). Because of this issue, after you apply this update, the network interface controller will stop working.  Workaround – 1.To locate the network device, launch devmgmt.msc; it may appear under Other Devices. 2.To automatically rediscover the NIC and install drivers, select Scan for Hardware Changes from the Action menu. a. Alternatively, install the drivers for the network device by right-clicking the device and selecting Update. Then select Search automatically for updated driver software or Browse my computer for driver software.  KB 4284867 – Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1  Same issues for this Security Only update as listed above for Monthly Rollup
  • 24. MS18-06-MR8: Monthly Rollup for Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012 and IE  Description: This security update includes improvements and fixes that were a part of update KB 4103719 (released May 17, 2018). Security updates to Internet Explorer, Windows apps, Windows storage and filesystems, Windows Server, and Windows wireless networking. This bulletin is based on KB 4284855.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 8 (shown) + 4 (IE) Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE- 2018-8169, CVE-2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE- 2018-8251  Restart Required: Requires restart  Known Issues: None reported
  • 25. MS18-06-SO8: Security-only Update for Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012  Description: Security updates to Windows apps, Windows storage and filesystems, Windows Server, and Windows wireless networking. This bulletin is based on KB 4284826.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 8 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE- 2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE-2018-8251  Restart Required: Requires restart  Known Issues: None reported
  • 26. MS18-06-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB4103724 (released May 17, 2018). It includes security updates to Internet Explorer, Windows apps, remote code execution, Windows Server, Windows storage and filesystems, and Windows wireless networking. This bulletin is based on KB 4284815.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 8 (shown) + 4 (IE) Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE- 2018-8169, CVE-2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE- 2018-8251  Restart Required: Requires restart  Known Issues: None reported
  • 27. MS18-06-SO81: Security-only Update for Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2  Description: Security updates to Windows apps, remote code execution, Windows Server, Windows storage and filesystems, and Windows wireless networking. This bulletin is based on KB 4284878.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 8 Vulnerabilities: CVE-2018-1036, CVE-2018-1040, CVE-2018-8169, CVE- 2018-8205, CVE-2018-8207, CVE-2018-8210, CVE-2018-8225, CVE-2018-8251  Restart Required: Requires restart  Known Issues: None reported
  • 28. MS18-06-OFF: Security Updates for Microsoft Office  Maximum Severity: Important  Affected Products: Office 2010-2016, Excel 2010-2016, Outlook 2010-2016, Web Apps Server, and Project Server  Description: This security update resolves vulnerabilities in most Microsoft Office applications. This bulletin references 22 KB articles.  Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure and Defense in Depth  Fixes 6 Vulnerabilities: CVE-2018-8244, CVE-2018-8245, CVE-2018-8246, CVE- 2018-8247, CVE-2018-8248, CVE-2018-8254 and ADV180015  Restart Required: Requires application restart  Known Issues: None reported
  • 29. MS18-06-O365: Security Updates for Microsoft Office 365  Maximum Severity: Important  Affected Products: Office 2016  Description: This security update resolves vulnerabilities in most Microsoft Office 365 applications. Information on Office 365 updates is available at https://technet.microsoft.com/en-us/office/mt465751  Impact: Remote Code Execution, Elevation of Privilege and Information Disclosure  Fixes 3 Vulnerabilities: CVE-2018-8244, CVE-2018-8246, CVE-2018-8248  Restart Required: Requires application restart  Known Issues: None reported
  • 30. MS18-06-SPT: Security Updates for SharePoint Server  Maximum Severity: Important  Affected Products: Microsoft Enterprise SharePoint Server 2013, 2016  Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. This update contains many non-security fixes as well. This bulletin is based on KB 4022190 and KB 4022173.  Impact: Remote Code Execution, Elevation of Privilege and Information Disclosure  Fixes 2 Vulnerabilities: CVE-2018-8252, CVE-2018-8254  Restart Required: Requires Restart  Known Issues: None reported  NOTE: After installing the updates for SharePoint Foundation 2013 Service Pack 1 or SharePoint Enterprise Server 2016, you need to run psconfig.exe.
  • 31. Chrome-228: Security Update for Chrome  Maximum Severity: Critical (High by Google)  Affected Products: Google Chrome  Description: The stable channel has been updated to 67.0.3396.87 for Windows, Mac, and Linux, which will roll out over the coming days/weeks.  Impact: Out of bounds write  Fixes 1 Vulnerability: CVE-2018-6149  Restart Required: Requires restart
  • 32. Non-Security Updates  Maximum Severity: Recommended  Affected Products: Opera, Nitro-Pro, Blue Jeans, Shockwave  Description: Non-Security updates may include critical bug fixes and feature updates. Depending on what version you are updating from a Non-Security update could include security fixes from previous updates you have not yet applied. Ivanti recommends updating 3rd party applications as regularly as possible to ensure additional security threats are not exposed.
  • 33. Between Patch Tuesday’s New Product Support: Google Drive File Stream, Zoom Client, Zoom Outlook Plugin Security Updates: Apple Mobile Device Support (1), Adobe Acrobat(1), Adobe Reader (1), Adobe Creative Cloud (1), Adobe Flash Player (1), CCleaner (3), Google Chrome (4), CoreFTP (2), Firefox (2), Firefox ESR (3), GIMP (1), HP System Management Homepage (1), iCloud (1), iTunes (1), LibreOffice (2). Malwarebytes (1), Microsoft (2), Opera (4), RealPlayer (1), Slack (1), Splunk Forwarder (1), Shockwave (1), Thunderbird (1), Apache Tomcat (1), VLC Player (1), VMware Player (1), VMware Workstation (1), WinSCP (1), Wireshark (1) Non-Security Updates: AIMP (1), Bandicut (1), Box Sync (1), Dropbox (4), Google Drive File Stream (1), GOM Player (1), Goodsync (4), GoToMeeting (2), Google Backup and Sync (2), Blue Jeans (1), KeePass Pro (1), LogMeIn (1), Microsoft (50), Oracle VirtualBox (1), Plex Media Player (2), Plex Media Server (3), Prezi Desktop (1), Skype (4), Sublime Text Editor (1), TightVNC (1), Webex Productivity Tools (1), XnView (1), Zoom Client (3), Zoom Outlook Plugin (1)
  • 34. Third Party CVE Information  Firefox ESR 52.8.1  FFE18-5281, QFFE5281  Fixes 1 Vulnerability: CVE-2018-6126  Firefox 60.0.2  Bulletin FF18-011, QFF6002  Fixes 1 Vulnerability: CVE-2018-6126  Firefox ESR 60.0.2  Bulletin 7ZIP-011, Q7ZIP1805  Fixes 16 Vulnerabilities: CVE-2018-4188, CVE-2018-4190, CVE-2018-4192, CVE-2018-4199, CVE-2018-4200, CVE-2018-4201, CVE-2018-4204, CVE-2018- 4214, CVE-2018-4218, CVE-2018-4222, CVE-2018-4224, CVE-2018-4225, CVE- 2018-4226, CVE-2018-4232, CVE-2018-4233, CVE-2018-4246
  • 35. Third Party CVE Information (cont)  Visual Studio 2017 version 15.7.3  Bulletin MS18-0531-VS2017, QVS20171573  Fixes 2 Vulnerabilities: CVE-2018-11233, CVE-2018-11235  Wireshark 2.6.1  Bulletin WIRES-078, QWIRES261  Fixes 8 Vulnerabilities: CVE-2018-11354, CVE-2018-11355, CVE-2018-11356, CVE-2018-11357, CVE-2018-11358, CVE-2018-11359, CVE-2018-11360, CVE- 2018-11361  Thunderbird 52.8.0  Bulletin TB18-5280, QTB5280  Fixes 13 Vulnerabilities: CVE-2018-5150, CVE-2018-5154, CVE-2018-5155, CVE-2018-5159, CVE-2018-5161, CVE-2018-5162, CVE-2018-5168, CVE-2018- 5170, CVE-2018-5174, CVE-2018-5178, CVE-2018-5183, CVE-2018-5184, CVE- 2018-5185
  • 36. Third Party CVE Information (cont)  VMware Workstation 14.1.2 Player  Bulletin VMWP-036, QVMWP1412  Fixes 3 Vulnerabilities: CVE-2018-3639, CVE-2018-3640, CVE-2018-6963  VMware Workstation 14.1.2 Pro  Bulletin VMWW-012, QVMWW1412  Fixes 3 Vulnerabilities: CVE-2018-3639, CVE-2018-3640, CVE-2018-6963
  • 37. Third Party CVE Information (cont)  Adobe Acrobat/Reader  Bulletin APSB18-09, QARDC1801120040MUI, QARDC1801120040, QARDC1701130080MUI, QARDC1500630418MUI, QADC1801120040, QADC1701130080, QADC1500630418  Fixes 13 Vulnerabilities: CVE-2018-4946,CVE-2018-4947,CVE-2018-4948,CVE- 2018-4949,CVE-2018-4950,CVE-2018-4951,CVE-2018-4952,CVE-2018- 4953,CVE-2018-4954,CVE-2018-4955,CVE-2018-4956,CVE-2018-4957,CVE- 2018-4958,CVE-2018-4959,CVE-2018-4960,CVE-2018-4961,CVE-2018- 4962,CVE-2018-4963,CVE-2018-4964,CVE-2018-4965,CVE-2018-4966,CVE- 2018-4967,CVE-2018-4968,CVE-2018-4969,CVE-2018-4970,CVE-2018- 4971,CVE-2018-4972,CVE-2018-4973,CVE-2018-4974,CVE-2018-4975,CVE- 2018-4976,CVE-2018-4977,CVE-2018-4978,CVE-2018-4979,CVE-2018- 4980,CVE-2018-4981,CVE-2018-4982,CVE-2018-4983,CVE-2018-4984,CVE- 2018-4985,CVE-2018-4986,CVE-2018-4987,CVE-2018-4988,CVE-2018- 4989,CVE-2018-4990,CVE-2018-4993,CVE-2018-4994
  • 38. New Webinars  Second ‘Patch Tuesday Webinar’ recording at a Europe-friendly time  Hosted by Chris Goettl and Todd Schell  July 12 at 1pm BST | 2pm CEST  https://go.ivanti.com/Webinar-July-Patch-Tuesday-071218.html  New bi-monthly series - Windows 10 Insights for the Enterprise  Hosted by Rex McMillan and Adam Smith  Insider preview of upcoming changes at Microsoft, interview industry experts and customers, migration tips, best practices, Q&A  June 20 at 8am PT | 11am ET  https://go.ivanti.com/Webinar-0620-Windows-10-Enterprise.html
  • 39.