{"id":4698,"date":"2015-10-26T16:32:49","date_gmt":"2015-10-26T16:32:49","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4698"},"modified":"2019-11-15T13:55:32","modified_gmt":"2019-11-15T11:55:32","slug":"critical-updates","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/critical-updates\/4698\/","title":{"rendered":"Critical roundup: important patches from major vendors"},"content":{"rendered":"<p>Since mid-October, several major software vendors have released a number of security announcements and updates, most of them serious or outward critical. Let\u2019s take a look at them, as most of the updated products are firmly nested in business networks.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Critical roundup: important patches from major vendors #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FsFm1&amp;text=Critical+roundup%3A+important+patches+from+major+vendors+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Microsoft<\/strong><\/p>\n<p>Microsoft released six security bulletins on October 13, of which three were marked \u201ccritical\u201d. But, as Threatpost wrote, the real news was the deprecation of the outdated RC4 encryption algorithm in Windows 10.<\/p>\n<p>Windows 10 is a new system and, as usual, it\u2019s being fine-tuned \u2013 the process will take some extra time, most likely. Moving away from RC4 is, however, a very timely move.<\/p>\n<p>RC4 is a stream cipher known for its simplicity and speed. Unfortunately it was found vulnerable, so the industry gradually moved away from it. Microsoft has previously deprecated it in .NET, and now in Windows 10, too.<\/p>\n<p>The advisory also updated the default transport encryption in Windows to TLS 1.2.<\/p>\n<p>As for critical updates, they included the \u201cubiquitous\u201d Internet Explorer rollup and patches for remote code execution vulnerabilities in the VBScript and Jscript engines in Windows. For details please <a href=\"https:\/\/threatpost.com\/microsoft-releases-six-bulletins-continues-rc4-deprecation\/115017\/\" target=\"_blank\" rel=\"noopener nofollow\">visit Threatpost<\/a>.<\/p>\n<p><strong>Apple<\/strong><\/p>\n<p>Apple has also patched a batch of vulnerabilities in its software, including Keynote, Pages, Numbers, and iWork.<\/p>\n<p>The most serious flaw allowed an attacker to execute code on a compromised OS X computer running Yosemite 10.10.4 or later, or iOS 8.4 or later on mobile devices.<\/p>\n<p>Input validation and memory corruption errors in the aforementioned software also allowed attackers to run an arbitrary code or steal data. Detailed information is available <a href=\"https:\/\/threatpost.com\/apple-patches-productivity-software-mozilla-updates-firefox-with-security-fix\/115081\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>Adobe<\/strong><\/p>\n<p>Adobe released an urgent, emergency, red alert patch for a Flash zero day vulnerability a week earlier than the company had originally planned.<\/p>\n<p>The zeroday known as <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7645\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2015-7645<\/a> was exploited, albeit in a limited fashion, in the wild.<\/p>\n<p>\u201cThe flaw, a type confusion vulnerability, has been tied to attacks carried out by a Russian-speaking APT group operating under the guise of Pawn Storm, or APT 28. Type confusion vulnerabilities occur when code doesn\u2019t verify the type of object that\u2019s passed to it, and uses it without type-checking\u201d, Threatpost wrote.<\/p>\n<p>CVE-2015-7645 exploits have been used in spearphishing emails.<\/p>\n<p>Adobe\u2019s patch also addressed two other type confusion vulnerabilities: CVE-2015-7647 and CVE-2015-7648. Details are available <a href=\"https:\/\/threatpost.com\/emergency-adobe-flash-zero-day-patch-arrives-ahead-of-schedule\/115073\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>Oracle<\/strong><\/p>\n<p>Oracle is probably October\u2019s number one fix regarding the amount of patched flaws: 154 vulnerabilities in 54 different products were fixed last week, as part of its Critical Patch Update.<\/p>\n<p>84 patches addressed vulnerabilities that Oracle claimed might be remotely exploitable without authentication.<\/p>\n<p>24 of the vulnerabilities were patched in Java SE, of which seven were marked as high severity. Oracle warned if the bugs were exploited under the right conditions it could result in a full compromise of the targeted system.<\/p>\n<p>There are also severe bugs in Oracle Fusion Middleware and Oracle Database, as well as Siebel, Pillar Axiom, Applications for Work and Asset Management. Many are \u201cdefinitely\u201d remotely exploitale without authentication, although actual exploits hasn\u2019t been spotted in the wild by Oracle at the time of the patches release.<\/p>\n<p>Details are available <a href=\"https:\/\/threatpost.com\/oracle-quarterly-security-update-patches-154-vulnerabilities\/115120\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>We assume, all of these patches had been installed? #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FsFm1&amp;text=We+assume%2C+all+of+these+patches+had+been+installed%3F+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>WordPress<\/strong><\/p>\n<p>Akismet, an antispam plugin critical for WordPress, has been updated in order to fix a serious cross-site scripting error.<\/p>\n<p>It was exploitable via the comment section on sites running versions of the Akismet plugin after 2.5.0 and allowed for injection of malicious scripts into the comment section of the admin panel. This could in theory lead to a full site compromise, although Akismet was technically already blocking attempts during the comment-check API call.<\/p>\n<p>No exploits in the wild so far, and WordPress plugin developers have pushed an automatic update for any sites running the vulnerable versions to auto update plugins last\u00a0week.<\/p>\n<p>Earlier in October, yet another XSS error in WordPress was\u00a0<a href=\"https:\/\/threatpost.com\/wordpress-fixes-critical-stored-xss-error-in-akismet\/115054\/\" target=\"_blank\" rel=\"noopener nofollow\">fixed<\/a>.<\/p>\n<p><strong>Joomla<\/strong><\/p>\n<p>Another content management system popular among businesses has been updated t<a href=\"https:\/\/threatpost.com\/joomla-update-patches-critical-sql-injection-vulnerability\/115142\/\" target=\"_blank\" rel=\"noopener nofollow\">o fix a nasty bug<\/a>. Critical, in fact, as this SQL injection flaw could have let attackers gain access to data in the backend of any site running on the platform.<\/p>\n<p>The bug sat in the core module of Joomla, thus any site that runs it, including various e-commerce sites, could be vulnerable. Attackers could get administrator privileges \u2013 and it\u2019s pretty clear what that could mean for the website.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>There is no perfect, bugless software. In fact, bugs of various severity exist everywhere, so fixing them in numbers and on a regular basis is actually a good thing for the users, even though we all would prefer there were less bugs around.<\/p>\n<p>Some software, however, should be under continuous scrutiny, in the \u201cpresumption of guilt\u201d mode \u2013 namely Flash and Java. These are especially buggy, unfortunately, and due to their extreme popularity, and\u00a0always in the reticles of cybercriminals.<\/p>\n<p>Flash might be headed off\u00a0into the sunset, but for now it\u2019s still here, so it should be watched closely.<\/p>\n<p>Our readers have already installed all of these critical updates, yes?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since mid-October, several major software vendors have released a number of security announcements and updates, most of them serious or outward critical.<\/p>\n","protected":false},"author":209,"featured_media":15370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[389,14,2352,958,266,2353,38,1204,398,121,2354,304],"class_list":{"0":"post-4698","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-adobe","10":"tag-apple","11":"tag-critical","12":"tag-flash","13":"tag-java","14":"tag-joomla","15":"tag-microsoft","16":"tag-oracle","17":"tag-patches","18":"tag-updates","19":"tag-vendors","20":"tag-wordpress"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/critical-updates\/4698\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/critical-updates\/4698\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/critical-updates\/4698\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/adobe\/","name":"Adobe"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=4698"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4698\/revisions"}],"predecessor-version":[{"id":24496,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4698\/revisions\/24496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15370"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=4698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=4698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=4698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}