/Tripwire Patch Priority Index for September 2019 – Security Boulevard (via WindowsKernel.com)
Protecting Against SWAPGS Attack with Bitdefender Hypervisor Introspection - Security Boulevard

Tripwire Patch Priority Index for September 2019 – Security Boulevard (via WindowsKernel.com)


Tripwire’s September 2019 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft and Adobe.

Exploit Framework Alert

A Metasploit Exploit module that targets Windows Remote Desktop Services has been recently released. This exploit module targets CVE-2019-0708 for the so-called “BlueKeep” vulnerability. This vulnerability impacts Windows Server 2008, Windows 7, and Windows Server 2008 R2. Microsoft provided patches for this vulnerability during the May 2019 Patch Tuesday release. If you have not applied the May 2019 patches, you should act fast to patch your systems in order to be protected from this vulnerability.

Patch Priority List

First, on the list for September are 3 Windows vulnerabilities that have been publicly disclosed. These 3 vulnerabilities are identified by CVE-2019-1235, CVE-2019-1253, CVE-2019-1294 and affect Windows OS, Windows Text Service Framework (TSF), and Windows Secure Boot.

Next on the list are patches for Adobe Flash Player (APSB19-46). These patches address Use-After-Free and Same Origin Method Execution vulnerabilities. Adobe states these vulnerabilities are critical and affect Adobe Flash Player Desktop Runtime, Adobe Flash Player for Google Chrome, and Adobe Flash Player for Microsoft Edge and Internet Explorer 11.

Up next are patches for Microsoft Browser, Scripting Engine, and VBScript. These patches resolve 10 vulnerabilities, including fixes for Memory Corruption, Information Disclosure, Remote Code Execution, and Security Feature Bypass vulnerabilities.

Next on the list are patches for Microsoft Office, Excel, Lync 2013, and .NET. These patches resolve 5 vulnerabilities, including fixes for Remove Code Execution, Information Disclosure, Elevation of Privilege, and Security Feature Bypass vulnerabilities.

Up next are patches for Microsoft Windows. These patches address numerous vulnerabilities across Windows Kernel, GDI, Microsoft Graphics, Remote Desktop client, ALPC, Common Log File System Driver, Hyper-V, DirectWrite, DirectX, Winlogon, SMB client, and Jet Database Engine. These patches fix 46 vulnerabilities, including Elevation of Privilege, Information Disclosure, Cross-site Scripting, (Read more…)

This is a syndicated post. Read the original post at Source link .