Thursday, October 27, 2016

Microsoft "C Week" Monthly Quality Rollup Updates Released


As described in More on Windows 7 and Windows 8.1 servicing changes – Windows for IT Pros, the "C Week" updates have been released.

Although C week updates are described as new non-security fixes, please note the out-of-band critical Flash Player update released by Adobe is included with the release.


October Quality Rollup Details:

References


    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...





    Wednesday, October 26, 2016

    Adobe Flash Player Out-of-Band Critical Security Update

    Adobe Flashplayer

    Adobe has released Version 23.0.0.205 of Adobe Flash Player for Microsoft Windows, Macintosh and Chrome as well as Version 11.2.202.643 for Linux.

    The update addresses an exploit for CVE-2016-7855 exists in the wild, and is being used in limited, targeted attacks against users running Windows versions 7, 8.1 and 10.

    Release date: October 26, 2016
    Vulnerability identifier: APSB16-36
    CVE number: CVE-2016-7855
    Platform: Windows, Macintosh, Linux and Chrome OS

    Warning:  Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras. 

      Notes:
      • If you use the Adobe Flash Player Download Center, be careful to uncheck any optional downloads that you do not want.  Any pre-checked option is not needed for the Flash Player update.
      • Uncheck any toolbar offered with Adobe products if not wanted.
      • If you use alternate browsers, it is necessary to install the update for both Internet Explorer as well as the update for alternate browsers.
      • The separate 32-bit and 64-bit uninstallers have been replaced with a single uninstaller.

      Verify Installation

      To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

      Do this for each browser installed on your computer.

      To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x.

      References




      Remember - "A day without laughter is a day wasted."
      May the wind sing to you and the sun rise in your heart...








      Thursday, October 20, 2016

      Firefox Version 49.0.2 Released with Security Updates


      FirefoxMozilla sent Firefox Version 49.0.2 to the release channel today.  The update includes two (2) high security updates and a number of changes and fixes.

      The security fixes are for CVE-2016-5287 and CVE-2016-5287.  Detailed information about the security updates is available at Security vulnerabilities fixed in Firefox 49.0.2 — Mozilla.

      The next scheduled release is November 8, 2016.

      Firefox ESR will continue to ship point releases on the same day that Firefox ships and can be downloaded from here. The ESR version remains at 45.4.0.

      New

      • Asynchronous rendering of the Flash plugins is now enabled by default. This should improve performance and reduce crashes for sites that use the Flash plugin. (Bug 1307108)

        Fixed

        • Change D3D9 default fallback preference to prevent graphical artifacts (Bug 1306465)
        • Network issue prevents some users from seeing the Firefox UI on startup (Bug 1305436)
        • Web compatibility issue with Array.prototype.values (Bug 1299593)
        • Various security fixes
        • Web compatibility issue with file uploads (Bug 1306472)

        Changed

          Update

          To get the update now, select "Help" from the Firefox menu at the upper left of the browser window, then pick "About Firefox."  Mac users need to select "About Firefox" from the Firefox menu. If you do not use the English language version, Fully Localized Versions are available for download.

            References




            Remember - "A day without laughter is a day wasted."
            May the wind sing to you and the sun rise in your heart...




            Tuesday, October 18, 2016

            Critical Oracle Java Security Update Plus Important FTC Notice

            java

            Oracle released the scheduled critical security updates for its Java SE Runtime Environment software and, once again, released two versions.  Java SE 8u111 includes important security fixes and Java SE 8u112 is a patch-set update, including all of 8u111 plus the additional features described in the release notes.

            The update contains (seven) 7 new critical security fixes for Oracle Java SE.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

            Important FTC Notice

            In addition to the critical security updates, an important notice has been provided by Oracle (available here) regarding an FTC lawsuit against Oracle due to the old practice of not removing vulnerable versions of Java when updates were released. As explained in Java, The Never-Ending Saga, it wasn't until JRE SE 6u11, that the update mechanism for Java was finally changed to remove the previous install. However, it did not remove installations prior to update 10.  As a result, computers with earlier versions of Java SE were/are still vulnerable to the security risks corrected in later versions.

            In the event you still need Java installed on your computer, step-by-step instructions are available for uninstalling Java covering operating systems from Windows ME through Windows 10.  See Instructions for Uninstalling Java.

            Update

            If Java is still installed on your computer, it is recommended that this update be applied as soon as possible due to the threat posed by a successful attack.

            Download Information

            Download link:  Java SE 8u111

            Java SE 8u112 can be found here.  Select the appropriate version for your operating system.

            Verify your version:  http://www.java.com/en/download/testjava.jsp

            Notes:
            • Minimally, UNcheck any pre-checked toolbar and/or software options presented with the update. They are not part of the software update and are completely optional.  Preferably, see the instructions below on how to handle "Unwanted Extras". 
            • Starting with Java SE 7 Update 21 in April 2013, all Java Applets and Web Start Applications should be signed with a trusted certificate.  It is not recommended to run untrusted/unsigned Certificates.  See How to protect your computer against dangerous Java Applets

            Critical Patch Updates

            For Oracle Java SE Critical Patch Updates, the next scheduled dates are as follows:
            • 17 January 2017
            • 18 April 2017
            • 18 July 2017 
            • 17 October 2017

            Unwanted "Extras"

            Although most people do not need Java on their computer, there are some programs and games that require Java.  In the event you need to continue using Java, How-to Geek discovered a little-known and  unpublicized option in the Java Control Panel to suppress the offers for the pre-checked unwanted extras that Oracle has long included with the updates.  Although the Ask Toolbar has been removed, tha does not preclude the pre-checked option for some other unnecessary add-on.

            Do the following to suppress the sponsor offers:
            1. Launch the Windows Start menu
            2. Click on Programs
            3. Find the Java program listing
            4. Click Configure Java to launch the Java Control Panel
            5. Click the Advanced tab and go to the "Miscellaneous" section at the bottom.
            6. Check the box by the “Suppress sponsor offers when installing or updating Java” option and click OK.
            Java suppress sponsor offers

            Windows XP

            For information on Java support for Windows XP, organizations and individuals who must continue using Windows XP and have Java installed are referred to the Oracle blog post, The future of Java on Windows XP (Henrik on Java).

            Java Security Recommendations

            For those people who have desktop applications that require Java and cannot uninstall it, Java can now be disabled in Internet Explorer.  See Microsoft Fix it to Disable Java in Internet Explorer.

            1)  In the Java Control Panel, at minimum, set the security to high.
            2)  Keep Java disabled until needed.  Uncheck the box "Enable Java content in the browser" in the Java Control Panel.

            Java Security
            Instructions on removing older (and less secure) versions of Java can be found at http://java.com/en/download/faq/remove_olderversions.xml

            References




            Remember - "A day without laughter is a day wasted."
            May the wind sing to you and the sun rise in your heart...




            Tuesday, October 11, 2016

            Microsoft Security Bulletin Release for October, 2016


            The updates this month begin the new "patch rollup" for Windows 7 and 8.1 as well as Server 2008 and 2012.

            Simply stated, on the second Tuesday of each month, "Patch Tuesday, rather than individual KB articles, there will be one  security monthly rollup.  The update includes new security fixes along with the security fixes from previous monthly rollups, available from Windows Update.

            As explained in How to prepare for the Windows 7/8.1 ‘patchocalypse’,

            "The most important note for most Windows Update users: You don’t have to change anything. The Automatic Update settings (that is, Automatically download and install, Download but let me choose when to install, Notify but don’t download, or Never check) work as they always have. The “Give me recommended updates the same way I receive important updates” check box works as it has before -- if Microsoft tags an update as “Recommended” and this box is checked, the update appears checked (ready to install) in the Windows Update list. If that box is unchecked, the update appears as unchecked in the Optional category." 
            For complete, albeit confusing, details, the changes are described in More on Windows 7 and Windows 8.1 servicing changes – Windows for IT Pros.  

            October Security Update Details:

            Microsoft released ten (10) bulletins.  Five (5) bulletins are identified as Critical, four (4) as Important and one (1) rated Moderate in severity

            The updates address vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Microsoft Office Services and Web Apps, Microsoft .NET Framework, Skype for Business, Microsoft Lync as well as Adobe Flash Player for Windows 8.1 and above. 

            Addressed in the updates are Remote Code Execution, Elevation of Privilege and Information Disclosure.

            Information about the update for Windows 10 is available at Windows 10 update history.

            Critical:
            • MS16-118 -- Cumulative Security Update for Internet Explorer (392887)
            • MS16-119 -- Cumulative Security Update for Microsoft Edge (3192890)
            • MS16-120 -- Security Update for Microsoft Graphics Component (3192884)
            • MS16-122 -- Security Update for Microsoft Video Control (3195360)
            • MS16-127 -- Security Update for Adobe Flash Player (3194343)
            Important:
            • MS16-121 -- Security Update for Microsoft Office (3194063)
            • MS16-123 -- Security Update for Windows Kernel-Mode Drivers (3192892)
            • MS16-124 -- Security Update for Windows Registry (3193227)
            • MS16-125 -- Security Update for Diagnostics Hub (3193229)
            Moderate:
            • MS16-126 -- Security Update for Microsoft Internet Messaging API (3196067)

              Additional Update Notes

              • Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates.
              • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center. 
              • Windows 8.x and Windows 10 -- Non-security new features and improvements for Windows 8.1 and Windows 10 are included with the updates.
              • Windows 10 -- A summary of important product developments included in each update, with links to more details is available at Windows 10 Update History. The page will be regularly refreshed, as new updates are released.

              References


                Remember - "A day without laughter is a day wasted."
                May the wind sing to you and the sun rise in your heart...





                Adobe Flash Player and AIR Security Update

                Adobe Flashplayer

                Adobe has released Version 23.0.0.185 of Adobe Flash Player for Microsoft Windows, Macintosh and Chrome as well as Version 11.2.202.637 for Linux.  The Extended Support Release for Windows and Macintosh was updated to Version 18.0.0.382. 

                The updates are to address important bug fixes and critical vulnerabilities that could potentially allow an attacker to take control of the affected system.

                Release date: October 11, 2016
                Vulnerability identifier: APSB16-32
                CVE number: CVE-2016-4273, CVE-2016-4286, CVE-2016-6981, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990, CVE-2016-6992
                Platform: Windows, Macintosh, Linux and Chrome OS

                Warning:  Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras. 

                  Notes:
                  • If you use the Adobe Flash Player Download Center, be careful to uncheck any optional downloads that you do not want.  Any pre-checked option is not needed for the Flash Player update.
                  • Uncheck any toolbar offered with Adobe products if not wanted.
                  • If you use alternate browsers, it is necessary to install the update for both Internet Explorer as well as the update for alternate browsers.
                  • The separate 32-bit and 64-bit uninstallers have been replaced with a single uninstaller.

                  Verify Installation

                  To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

                  Do this for each browser installed on your computer.

                  To verify the version of Adobe Flash Player for Android, go to Settings > Applications > Manage Applications > Adobe Flash Player x.x.

                  References




                  Remember - "A day without laughter is a day wasted."
                  May the wind sing to you and the sun rise in your heart...








                  Adobe Reader and Acrobat Critical Security Updates

                  Adobe
                  Adobe has security updates for Adobe Reader and Acrobat XI for Windows and Macintosh. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.


                  Release date: October 11, 2016
                  Vulnerability identifier: APSB16-33
                  CVE Numbers: CVE-2016-1089, CVE-2016-1091, CVE-2016-6939, CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6947, CVE-2016-6948, CVE-2016-6949, CVE-2016-6950, CVE-2016-6951, CVE-2016-6952, CVE-2016-6953, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6957, CVE-2016-6958, CVE-2016-6959, CVE-2016-6960, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6966, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6970, CVE-2016-6971, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6979, CVE-2016-6988, CVE-2016-6993, CVE-2016-6994, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-6999, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, CVE-2016-7019
                  Platform: Windows and Macintosh

                  Update or Complete Download

                  Update checks can be manually activated by choosing Help > Check for Updates.
                    Note: UNcheck any pre-checked additional options presented with the update. They are not part of the software update and are completely optional.

                    End of Support:  Adobe Acrobat X and Adobe Reader 

                    Adobe Acrobat X and Adobe Reader X are no longer supported (see here). Adobe recommends Adobe Acrobat DC (FAQ) and Adobe Acrobat Reader DC (FAQ).  However, another alternate is available to replace Adobe Reader.  Personally, I like Sumatra PDF.  It isn't a target and doesn't include unwanted extras with the install or updates.  

                    Enable "Protected View"

                    Due to frequent vulnerabilities, it is recommended that Windows users of Adobe Reader and Acrobat ensure that Protected View is enabled.  Neither the Protected Mode or Protected View option is available for Macintosh users.

                    To enable this setting, do the following:
                    • Click Edit > Preferences > Security (Enhanced) menu. 
                    • Change the "Off" setting to "All Files".
                    • Ensure the "Enable Enhanced Security" box is checked. 

                    Adobe Protected View
                    Image via Sophos Naked Security Blog

                    References



                    Home
                    Remember - "A day without laughter is a day wasted."
                    May the wind sing to you and the sun rise in your heart...