SlideShare a Scribd company logo
Patch Tuesday Webinar
Wednesday, May 15, 2019
Hosted by: Chris Goettl & Todd Schell
Dial in: 1-877-668-4490 (US)
Event ID: 806 097 670
Copyright©2019Ivanti.Allrightsreserved
Agenda
May 2019 Patch Tuesday Overview
In the News
Bulletins
Q & A
1
2
3
4
Copyright©2019Ivanti.Allrightsreserved
 Overview
Copyright©2019Ivanti.Allrightsreserved
Copyright©2019Ivanti.Allrightsreserved
 In the News
Copyright©2019Ivanti.Allrightsreserved
New Wormable RDS Vulnerability
 Wormable Vulnerability in “Remote Desktop Services” has WannaCry
potential
 https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-
updating-remote-desktop-services-cve-2019-0708/
 https://krebsonsecurity.com/2019/05/microsoft-patches-wormable-flaw-in-
windows-xp-7-and-windows-2003/
Copyright©2019Ivanti.Allrightsreserved
Support for Windows XP and Server 2003 updates
 Ivanti Product Coverage:
 EPM – Content for XP and 2003 update is live
 EPM client support ended for XP and 2003 a while back, but this
is still supportable using a older client version.
 Security Controls (Patch for Windows) supported as usual
 Patch for SCCM – Likely this will not sync automatically, but the
content for these updates is in the Windows Update Catalog. To
manually sync this content you will need to look into this article:
 https://docs.microsoft.com/en-us/sccm/sum/get-
started/synchronize-software-updates#import-updates-from-the-
microsoft-update-catalog
 EMSS – XP and 2003 are not currently supported. Please contact support if
this is a concern for your organization so we can provide additional support
options.
Copyright©2019Ivanti.Allrightsreserved
In the News
 LightNeuron – A sophisticated backdoor allows threat actors full control to monitor,
intercept and send emails from your Exchange server.
 https://www.zdnet.com/article/russian-cyberspies-are-using-one-hell-of-a-
clever-microsoft-exchange-backdoor/
 https://www.theregister.co.uk/2019/05/08/exchange_malware_lightneuron/
 Fxmsp chat logs reveal the hacked AV vendors
 https://www.bleepingcomputer.com/news/security/fxmsp-chat-logs-reveal-the-
hacked-antivirus-vendors-avs-respond/
 Microsoft SharePoint bug exploited in the wild
 https://www.darkreading.com/endpoint/microsoft-sharepoint-bug-exploited-in-
the-wild/d/d-id/1334683
 IE11 for Server 2012
 https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Bringing-
Internet-Explorer-11-to-Windows-Server-2012-and-Windows/ba-p/325297
Copyright©2019Ivanti.Allrightsreserved
More Vulnerabilities Disclosed on Intel Processors
 Fallout, ZombieLoad, and Rogue In-Flight Data Load (RIDL)
 Targeting four specific vulnerabilities - CVE-2018-12126, CVE-2018-12127, CVE-
2018-12130, CVE-2019-11091
 Microarchitectural Data Sampling (MDS) vulnerabilities
 More dangerous data sampling attacks – leak data from CPU buffers
 https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks-
impact-all-modern-intel-cpus/
 Remediation is similar to Spectre and Meltdown
 Software updates and microcode changes
 https://support.microsoft.com/en-us/help/4093836/summary-of-intel-
microcode-updates
 https://portal.msrc.microsoft.com/en-US/security-
guidance/advisory/ADV190013
 AMD processors are not vulnerable
Copyright©2019Ivanti.Allrightsreserved
Windows 10 Lifecycle Awareness
 Windows 10 Branch Support
 Complete Lifecycle Fact Sheet
 https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet
Source: Microsoft
Copyright©2019Ivanti.Allrightsreserved
Zero-day Exploited Vulnerabilities
 CVE-2019-0863 Windows Error Reporting Elevation of Privilege Vulnerability
 An elevation of privilege vulnerability exists in the way Windows Error Reporting
(WER) handles files. An attacker who successfully exploited this vulnerability
could run arbitrary code in kernel mode. An attacker could then install programs;
view, change, or delete data; or create new accounts with administrator
privileges.
 To exploit the vulnerability, an attacker must first gain unprivileged execution on a
victim system.
 The security update addresses the vulnerability by correcting the way WER
handles files.
Copyright©2019Ivanti.Allrightsreserved
Microsoft Finally Switching to SHA2 Certificates
 https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-signing-
support-requirement-for-windows-and-wsus
 Phased migration process from March to September 2019
 Dual signed SHA1/SHA2 migrating to SHA2 signed only
 Legacy OS and WSUS require updates
 Advisory 190009 SHA-2 Code Sign Support Advisory
 Server 2008 SP2 migration update released yesterday
 https://support.microsoft.com/en-us/help/4474419/sha-2-code-signing-support-
update
 All current Ivanti products support this change
Copyright©2019Ivanti.Allrightsreserved
Java 8 211 and 212
 Java 8 is no longer publicly supported. If you have a continued support contract
Ivanti Patch solutions include content, but provide this as “Drop In” support
meaning you need to provide the patch.
 https://forums.ivanti.com/s/article/Oracle-SE-Java-8-support-changes-and-
how-it-effects-deployments-through-Ivanti-Patch-Management-solutions
 Oracle’s download page for Java 8:
 https://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-
2133155.html
Copyright©2019Ivanti.Allrightsreserved
Microsoft Patch Tuesday Updates of Interest
 Advisory 990001 Latest Servicing Stack Updates
 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001
 May Releases
 KB 4498353 – Windows 10
 KB 4498947 – Windows 10 1607/Server 2016 (pre-req for new updates)
 KB 4500640 – Windows 10 1703
 KB 4500641 – Windows 10 1709/Server version 1709
 KB 4497398 – Windows 10 1803/Server version 1803
 KB 4499728 – Windows 10 1809/Server 2019 (pre-req for new updates)
 KB 4500109 – Windows 10 1903/Server version 1903
Copyright©2019Ivanti.Allrightsreserved
Microsoft Patch Tuesday Updates of Interest (cont)
 Development Tool Updates
 Azure DevOps Server 2019
 Azure Active Directory Connect
 Team Foundation Server 2017 and 2018
 Updated Development Components/Packages
 ChakraCore
 ASP.NET Core 2.1 and 2.2
 Nuget 5.0.2
 .NET Core 1.1 – 3.0
 Visual Studio 2015 – 2019
Copyright©2019Ivanti.Allrightsreserved
Patch for Windows is now Ivanti Security Controls!
Ivanti Security Controls 2019.1.1 is available!
• https://forums.ivanti.com/s/product-downloads
• https://go.ivanti.com/Web-Download-Security-Controls.html
What’s New:
• Support for RedHat Linux
• CVE Import
• Application Control (new module)
Copyright©2019Ivanti.Allrightsreserved
Weekly Patch BLOG
 Latest Patch Releases
 Microsoft and Third-party
 Security and non-Security
 CVE Analysis
 Security Events of Interest
 Host: Brian Secrist
 https://www.ivanti.com/blog/
topics/patch-tuesday
Copyright©2019Ivanti.Allrightsreserved
Patch Content Announcement System
Announcements Now Posted on Community Forum Pages
 https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2
 Subscribe to receive email for the desired product(s)
Copyright©2019Ivanti.Allrightsreserved
 Bulletins
Copyright©2019Ivanti.Allrightsreserved
APSB19-18: Security Update for Adobe Acrobat and Reader
 Maximum Severity: Critical
 Affected Products: Adobe Acrobat and Reader (all current versions)
 Description: Adobe has released security updates for Adobe Acrobat and Reader for
Windows and MacOS. These updates address critical and important vulnerabilities.
Successful exploitation could lead to arbitrary code execution in the context of the
current user.
 Impact: Remote Code Execution and Information Disclosure
 Fixes 84 Vulnerabilities: https://helpx.adobe.com/security/products/acrobat/apsb19-
18.html
 Restart Required: Requires application restart
Copyright©2019Ivanti.Allrightsreserved
APSB19-26: Security Update for Adobe Flash Player
 Maximum Severity: Critical
 Affected Products: Adobe Flash Player for Desktop Runtime, Google Chrome,
Internet Explorer 11 and Edge
 Description: Adobe has released security updates for Adobe Flash Player for
Windows, macOS, Linux and Chrome OS. These updates address a critical and
an important vulnerability in Adobe Flash Player. Successful exploitation could lead
to arbitrary code execution in the context of the current user.
 Impact: Remote Code Execution
 Fixes 1 Vulnerability: CVE-2019-7837
 Restart Required: Requires application restart
Copyright©2019Ivanti.Allrightsreserved
MS19-05-AFP: Security Update for Adobe Flash Player
 Maximum Severity: Critical
 Affected Products: Adobe Flash Player
 Description: This security update resolves vulnerabilities in Adobe Flash Player that is
installed on Windows Server 2019, all versions, Windows 10, version 1903, Windows
10, version 1809, Windows Server version 1803, Windows 10, version 1803, Windows
Server 2016 Version 1709, Windows 10, version 1709, Windows 10, version 1703,
Windows Server 2016, Windows 10, version 1607, Windows 10, Windows Server 2012
R2, Windows RT 8.1, Windows 8.1, and Windows Server 2012. This bulletin is based
on KB 4497932 and ADV190012.
 Impact: Remote Code Execution
 Fixes 1 Vulnerability: CVE-2019-7837
 Restart Required: Requires application restart
Copyright©2019Ivanti.Allrightsreserved
MS19-05-W10: Windows 10 Update
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803,
1809,1903, Server 2016, Server 2019, Server 1709, Server 1803, IE 11 and Microsoft
Edge
 Description: This bulletin references 10 KB articles. See KBs for the list of changes.
 Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Elevation of
Privilege, and Information Disclosure
 Fixes 53 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed.
See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slides
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Windows 10
 KB 4494440 – Windows 10, Version 1607 and Server 2016
 For hosts managed by System Center Virtual Machine Manager (SCVMM), SCVMM cannot
enumerate and manage logical switches deployed on the host after installing the update.
Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the
hosts. Workaround: 1.Run mofcomp on the following mof files on the affected host:
Scvmmswitchportsettings.mof and VMMDHCPSvr.mof. Follow the best practices.
 After installing KB 4467684, the cluster service may fail to start with the error “2245
(NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with
greater than 14 characters. Workaround: Set the domain default "Minimum Password Length"
policy to less than or equal to 14 characters. Microsoft is working on a resolution.
 [File Rename] Certain operations, such as rename, that you perform on files or folders that are
on a Cluster Shared Volume (CSV) may fail with the error,
“STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the
operation on a CSV owner node from a process that doesn’t have administrator privilege.
Workaround: Perform the operation from a process that has administrator privilege or perform
the operation from a node that doesn’t have CSV ownership. Microsoft is working on a
resolution.
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Windows 10 (cont)
 KB 4494440 – Windows 10, Version 1607 and Server 2016 (cont)
 [PXE Start] After installing this update, there may be issues using the Preboot Execution
Environment (PXE) to start a device from a Windows Deployment Services (WDS) server
configured to use Variable Window Extension. This may cause the connection to the WDS
server to terminate prematurely while downloading the image. This issue does not affect clients
or devices that are not using Variable Window Extension. Workaround: To mitigate the issue,
disable the Variable Window Extension on WDS server. Three options provided with the KB
article.
 KB 4499181 – Windows 10, Version 1703
 [File Rename] Issue
 KB 4499179 – Windows 10, Version 1709
 [File Rename] Issue
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Windows 10 (cont)
 KB 4499167 – Windows 10, Version 1803
 [PXE Start] Issue
 [File Rename] Issue
 KB 4494441 – Windows 10, Version 1809, Server 2019 All Versions
 [PXE Start] Issue
 [File Rename] Issue
 When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP)
applications, you may receive the error, "Your printer has experienced an unexpected
configuration problem. 0x80070007e.“ Workaround: Use another browser, such as Internet
Explorer to print your documents. Microsoft is working on a resolution.
 After installing KB4493509, devices with some Asian language packs installed may receive the
error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“ Workaround:
Uninstall and reinstall any recently added language packs or select Check for Updates and
install the April 2019 Cumulative Update. See KB for more recovery details.
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Windows 10 (cont)
 KB 4499167 – Windows 10, Version 1903
 After installing this update, users may experience error “0x800705b4” when launching Windows
Defender Application Guard or Windows Sandbox. Workaround: Use the credentials of a local
admin to create and set the registry keys on the Host OS; then restart the Host. See KB for
registry key details. Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
MS19-05-IE: Security Updates for Internet Explorer
 Maximum Severity: Critical
 Affected Products: Microsoft Internet Explorer 9,10,11
 Description: The fixes that are included in the cumulative Security Update for Internet
Explorer are also included in the May 2019 Security Monthly Quality Rollup. Installing
either the Security Update for Internet Explorer or the Security Monthly Quality Rollup
installs the fixes that are in the cumulative update. This bulletin references 12 KB
articles.
 Impact: Remote Code Execution, Security Feature Bypass, Spoofing, and Information
Disclosure
 Fixes 8 Vulnerabilities: CVE-2019-0884, CVE-2019-0911, CVE-2019-0918, CVE-
2019-0921, CVE-2019-0929, CVE-2019-0930, CVE-2019-0940, CVE-2019-0995
 Restart Required: Requires browser restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Internet Explorer
 KB 4498206 – Cumulative Update for Internet Explorer 11 on Windows Server
2012 R2, Internet Explorer 11 on Windows Server 2012, Internet Explorer 11
on Windows Server 2008 R2 SP1, Internet Explorer 11 on Windows 8.1
Update, Internet Explorer 11 on Windows 7 SP1, Internet Explorer 10 on
Windows Server 2012, Internet Explorer 9 on Windows Server 2008 SP2,
 After this security update is installed for Internet Explorer 11 on supported operating systems,
Custom URI Schemes for Application Protocol handlers may not start the corresponding
application for local intranet and trusted sites on Internet Explorer. Workaround: Right-click the
URL link to open it in a new window or tab, or, enable Protected Mode in Internet Explorer for
local intranet and trusted sites. See KB for more details.
 This cumulative security update 4498206 for Internet Explorer 10 might be offered for installation
through Windows Server Update Services (WSUS) or other update management solutions, even
after you install KB 4492872 (Internet Explorer 11 for Windows Server 2012 and Windows
Embedded 8 Standard) and upgrade to Internet Explorer 11. Workaround: No functional issues
with Internet Explorer 11, but install KB 4498206 to apply the security fixes that are resolved this
month for Internet Explorer 11.
Copyright©2019Ivanti.Allrightsreserved
MS19-05-MR2K8: Monthly Rollup for Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008 and IE 9
 Description: This security update includes improvements and fixes that were a part of
update KB 4493460 (released April 25, 2019). Security updates to Windows App
Platform and Frameworks, Microsoft Graphics Component, Windows Storage and
Filesystems, Windows Cryptography, Windows Kernel, Windows Server, and the
Microsoft JET Database Engine. This bulletin is based on KB 4499149.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 22 Vulnerabilities: CVE-2019-0708, CVE-2019-0734, CVE-2019-0758, CVE-
2019-0881, CVE-2019-0882, CVE-2019-0885, CVE-2019-0889, CVE-2019-0890, CVE-
2019-0891, CVE-2019-0893, CVE-2019-0756, CVE-2019-0759, CVE-2019-0765, CVE-
2019-0767, CVE-2019-0772, CVE-2019-0774, CVE-2019-0775, CVE-2019-0782, CVE-
2019-0784, CVE-2019-0808, CVE-2019-0821.
 Restart Required: Requires restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Server 2008
 KB 4499149 –Windows Server 2008 Service Pack 2 (Monthly Rollup)
 KB 4499180 –Windows Server 2008 Service Pack 2 (Security-only Update)
 Restart stuck on "Stage 2 of 2" or "Stage 3 of 3"
 After you install a servicing stack update together with other updates, a restart may be required
to complete the installation. During this restart, you may find yourself stuck at a particular stage
and see a "Stage 2 of 2" or "Stage 3 of 3" message.
 If you experience this issue, press Ctrl+Alt+Delete to continue to log on. This should occur only
one time and does not prevent updates from installing successfully.
 Note In managed environments, such as by using Windows Server Update Services (WSUS),
you can avoid this issue by deploying this update as a standalone update.
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SO2K8: Security-only Update for Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008
 Description: Security updates to Windows App Platform and Frameworks, Microsoft
Graphics Component, Windows Storage and Filesystems, Windows Cryptography,
Windows Kernel, Windows Server, and the Microsoft JET Database Engine. This
bulletin is based on KB 4499180.
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 22 Vulnerabilities: CVE-2019-0708, CVE-2019-0734, CVE-2019-0758, CVE-
2019-0881, CVE-2019-0882, CVE-2019-0885, CVE-2019-0889, CVE-2019-0890, CVE-
2019-0891, CVE-2019-0893, CVE-2019-0756, CVE-2019-0759, CVE-2019-0765, CVE-
2019-0767, CVE-2019-0772, CVE-2019-0774, CVE-2019-0775, CVE-2019-0782, CVE-
2019-0784, CVE-2019-0808, CVE-2019-0821.
 Restart Required: Requires restart
 Known Issues: See previous slide
Copyright©2019Ivanti.Allrightsreserved
MS19-05-MR7: Monthly Rollup for Win 7 and Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7, Server 2008 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4493453 (released April 25, 2019). This bulletin is based on KB 4499164.
 Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking,
Windows Kernel, Windows Server, and the Microsoft JET Database.
 Provides protections against a new subclass of speculative execution side-channel
vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of
Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 24 + 8 (IE) Vulnerabilities: CVE-2019-0863 is known exploited and publicly
disclosed. See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Windows 7 and Server 2008 R2
 KB 4499164 – Windows 7 SP1 and Server 2008 R2 SP1 (Monthly Rollup)
 [McAfee] Microsoft and McAfee have identified an issue on devices with McAfee Endpoint
Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or
McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup
or become unresponsive at restart after installing this update.
 Workarounds:
 McAfee Security(ENS) Threat Prevention 10.x
 McAfee Host Intrusion Prevention (Host IPS) 8.0
 McAfee VirusScan Enterprise (VSE) 8.8
 Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SO7: Security-only Update for Win 7 and Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7 SP1, Server 2008 R2 SP1
 Description: This bulletin is based on KB 4499175.
 Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking,
Windows Kernel, Windows Server, and the Microsoft JET Database.
 Provides protections against a new subclass of speculative execution side-channel
vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of
Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 24 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed.
See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-05-MR8: Monthly Rollup for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012 and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4493462 (released April 25, 2019). This bulletin is based on KB 4499171.
 Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking,
Windows Kernel, Windows Server, and the Microsoft JET Database.
 Provides protections against a new subclass of speculative execution side-channel
vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of
Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 24 + 8 (IE) Vulnerabilities: CVE-2019-0863 is known exploited and publicly
disclosed. See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Server 2012
 KB 4499171 – Windows Server 2012, Windows Embedded 8 Standard
(Monthly Rollup)
 KB 4499154 – Windows Server 2012, Windows Embedded 8 Standard
(Security-only Update)
 [PXE Start] Issue
 [File Rename] Issue
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SO8: Security-only Update for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012
 Description: This bulletin is based on KB 4499154.
 Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking,
Windows Kernel, Windows Server, and the Microsoft JET Database.
 Provides protections against a new subclass of speculative execution side-channel
vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of
Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 24 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed.
See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See previous slide
Copyright©2019Ivanti.Allrightsreserved
MS19-05-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4493443 (released April 25, 2019). This bulletin is based on KB 4499151.
 Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking,
Windows Kernel, Windows Server, and the Microsoft JET Database.
 Provides protections against a new subclass of speculative execution side-channel
vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of
Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 24 + 8 (IE) Vulnerabilities: CVE-2019-0863 is known exploited and publicly
disclosed. See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slide
Copyright©2019Ivanti.Allrightsreserved
May Known Issues for Windows 8.1 and Server 2012 R2
 KB 4499151 – Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)
 KB 4499165 – Windows 8.1, Windows Server 2012 R2 (Security-only Update)
 [PXE Start] Issue
 [File Rename] Issue
 [McAfee] Issue
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SO81: Security-only Update for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2
 Description: This bulletin is based on KB 4499165.
 Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component,
Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking,
Windows Kernel, Windows Server, and the Microsoft JET Database.
 Provides protections against a new subclass of speculative execution side-channel
vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of
Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
 Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure
 Fixes 24 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed.
See Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See previous slide
Copyright©2019Ivanti.Allrightsreserved
MS19-05-OFF: Security Updates for Microsoft Office
 Maximum Severity: Critical
 Affected Products: Office 2010-2016, Office 2016 and 2019 for Mac, Word 2016
 Description: This security update resolves vulnerabilities in several Microsoft Office
applications. This bulletin references 5 KB articles plus release notes for MacOS.
 Impact: Remote Code Execution
 Fixes 4 Vulnerabilities: CVE-2019-0945, CVE-2019-0946, CVE-2019-0947, CVE-
2019-0953
 Restart Required: Requires application restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-04-O365: Security Updates for Office 365 ProPlus
 Maximum Severity: Critical
 Affected Products: Office 365 ProPlus, Office 2019
 Description: This month’s update resolved various bugs and performance issues in
Microsoft Office 365 applications. Information on Office 365 ProPlus updates is
available at https://docs.microsoft.com/en-us/officeupdates/release-notes-office365-
proplus
 Impact: Remote Code Execution
 Fixes 3 Vulnerabilities: CVE-2019-0945, CVE-2019-0946, CVE-2019-0953
 Restart Required: Requires application restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SPT: Security Updates for SharePoint Server
 Maximum Severity: Important
 Affected Products: Microsoft Enterprise SharePoint Server 2010-2019
 Description: This security update resolves vulnerabilities in Microsoft Office that could
allow remote code execution if a user opens a specially crafted Office file. This bulletin
is based on 4 KB articles.
 Impact: Remote Code Execution, Spoofing, Elevation of Privilege, and Information
Disclosure
 Fixes 8 Vulnerabilities: CVE-2019-0949, CVE-2019-0950 , CVE-2019-0951 , CVE-
2019-0952 , CVE-2019-0956 , CVE-2019-0957 , CVE-2019-0958 , CVE-2019-0963
 Restart Required: Requires Restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS19-05-MRNET: Monthly Rollup for Microsoft .Net
 Maximum Severity: Important
 Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8
 Description: This security update resolves denial of service vulnerabilities when .NET
Framework improperly handles objects in heap memory, or when .NET Framework and
.NET Core improperly process RegEx strings. This bulletin references 19 KB articles.
 Impact: Denial of Service
 Fixes 4 Vulnerabilities: CVE-2019-0820, CVE-2019-0864, CVE-2019-0980, and
CVE-2019-0981
 Restart Required: Does not require a system restart after you apply it unless files
that are being updated are locked or are being used.
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SONET: Security-only Update for Microsoft .Net
 Maximum Severity: Important
 Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8
 Description: This security update resolves denial of service vulnerabilities when .NET
Framework improperly handles objects in heap memory, or when .NET Framework and
.NET Core improperly process RegEx strings. This bulletin references 19 KB articles.
 Impact: Denial of Service
 Fixes 4 Vulnerabilities: CVE-2019-0820, CVE-2019-0864, CVE-2019-0980, and
CVE-2019-0981
 Restart Required: Does not require a system restart after you apply it unless files
that are being updated are locked or are being used.
Copyright©2019Ivanti.Allrightsreserved
MS19-05-SQL: Security Updates for SQL Server
 Maximum Severity: Important
 Affected Products: Microsoft SQL Server 2017
 Description: This security update fixes a potential leak of restricted data that is not
protected correctly by the Object-Level Security (OLS) system in SQL Server Analysis
Services. This bulletin is based on KBs 4494351 and 4494352.
 Impact: Information Disclosure
 Fixes 1 Vulnerability: CVE-2019-0819
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
 Maximum Severity: Medium
 Affected Products: VMware Workstation Pro and Player 15.x
 Description: This security update resolves a vulnerability which may allow attackers
with normal user privileges to escalate their privileges to administrator on a windows
host where Workstation is installed.
 Impact: Elevation of Privilege
 Fixes 1 Vulnerability: CVE-2019-1526
 Restart Required: Requires Restart
 Known Issues: None reported
VMSA-2019-0007 Update for VMware Workstation
Copyright©2019Ivanti.Allrightsreserved
Between Patch Tuesday’s
New Product Support: Tableau Prep, Tableau Prep Builder, Windows 10 1903, .Net
4.8 Runtime
Security Updates: Adobe Air (1), Adobe Acrobat (3), Camtasia (3), Google Chrome (2),
Citrix Receiver (1), DropBox (2), Evernote (2), Firefox (3), Firefox ESR (1), Foxit Reader
(4), Foxit PhantomPDF (2), FileZilla (2), GOM Player (1), GoToMeeting (2), Java Runtime
(1), Java Development Kit (1), LibreOffice (2), Microsoft (2), Node.JS (3), Opera (5),
Oracle VirtualBox (2), Plex Media Server (2), PeaZip (2), RealTimes (1), Splunk Universal
Forwarder (1), Tableau Desktop (4), Tableau Prep (2), Tableau Reader (1), Tomcat (3),
TortoiseSVN (1), TeamViewer (1), WinSCP (1), WinRAR (1)
Non-Security Updates: BlueJeans (1), Box Edit (1), CCleaner (1), Google Drive (1),
GoodSync (2), GoTo Opener (1), Google Backup and Sync (1), Java Runtime (1), Java
Development Kit (1), KeePass Pro (1), LogMeIn (1), Microsoft (45), NVivo (1), PowerBI
Desktop (1), PDF-Xchange PRO (1), Plex Media Player (2), R for Windows (1), Royal TS
(1), Skype (2), TortoiseHG (1), Zoom Client (1), Zoom Outlook Plugin (1)
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information
 Citrix Receiver 4.9.6001, LTSR Cumulative Update 6
 CTXR-018, QCTXR496001
 Fixes 1 Vulnerability: CVE-2019-11634
 Camtasia 9.1.5
 CAMTA-015, QCAMTASIA915
 Fixes 6 Vulnerabilities: CVE-2018-14054, CVE-2018-14325, CVE-2018-
14326, CVE-2018-14379, CVE-2018-14403, CVE-2018-14446
 Camtasia 2019.0.1
 CAMTA-014, QCAMTASIA201901
 Fixes 12 Vulnerabilities: CVE-2018-14054, CVE-2018-14325, CVE-2018-
14326, CVE-2018-14379, CVE-2018-14403, CVE-2018-14446, CVE-2018-
14054, CVE-2018-14325, CVE-2018-14326, CVE-2018-14379, CVE-2018-
14403, CVE-2018-14446
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 VirtualBox 5.2.28
 OVB-021, QOVB5228
 Fixes 12 Vulnerabilities: CVE-2019-2574, CVE-2019-2656, CVE-2019-2657,
CVE-2019-2678, CVE-2019-2679, CVE-2019-2680, CVE-2019-2690, CVE-
2019-2696, CVE-2019-2703, CVE-2019-2721, CVE-2019-2722, CVE-2019-
2723
 Google Chrome 74.0.3729.131
 Chrome-251, QGC7403729131
 Fixes 23 Vulnerabilities: CVE-2019-5824, CVE-2019-5827, CVE-2019-5805,
CVE-2019-5806, CVE-2019-5807, CVE-2019-5808, CVE-2019-5809, CVE-
2019-5810, CVE-2019-5811, CVE-2019-5812, CVE-2019-5813, CVE-2019-
5814, CVE-2019-5815, CVE-2019-5816, CVE-2019-5817, CVE-2019-5818,
CVE-2019-5819, CVE-2019-5820, CVE-2019-5821, CVE-2019-5822, CVE-
2019-5823, CVE-2019-5825, CVE-2019-5826
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 Foxit Reader Consumer 9.5.0.20723
 FIC-006, QNFOXIT95020723
 Fixes 8 Vulnerabilities CVE-2018-20309, CVE-2018-20310, CVE-2018-20311,
CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315,
CVE-2018-20316
 Foxit Reader 9.5.0.20723
 FI19-9502, QFI95020723
 Fixes 8 Vulnerabilities CVE-2018-20309, CVE-2018-20310, CVE-2018-20311,
CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315,
CVE-2018-20316
 Foxit PhantomPDF 9.5.0.20723
 FIP-021, QFIP95020723
 Fixes 7 Vulnerabilities: CVE-2018-20309, CVE-2018-20310, CVE-2018-20311,
CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315,
CVE-2018-20316
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 VirtualBox 6.0.6
 OVB-020, QOVB6060
 Fixes 19 Vulnerabilities CVE-2018-11784, CVE-2019-1559, CVE-2019-2574,
CVE-2019-2656, CVE-2019-2657, CVE-2019-2678, CVE-2019-2679, CVE-
2019-2680, CVE-2019-2690, CVE-2019-2696, CVE-2019-2703, CVE-2019-
2721, CVE-2019-2722, CVE-2019-2723, CVE-2019-3822
 Java Development Kit 8 Update 211
 JDK8-211, QJDK8U211
 Fixes 5 Vulnerabilities CVE-2019-2602, CVE-2019-2684, CVE-2019-2697,
CVE-2019-2698, CVE-2019-2699
 Java 8 Update 211
 Java8-211, QJAVA8U211
 Fixes 5 Vulnerabilities CVE-2019-2602, CVE-2019-2684, CVE-2019-2697,
CVE-2019-2698, CVE-2019-2699
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 Apache Tomcat 7.0.9
 TOMCAT-131, QTOMCAT7094
 Fixes 1 Vulnerability CVE-2019-0324
 Apache Tomcat 8.5.40
 TOMCAT-132, QTOMCAT8540
 Fixes 1 Vulnerability CVE-2019-0324
 Apache Tomcat 9.0.19
 TOMCAT-133, QTOMCAT9019
 Fixes 1 Vulnerability CVE-2019-0324
May 30 | 11am ET | Free Event
WINDOWS 10
SUMMIT VIRTUAL
EVENT
Copyright©2019Ivanti.Allrightsreserved
Thank You

More Related Content

What's hot

Ivanti Patch Tuesday for November 2019
Ivanti Patch Tuesday for November 2019Ivanti Patch Tuesday for November 2019
Ivanti Patch Tuesday for November 2019
Ivanti
 
Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019
Ivanti
 
November Patch Tuesday Analysis
November Patch Tuesday AnalysisNovember Patch Tuesday Analysis
November Patch Tuesday Analysis
Ivanti
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
Ivanti
 
December Patch Tuesday 2020
December Patch Tuesday 2020December Patch Tuesday 2020
December Patch Tuesday 2020
Ivanti
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019
Ivanti
 
French Patch Tuesday April 2021
French Patch Tuesday April 2021French Patch Tuesday April 2021
French Patch Tuesday April 2021
Ivanti
 
December 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday AnalysisDecember 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday Analysis
Ivanti
 
October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018
Ivanti
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
Ivanti
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
Ivanti
 
Patch Tuesday November - 2020
Patch Tuesday November - 2020Patch Tuesday November - 2020
Patch Tuesday November - 2020
Ivanti
 
April 2021 Patch Tuesday
April 2021 Patch TuesdayApril 2021 Patch Tuesday
April 2021 Patch Tuesday
Ivanti
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020
Ivanti
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday Analysis
Ivanti
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch Tuesday
Ivanti
 
2021 June Patch Tuesday
2021 June Patch Tuesday2021 June Patch Tuesday
2021 June Patch Tuesday
Ivanti
 
January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018
Ivanti
 
November Patch Tuesday 2020
November Patch Tuesday 2020 November Patch Tuesday 2020
November Patch Tuesday 2020
Ivanti
 
Fr february 2022 patch tuesday v2 presenters slides
Fr february 2022 patch tuesday v2   presenters slidesFr february 2022 patch tuesday v2   presenters slides
Fr february 2022 patch tuesday v2 presenters slides
Ivanti
 

What's hot (20)

Ivanti Patch Tuesday for November 2019
Ivanti Patch Tuesday for November 2019Ivanti Patch Tuesday for November 2019
Ivanti Patch Tuesday for November 2019
 
Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019Ivanti Patch Tuesday for December 2019
Ivanti Patch Tuesday for December 2019
 
November Patch Tuesday Analysis
November Patch Tuesday AnalysisNovember Patch Tuesday Analysis
November Patch Tuesday Analysis
 
January Patch Tuesday 2019
January Patch Tuesday 2019January Patch Tuesday 2019
January Patch Tuesday 2019
 
December Patch Tuesday 2020
December Patch Tuesday 2020December Patch Tuesday 2020
December Patch Tuesday 2020
 
Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019Ivanti Patch Tuesday for October 2019
Ivanti Patch Tuesday for October 2019
 
French Patch Tuesday April 2021
French Patch Tuesday April 2021French Patch Tuesday April 2021
French Patch Tuesday April 2021
 
December 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday AnalysisDecember 2018 Patch Tuesday Analysis
December 2018 Patch Tuesday Analysis
 
October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018October Patch Tuesday Analysis 2018
October Patch Tuesday Analysis 2018
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Patch Tuesday November - 2020
Patch Tuesday November - 2020Patch Tuesday November - 2020
Patch Tuesday November - 2020
 
April 2021 Patch Tuesday
April 2021 Patch TuesdayApril 2021 Patch Tuesday
April 2021 Patch Tuesday
 
Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020Ivanti Patch Tuesday for March 2020
Ivanti Patch Tuesday for March 2020
 
February 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday AnalysisFebruary 2018 Patch Tuesday Analysis
February 2018 Patch Tuesday Analysis
 
2022 March Patch Tuesday
2022 March Patch Tuesday2022 March Patch Tuesday
2022 March Patch Tuesday
 
2021 June Patch Tuesday
2021 June Patch Tuesday2021 June Patch Tuesday
2021 June Patch Tuesday
 
January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018January Patch Tuesday Webinar 2018
January Patch Tuesday Webinar 2018
 
November Patch Tuesday 2020
November Patch Tuesday 2020 November Patch Tuesday 2020
November Patch Tuesday 2020
 
Fr february 2022 patch tuesday v2 presenters slides
Fr february 2022 patch tuesday v2   presenters slidesFr february 2022 patch tuesday v2   presenters slides
Fr february 2022 patch tuesday v2 presenters slides
 

Similar to May Patch Tuesday Analysis 2019

Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
Ivanti
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020
Ivanti
 
2023 May Patch Tuesday
2023 May Patch Tuesday2023 May Patch Tuesday
2023 May Patch Tuesday
Ivanti
 
Analyse Patch Tuesday - mai
Analyse Patch Tuesday - maiAnalyse Patch Tuesday - mai
Analyse Patch Tuesday - mai
Ivanti
 
Ivanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti May 2020 Patch Tuesday
Ivanti May 2020 Patch Tuesday
Ivanti
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020
Ivanti
 
July Patch Tuesday 2020
July Patch Tuesday 2020July Patch Tuesday 2020
July Patch Tuesday 2020
Dan Lalli
 
2023 April Patch Tuesday
2023 April Patch Tuesday2023 April Patch Tuesday
2023 April Patch Tuesday
Ivanti
 
August Patch Tuesday Analysis
August Patch Tuesday AnalysisAugust Patch Tuesday Analysis
August Patch Tuesday Analysis
Ivanti
 
July 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisJuly 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday Analysis
Ivanti
 
September Patch Tuesday- 2020
September Patch Tuesday- 2020September Patch Tuesday- 2020
September Patch Tuesday- 2020
Ivanti
 
2023 avril Patch Tuesday
2023 avril Patch Tuesday2023 avril Patch Tuesday
2023 avril Patch Tuesday
Ivanti
 
Janvier2023PatchTuesday - Presenter slides.pptx
Janvier2023PatchTuesday - Presenter slides.pptxJanvier2023PatchTuesday - Presenter slides.pptx
Janvier2023PatchTuesday - Presenter slides.pptx
Ivanti
 
October2020 patchtuesday[1] read-only
October2020 patchtuesday[1]     read-onlyOctober2020 patchtuesday[1]     read-only
October2020 patchtuesday[1] read-only
Ivanti
 
Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020
Ivanti
 
2023 Mars Patch Tuesday
2023 Mars Patch Tuesday2023 Mars Patch Tuesday
2023 Mars Patch Tuesday
Ivanti
 
2023 March Patch Tuesday
2023 March Patch Tuesday2023 March Patch Tuesday
2023 March Patch Tuesday
Ivanti
 
Français Patch Tuesday – Novembre
Français Patch Tuesday – NovembreFrançais Patch Tuesday – Novembre
Français Patch Tuesday – Novembre
Ivanti
 
Patch Tuesday de Julio
Patch Tuesday de JulioPatch Tuesday de Julio
Patch Tuesday de Julio
Ivanti
 
June Patch Tuesday 2018
June Patch Tuesday 2018June Patch Tuesday 2018
June Patch Tuesday 2018
Ivanti
 

Similar to May Patch Tuesday Analysis 2019 (20)

Patch Tuesday for January 2020
Patch Tuesday for January 2020Patch Tuesday for January 2020
Patch Tuesday for January 2020
 
Patch Tuesday August 2020
Patch Tuesday August 2020 Patch Tuesday August 2020
Patch Tuesday August 2020
 
2023 May Patch Tuesday
2023 May Patch Tuesday2023 May Patch Tuesday
2023 May Patch Tuesday
 
Analyse Patch Tuesday - mai
Analyse Patch Tuesday - maiAnalyse Patch Tuesday - mai
Analyse Patch Tuesday - mai
 
Ivanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti May 2020 Patch Tuesday
Ivanti May 2020 Patch Tuesday
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020
 
July Patch Tuesday 2020
July Patch Tuesday 2020July Patch Tuesday 2020
July Patch Tuesday 2020
 
2023 April Patch Tuesday
2023 April Patch Tuesday2023 April Patch Tuesday
2023 April Patch Tuesday
 
August Patch Tuesday Analysis
August Patch Tuesday AnalysisAugust Patch Tuesday Analysis
August Patch Tuesday Analysis
 
July 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday AnalysisJuly 2018 Patch Tuesday Analysis
July 2018 Patch Tuesday Analysis
 
September Patch Tuesday- 2020
September Patch Tuesday- 2020September Patch Tuesday- 2020
September Patch Tuesday- 2020
 
2023 avril Patch Tuesday
2023 avril Patch Tuesday2023 avril Patch Tuesday
2023 avril Patch Tuesday
 
Janvier2023PatchTuesday - Presenter slides.pptx
Janvier2023PatchTuesday - Presenter slides.pptxJanvier2023PatchTuesday - Presenter slides.pptx
Janvier2023PatchTuesday - Presenter slides.pptx
 
October2020 patchtuesday[1] read-only
October2020 patchtuesday[1]     read-onlyOctober2020 patchtuesday[1]     read-only
October2020 patchtuesday[1] read-only
 
Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020Ivanti Patch Tuesday for February 2020
Ivanti Patch Tuesday for February 2020
 
2023 Mars Patch Tuesday
2023 Mars Patch Tuesday2023 Mars Patch Tuesday
2023 Mars Patch Tuesday
 
2023 March Patch Tuesday
2023 March Patch Tuesday2023 March Patch Tuesday
2023 March Patch Tuesday
 
Français Patch Tuesday – Novembre
Français Patch Tuesday – NovembreFrançais Patch Tuesday – Novembre
Français Patch Tuesday – Novembre
 
Patch Tuesday de Julio
Patch Tuesday de JulioPatch Tuesday de Julio
Patch Tuesday de Julio
 
June Patch Tuesday 2018
June Patch Tuesday 2018June Patch Tuesday 2018
June Patch Tuesday 2018
 

More from Ivanti

Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________
Ivanti
 
Patch Tuesday de Junio
Patch Tuesday de JunioPatch Tuesday de Junio
Patch Tuesday de Junio
Ivanti
 
Patch Tuesday Italia Giugno
Patch Tuesday Italia GiugnoPatch Tuesday Italia Giugno
Patch Tuesday Italia Giugno
Ivanti
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
Ivanti
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
Ivanti
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
Ivanti
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
Ivanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
Ivanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
Ivanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
Ivanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
Ivanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
Ivanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
Ivanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
Ivanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
Ivanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
Ivanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
Ivanti
 

More from Ivanti (20)

Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________
 
Patch Tuesday de Junio
Patch Tuesday de JunioPatch Tuesday de Junio
Patch Tuesday de Junio
 
Patch Tuesday Italia Giugno
Patch Tuesday Italia GiugnoPatch Tuesday Italia Giugno
Patch Tuesday Italia Giugno
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 

Recently uploaded

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 

Recently uploaded (20)

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 

May Patch Tuesday Analysis 2019

  • 1. Patch Tuesday Webinar Wednesday, May 15, 2019 Hosted by: Chris Goettl & Todd Schell Dial in: 1-877-668-4490 (US) Event ID: 806 097 670
  • 2. Copyright©2019Ivanti.Allrightsreserved Agenda May 2019 Patch Tuesday Overview In the News Bulletins Q & A 1 2 3 4
  • 6. Copyright©2019Ivanti.Allrightsreserved New Wormable RDS Vulnerability  Wormable Vulnerability in “Remote Desktop Services” has WannaCry potential  https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by- updating-remote-desktop-services-cve-2019-0708/  https://krebsonsecurity.com/2019/05/microsoft-patches-wormable-flaw-in- windows-xp-7-and-windows-2003/
  • 7. Copyright©2019Ivanti.Allrightsreserved Support for Windows XP and Server 2003 updates  Ivanti Product Coverage:  EPM – Content for XP and 2003 update is live  EPM client support ended for XP and 2003 a while back, but this is still supportable using a older client version.  Security Controls (Patch for Windows) supported as usual  Patch for SCCM – Likely this will not sync automatically, but the content for these updates is in the Windows Update Catalog. To manually sync this content you will need to look into this article:  https://docs.microsoft.com/en-us/sccm/sum/get- started/synchronize-software-updates#import-updates-from-the- microsoft-update-catalog  EMSS – XP and 2003 are not currently supported. Please contact support if this is a concern for your organization so we can provide additional support options.
  • 8. Copyright©2019Ivanti.Allrightsreserved In the News  LightNeuron – A sophisticated backdoor allows threat actors full control to monitor, intercept and send emails from your Exchange server.  https://www.zdnet.com/article/russian-cyberspies-are-using-one-hell-of-a- clever-microsoft-exchange-backdoor/  https://www.theregister.co.uk/2019/05/08/exchange_malware_lightneuron/  Fxmsp chat logs reveal the hacked AV vendors  https://www.bleepingcomputer.com/news/security/fxmsp-chat-logs-reveal-the- hacked-antivirus-vendors-avs-respond/  Microsoft SharePoint bug exploited in the wild  https://www.darkreading.com/endpoint/microsoft-sharepoint-bug-exploited-in- the-wild/d/d-id/1334683  IE11 for Server 2012  https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Bringing- Internet-Explorer-11-to-Windows-Server-2012-and-Windows/ba-p/325297
  • 9. Copyright©2019Ivanti.Allrightsreserved More Vulnerabilities Disclosed on Intel Processors  Fallout, ZombieLoad, and Rogue In-Flight Data Load (RIDL)  Targeting four specific vulnerabilities - CVE-2018-12126, CVE-2018-12127, CVE- 2018-12130, CVE-2019-11091  Microarchitectural Data Sampling (MDS) vulnerabilities  More dangerous data sampling attacks – leak data from CPU buffers  https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks- impact-all-modern-intel-cpus/  Remediation is similar to Spectre and Meltdown  Software updates and microcode changes  https://support.microsoft.com/en-us/help/4093836/summary-of-intel- microcode-updates  https://portal.msrc.microsoft.com/en-US/security- guidance/advisory/ADV190013  AMD processors are not vulnerable
  • 10. Copyright©2019Ivanti.Allrightsreserved Windows 10 Lifecycle Awareness  Windows 10 Branch Support  Complete Lifecycle Fact Sheet  https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet Source: Microsoft
  • 11. Copyright©2019Ivanti.Allrightsreserved Zero-day Exploited Vulnerabilities  CVE-2019-0863 Windows Error Reporting Elevation of Privilege Vulnerability  An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with administrator privileges.  To exploit the vulnerability, an attacker must first gain unprivileged execution on a victim system.  The security update addresses the vulnerability by correcting the way WER handles files.
  • 12. Copyright©2019Ivanti.Allrightsreserved Microsoft Finally Switching to SHA2 Certificates  https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-signing- support-requirement-for-windows-and-wsus  Phased migration process from March to September 2019  Dual signed SHA1/SHA2 migrating to SHA2 signed only  Legacy OS and WSUS require updates  Advisory 190009 SHA-2 Code Sign Support Advisory  Server 2008 SP2 migration update released yesterday  https://support.microsoft.com/en-us/help/4474419/sha-2-code-signing-support- update  All current Ivanti products support this change
  • 13. Copyright©2019Ivanti.Allrightsreserved Java 8 211 and 212  Java 8 is no longer publicly supported. If you have a continued support contract Ivanti Patch solutions include content, but provide this as “Drop In” support meaning you need to provide the patch.  https://forums.ivanti.com/s/article/Oracle-SE-Java-8-support-changes-and- how-it-effects-deployments-through-Ivanti-Patch-Management-solutions  Oracle’s download page for Java 8:  https://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads- 2133155.html
  • 14. Copyright©2019Ivanti.Allrightsreserved Microsoft Patch Tuesday Updates of Interest  Advisory 990001 Latest Servicing Stack Updates  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001  May Releases  KB 4498353 – Windows 10  KB 4498947 – Windows 10 1607/Server 2016 (pre-req for new updates)  KB 4500640 – Windows 10 1703  KB 4500641 – Windows 10 1709/Server version 1709  KB 4497398 – Windows 10 1803/Server version 1803  KB 4499728 – Windows 10 1809/Server 2019 (pre-req for new updates)  KB 4500109 – Windows 10 1903/Server version 1903
  • 15. Copyright©2019Ivanti.Allrightsreserved Microsoft Patch Tuesday Updates of Interest (cont)  Development Tool Updates  Azure DevOps Server 2019  Azure Active Directory Connect  Team Foundation Server 2017 and 2018  Updated Development Components/Packages  ChakraCore  ASP.NET Core 2.1 and 2.2  Nuget 5.0.2  .NET Core 1.1 – 3.0  Visual Studio 2015 – 2019
  • 16. Copyright©2019Ivanti.Allrightsreserved Patch for Windows is now Ivanti Security Controls! Ivanti Security Controls 2019.1.1 is available! • https://forums.ivanti.com/s/product-downloads • https://go.ivanti.com/Web-Download-Security-Controls.html What’s New: • Support for RedHat Linux • CVE Import • Application Control (new module)
  • 17. Copyright©2019Ivanti.Allrightsreserved Weekly Patch BLOG  Latest Patch Releases  Microsoft and Third-party  Security and non-Security  CVE Analysis  Security Events of Interest  Host: Brian Secrist  https://www.ivanti.com/blog/ topics/patch-tuesday
  • 18. Copyright©2019Ivanti.Allrightsreserved Patch Content Announcement System Announcements Now Posted on Community Forum Pages  https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2  Subscribe to receive email for the desired product(s)
  • 20. Copyright©2019Ivanti.Allrightsreserved APSB19-18: Security Update for Adobe Acrobat and Reader  Maximum Severity: Critical  Affected Products: Adobe Acrobat and Reader (all current versions)  Description: Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.  Impact: Remote Code Execution and Information Disclosure  Fixes 84 Vulnerabilities: https://helpx.adobe.com/security/products/acrobat/apsb19- 18.html  Restart Required: Requires application restart
  • 21. Copyright©2019Ivanti.Allrightsreserved APSB19-26: Security Update for Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player for Desktop Runtime, Google Chrome, Internet Explorer 11 and Edge  Description: Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address a critical and an important vulnerability in Adobe Flash Player. Successful exploitation could lead to arbitrary code execution in the context of the current user.  Impact: Remote Code Execution  Fixes 1 Vulnerability: CVE-2019-7837  Restart Required: Requires application restart
  • 22. Copyright©2019Ivanti.Allrightsreserved MS19-05-AFP: Security Update for Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player  Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on Windows Server 2019, all versions, Windows 10, version 1903, Windows 10, version 1809, Windows Server version 1803, Windows 10, version 1803, Windows Server 2016 Version 1709, Windows 10, version 1709, Windows 10, version 1703, Windows Server 2016, Windows 10, version 1607, Windows 10, Windows Server 2012 R2, Windows RT 8.1, Windows 8.1, and Windows Server 2012. This bulletin is based on KB 4497932 and ADV190012.  Impact: Remote Code Execution  Fixes 1 Vulnerability: CVE-2019-7837  Restart Required: Requires application restart
  • 23. Copyright©2019Ivanti.Allrightsreserved MS19-05-W10: Windows 10 Update  Maximum Severity: Critical  Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803, 1809,1903, Server 2016, Server 2019, Server 1709, Server 1803, IE 11 and Microsoft Edge  Description: This bulletin references 10 KB articles. See KBs for the list of changes.  Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Elevation of Privilege, and Information Disclosure  Fixes 53 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slides
  • 24. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Windows 10  KB 4494440 – Windows 10, Version 1607 and Server 2016  For hosts managed by System Center Virtual Machine Manager (SCVMM), SCVMM cannot enumerate and manage logical switches deployed on the host after installing the update. Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts. Workaround: 1.Run mofcomp on the following mof files on the affected host: Scvmmswitchportsettings.mof and VMMDHCPSvr.mof. Follow the best practices.  After installing KB 4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters. Workaround: Set the domain default "Minimum Password Length" policy to less than or equal to 14 characters. Microsoft is working on a resolution.  [File Rename] Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Workaround: Perform the operation from a process that has administrator privilege or perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution.
  • 25. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Windows 10 (cont)  KB 4494440 – Windows 10, Version 1607 and Server 2016 (cont)  [PXE Start] After installing this update, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. Workaround: To mitigate the issue, disable the Variable Window Extension on WDS server. Three options provided with the KB article.  KB 4499181 – Windows 10, Version 1703  [File Rename] Issue  KB 4499179 – Windows 10, Version 1709  [File Rename] Issue
  • 26. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Windows 10 (cont)  KB 4499167 – Windows 10, Version 1803  [PXE Start] Issue  [File Rename] Issue  KB 4494441 – Windows 10, Version 1809, Server 2019 All Versions  [PXE Start] Issue  [File Rename] Issue  When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive the error, "Your printer has experienced an unexpected configuration problem. 0x80070007e.“ Workaround: Use another browser, such as Internet Explorer to print your documents. Microsoft is working on a resolution.  After installing KB4493509, devices with some Asian language packs installed may receive the error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“ Workaround: Uninstall and reinstall any recently added language packs or select Check for Updates and install the April 2019 Cumulative Update. See KB for more recovery details.
  • 27. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Windows 10 (cont)  KB 4499167 – Windows 10, Version 1903  After installing this update, users may experience error “0x800705b4” when launching Windows Defender Application Guard or Windows Sandbox. Workaround: Use the credentials of a local admin to create and set the registry keys on the Host OS; then restart the Host. See KB for registry key details. Microsoft is working on a resolution.
  • 28. Copyright©2019Ivanti.Allrightsreserved MS19-05-IE: Security Updates for Internet Explorer  Maximum Severity: Critical  Affected Products: Microsoft Internet Explorer 9,10,11  Description: The fixes that are included in the cumulative Security Update for Internet Explorer are also included in the May 2019 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in the cumulative update. This bulletin references 12 KB articles.  Impact: Remote Code Execution, Security Feature Bypass, Spoofing, and Information Disclosure  Fixes 8 Vulnerabilities: CVE-2019-0884, CVE-2019-0911, CVE-2019-0918, CVE- 2019-0921, CVE-2019-0929, CVE-2019-0930, CVE-2019-0940, CVE-2019-0995  Restart Required: Requires browser restart  Known Issues: See next slide
  • 29. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Internet Explorer  KB 4498206 – Cumulative Update for Internet Explorer 11 on Windows Server 2012 R2, Internet Explorer 11 on Windows Server 2012, Internet Explorer 11 on Windows Server 2008 R2 SP1, Internet Explorer 11 on Windows 8.1 Update, Internet Explorer 11 on Windows 7 SP1, Internet Explorer 10 on Windows Server 2012, Internet Explorer 9 on Windows Server 2008 SP2,  After this security update is installed for Internet Explorer 11 on supported operating systems, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer. Workaround: Right-click the URL link to open it in a new window or tab, or, enable Protected Mode in Internet Explorer for local intranet and trusted sites. See KB for more details.  This cumulative security update 4498206 for Internet Explorer 10 might be offered for installation through Windows Server Update Services (WSUS) or other update management solutions, even after you install KB 4492872 (Internet Explorer 11 for Windows Server 2012 and Windows Embedded 8 Standard) and upgrade to Internet Explorer 11. Workaround: No functional issues with Internet Explorer 11, but install KB 4498206 to apply the security fixes that are resolved this month for Internet Explorer 11.
  • 30. Copyright©2019Ivanti.Allrightsreserved MS19-05-MR2K8: Monthly Rollup for Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008 and IE 9  Description: This security update includes improvements and fixes that were a part of update KB 4493460 (released April 25, 2019). Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Kernel, Windows Server, and the Microsoft JET Database Engine. This bulletin is based on KB 4499149.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 22 Vulnerabilities: CVE-2019-0708, CVE-2019-0734, CVE-2019-0758, CVE- 2019-0881, CVE-2019-0882, CVE-2019-0885, CVE-2019-0889, CVE-2019-0890, CVE- 2019-0891, CVE-2019-0893, CVE-2019-0756, CVE-2019-0759, CVE-2019-0765, CVE- 2019-0767, CVE-2019-0772, CVE-2019-0774, CVE-2019-0775, CVE-2019-0782, CVE- 2019-0784, CVE-2019-0808, CVE-2019-0821.  Restart Required: Requires restart  Known Issues: See next slide
  • 31. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Server 2008  KB 4499149 –Windows Server 2008 Service Pack 2 (Monthly Rollup)  KB 4499180 –Windows Server 2008 Service Pack 2 (Security-only Update)  Restart stuck on "Stage 2 of 2" or "Stage 3 of 3"  After you install a servicing stack update together with other updates, a restart may be required to complete the installation. During this restart, you may find yourself stuck at a particular stage and see a "Stage 2 of 2" or "Stage 3 of 3" message.  If you experience this issue, press Ctrl+Alt+Delete to continue to log on. This should occur only one time and does not prevent updates from installing successfully.  Note In managed environments, such as by using Windows Server Update Services (WSUS), you can avoid this issue by deploying this update as a standalone update.
  • 32. Copyright©2019Ivanti.Allrightsreserved MS19-05-SO2K8: Security-only Update for Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008  Description: Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Kernel, Windows Server, and the Microsoft JET Database Engine. This bulletin is based on KB 4499180.  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 22 Vulnerabilities: CVE-2019-0708, CVE-2019-0734, CVE-2019-0758, CVE- 2019-0881, CVE-2019-0882, CVE-2019-0885, CVE-2019-0889, CVE-2019-0890, CVE- 2019-0891, CVE-2019-0893, CVE-2019-0756, CVE-2019-0759, CVE-2019-0765, CVE- 2019-0767, CVE-2019-0772, CVE-2019-0774, CVE-2019-0775, CVE-2019-0782, CVE- 2019-0784, CVE-2019-0808, CVE-2019-0821.  Restart Required: Requires restart  Known Issues: See previous slide
  • 33. Copyright©2019Ivanti.Allrightsreserved MS19-05-MR7: Monthly Rollup for Win 7 and Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7, Server 2008 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB 4493453 (released April 25, 2019). This bulletin is based on KB 4499164.  Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking, Windows Kernel, Windows Server, and the Microsoft JET Database.  Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 24 + 8 (IE) Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slide
  • 34. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Windows 7 and Server 2008 R2  KB 4499164 – Windows 7 SP1 and Server 2008 R2 SP1 (Monthly Rollup)  [McAfee] Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update.  Workarounds:  McAfee Security(ENS) Threat Prevention 10.x  McAfee Host Intrusion Prevention (Host IPS) 8.0  McAfee VirusScan Enterprise (VSE) 8.8  Microsoft is working on a resolution.
  • 35. Copyright©2019Ivanti.Allrightsreserved MS19-05-SO7: Security-only Update for Win 7 and Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7 SP1, Server 2008 R2 SP1  Description: This bulletin is based on KB 4499175.  Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking, Windows Kernel, Windows Server, and the Microsoft JET Database.  Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 24 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: None reported
  • 36. Copyright©2019Ivanti.Allrightsreserved MS19-05-MR8: Monthly Rollup for Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012 and IE  Description: This security update includes improvements and fixes that were a part of update KB 4493462 (released April 25, 2019). This bulletin is based on KB 4499171.  Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking, Windows Kernel, Windows Server, and the Microsoft JET Database.  Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 24 + 8 (IE) Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slide
  • 37. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Server 2012  KB 4499171 – Windows Server 2012, Windows Embedded 8 Standard (Monthly Rollup)  KB 4499154 – Windows Server 2012, Windows Embedded 8 Standard (Security-only Update)  [PXE Start] Issue  [File Rename] Issue
  • 38. Copyright©2019Ivanti.Allrightsreserved MS19-05-SO8: Security-only Update for Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012  Description: This bulletin is based on KB 4499154.  Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking, Windows Kernel, Windows Server, and the Microsoft JET Database.  Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 24 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See previous slide
  • 39. Copyright©2019Ivanti.Allrightsreserved MS19-05-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB 4493443 (released April 25, 2019). This bulletin is based on KB 4499151.  Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking, Windows Kernel, Windows Server, and the Microsoft JET Database.  Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 24 + 8 (IE) Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slide
  • 40. Copyright©2019Ivanti.Allrightsreserved May Known Issues for Windows 8.1 and Server 2012 R2  KB 4499151 – Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)  KB 4499165 – Windows 8.1, Windows Server 2012 R2 (Security-only Update)  [PXE Start] Issue  [File Rename] Issue  [McAfee] Issue
  • 41. Copyright©2019Ivanti.Allrightsreserved MS19-05-SO81: Security-only Update for Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2  Description: This bulletin is based on KB 4499165.  Security updates to Windows App Platform and Frameworks, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Cryptography, Windows Wireless Networking, Windows Kernel, Windows Server, and the Microsoft JET Database.  Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).  Impact: Remote Code Execution, Elevation of Privilege, and Information Disclosure  Fixes 24 Vulnerabilities: CVE-2019-0863 is known exploited and publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See previous slide
  • 42. Copyright©2019Ivanti.Allrightsreserved MS19-05-OFF: Security Updates for Microsoft Office  Maximum Severity: Critical  Affected Products: Office 2010-2016, Office 2016 and 2019 for Mac, Word 2016  Description: This security update resolves vulnerabilities in several Microsoft Office applications. This bulletin references 5 KB articles plus release notes for MacOS.  Impact: Remote Code Execution  Fixes 4 Vulnerabilities: CVE-2019-0945, CVE-2019-0946, CVE-2019-0947, CVE- 2019-0953  Restart Required: Requires application restart  Known Issues: None reported
  • 43. Copyright©2019Ivanti.Allrightsreserved MS19-04-O365: Security Updates for Office 365 ProPlus  Maximum Severity: Critical  Affected Products: Office 365 ProPlus, Office 2019  Description: This month’s update resolved various bugs and performance issues in Microsoft Office 365 applications. Information on Office 365 ProPlus updates is available at https://docs.microsoft.com/en-us/officeupdates/release-notes-office365- proplus  Impact: Remote Code Execution  Fixes 3 Vulnerabilities: CVE-2019-0945, CVE-2019-0946, CVE-2019-0953  Restart Required: Requires application restart  Known Issues: None reported
  • 44. Copyright©2019Ivanti.Allrightsreserved MS19-05-SPT: Security Updates for SharePoint Server  Maximum Severity: Important  Affected Products: Microsoft Enterprise SharePoint Server 2010-2019  Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. This bulletin is based on 4 KB articles.  Impact: Remote Code Execution, Spoofing, Elevation of Privilege, and Information Disclosure  Fixes 8 Vulnerabilities: CVE-2019-0949, CVE-2019-0950 , CVE-2019-0951 , CVE- 2019-0952 , CVE-2019-0956 , CVE-2019-0957 , CVE-2019-0958 , CVE-2019-0963  Restart Required: Requires Restart  Known Issues: None reported
  • 45. Copyright©2019Ivanti.Allrightsreserved MS19-05-MRNET: Monthly Rollup for Microsoft .Net  Maximum Severity: Important  Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8  Description: This security update resolves denial of service vulnerabilities when .NET Framework improperly handles objects in heap memory, or when .NET Framework and .NET Core improperly process RegEx strings. This bulletin references 19 KB articles.  Impact: Denial of Service  Fixes 4 Vulnerabilities: CVE-2019-0820, CVE-2019-0864, CVE-2019-0980, and CVE-2019-0981  Restart Required: Does not require a system restart after you apply it unless files that are being updated are locked or are being used.
  • 46. Copyright©2019Ivanti.Allrightsreserved MS19-05-SONET: Security-only Update for Microsoft .Net  Maximum Severity: Important  Affected Products: Microsoft Windows .Net Framework 2.0 through 4.8  Description: This security update resolves denial of service vulnerabilities when .NET Framework improperly handles objects in heap memory, or when .NET Framework and .NET Core improperly process RegEx strings. This bulletin references 19 KB articles.  Impact: Denial of Service  Fixes 4 Vulnerabilities: CVE-2019-0820, CVE-2019-0864, CVE-2019-0980, and CVE-2019-0981  Restart Required: Does not require a system restart after you apply it unless files that are being updated are locked or are being used.
  • 47. Copyright©2019Ivanti.Allrightsreserved MS19-05-SQL: Security Updates for SQL Server  Maximum Severity: Important  Affected Products: Microsoft SQL Server 2017  Description: This security update fixes a potential leak of restricted data that is not protected correctly by the Object-Level Security (OLS) system in SQL Server Analysis Services. This bulletin is based on KBs 4494351 and 4494352.  Impact: Information Disclosure  Fixes 1 Vulnerability: CVE-2019-0819  Restart Required: Requires restart  Known Issues: None reported
  • 48. Copyright©2019Ivanti.Allrightsreserved  Maximum Severity: Medium  Affected Products: VMware Workstation Pro and Player 15.x  Description: This security update resolves a vulnerability which may allow attackers with normal user privileges to escalate their privileges to administrator on a windows host where Workstation is installed.  Impact: Elevation of Privilege  Fixes 1 Vulnerability: CVE-2019-1526  Restart Required: Requires Restart  Known Issues: None reported VMSA-2019-0007 Update for VMware Workstation
  • 49. Copyright©2019Ivanti.Allrightsreserved Between Patch Tuesday’s New Product Support: Tableau Prep, Tableau Prep Builder, Windows 10 1903, .Net 4.8 Runtime Security Updates: Adobe Air (1), Adobe Acrobat (3), Camtasia (3), Google Chrome (2), Citrix Receiver (1), DropBox (2), Evernote (2), Firefox (3), Firefox ESR (1), Foxit Reader (4), Foxit PhantomPDF (2), FileZilla (2), GOM Player (1), GoToMeeting (2), Java Runtime (1), Java Development Kit (1), LibreOffice (2), Microsoft (2), Node.JS (3), Opera (5), Oracle VirtualBox (2), Plex Media Server (2), PeaZip (2), RealTimes (1), Splunk Universal Forwarder (1), Tableau Desktop (4), Tableau Prep (2), Tableau Reader (1), Tomcat (3), TortoiseSVN (1), TeamViewer (1), WinSCP (1), WinRAR (1) Non-Security Updates: BlueJeans (1), Box Edit (1), CCleaner (1), Google Drive (1), GoodSync (2), GoTo Opener (1), Google Backup and Sync (1), Java Runtime (1), Java Development Kit (1), KeePass Pro (1), LogMeIn (1), Microsoft (45), NVivo (1), PowerBI Desktop (1), PDF-Xchange PRO (1), Plex Media Player (2), R for Windows (1), Royal TS (1), Skype (2), TortoiseHG (1), Zoom Client (1), Zoom Outlook Plugin (1)
  • 50. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information  Citrix Receiver 4.9.6001, LTSR Cumulative Update 6  CTXR-018, QCTXR496001  Fixes 1 Vulnerability: CVE-2019-11634  Camtasia 9.1.5  CAMTA-015, QCAMTASIA915  Fixes 6 Vulnerabilities: CVE-2018-14054, CVE-2018-14325, CVE-2018- 14326, CVE-2018-14379, CVE-2018-14403, CVE-2018-14446  Camtasia 2019.0.1  CAMTA-014, QCAMTASIA201901  Fixes 12 Vulnerabilities: CVE-2018-14054, CVE-2018-14325, CVE-2018- 14326, CVE-2018-14379, CVE-2018-14403, CVE-2018-14446, CVE-2018- 14054, CVE-2018-14325, CVE-2018-14326, CVE-2018-14379, CVE-2018- 14403, CVE-2018-14446
  • 51. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information (cont)  VirtualBox 5.2.28  OVB-021, QOVB5228  Fixes 12 Vulnerabilities: CVE-2019-2574, CVE-2019-2656, CVE-2019-2657, CVE-2019-2678, CVE-2019-2679, CVE-2019-2680, CVE-2019-2690, CVE- 2019-2696, CVE-2019-2703, CVE-2019-2721, CVE-2019-2722, CVE-2019- 2723  Google Chrome 74.0.3729.131  Chrome-251, QGC7403729131  Fixes 23 Vulnerabilities: CVE-2019-5824, CVE-2019-5827, CVE-2019-5805, CVE-2019-5806, CVE-2019-5807, CVE-2019-5808, CVE-2019-5809, CVE- 2019-5810, CVE-2019-5811, CVE-2019-5812, CVE-2019-5813, CVE-2019- 5814, CVE-2019-5815, CVE-2019-5816, CVE-2019-5817, CVE-2019-5818, CVE-2019-5819, CVE-2019-5820, CVE-2019-5821, CVE-2019-5822, CVE- 2019-5823, CVE-2019-5825, CVE-2019-5826
  • 52. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information (cont)  Foxit Reader Consumer 9.5.0.20723  FIC-006, QNFOXIT95020723  Fixes 8 Vulnerabilities CVE-2018-20309, CVE-2018-20310, CVE-2018-20311, CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315, CVE-2018-20316  Foxit Reader 9.5.0.20723  FI19-9502, QFI95020723  Fixes 8 Vulnerabilities CVE-2018-20309, CVE-2018-20310, CVE-2018-20311, CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315, CVE-2018-20316  Foxit PhantomPDF 9.5.0.20723  FIP-021, QFIP95020723  Fixes 7 Vulnerabilities: CVE-2018-20309, CVE-2018-20310, CVE-2018-20311, CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315, CVE-2018-20316
  • 53. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information (cont)  VirtualBox 6.0.6  OVB-020, QOVB6060  Fixes 19 Vulnerabilities CVE-2018-11784, CVE-2019-1559, CVE-2019-2574, CVE-2019-2656, CVE-2019-2657, CVE-2019-2678, CVE-2019-2679, CVE- 2019-2680, CVE-2019-2690, CVE-2019-2696, CVE-2019-2703, CVE-2019- 2721, CVE-2019-2722, CVE-2019-2723, CVE-2019-3822  Java Development Kit 8 Update 211  JDK8-211, QJDK8U211  Fixes 5 Vulnerabilities CVE-2019-2602, CVE-2019-2684, CVE-2019-2697, CVE-2019-2698, CVE-2019-2699  Java 8 Update 211  Java8-211, QJAVA8U211  Fixes 5 Vulnerabilities CVE-2019-2602, CVE-2019-2684, CVE-2019-2697, CVE-2019-2698, CVE-2019-2699
  • 54. Copyright©2019Ivanti.Allrightsreserved Third Party CVE Information (cont)  Apache Tomcat 7.0.9  TOMCAT-131, QTOMCAT7094  Fixes 1 Vulnerability CVE-2019-0324  Apache Tomcat 8.5.40  TOMCAT-132, QTOMCAT8540  Fixes 1 Vulnerability CVE-2019-0324  Apache Tomcat 9.0.19  TOMCAT-133, QTOMCAT9019  Fixes 1 Vulnerability CVE-2019-0324
  • 55. May 30 | 11am ET | Free Event WINDOWS 10 SUMMIT VIRTUAL EVENT

Editor's Notes

  1. Current versions are Classic 2015, Classic 2017, and DC Continuous.
  2. Note: Server 2008 limited to .NET 2.0 thru 4.6. Windows 7 and newer use 3.5.1 thru 4.7.2.
  3. Note: Server 2008 limited to .NET 2.0 thru 4.6. Windows 7 and newer use 3.5.1 thru 4.7.2.