Tuesday, April 10, 2018

Microsoft Security Updates, April 2018



The April security release consists of 67 CVEs, of which 24 are listed as Critical, 42 are rated Important and 1 is rated Moderate in severity. One is listed as being publicly known and none are listed as being under active attack.  

The updates address Remote Code Execution, Information Disclosure, Denial of Service and Security Feature Bypass.  The release consists of security updates for the following software:
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • Adobe Flash Player
  • Microsoft Malware Protection Engine
  • Microsoft Visual Studio
  • Microsoft Azure IoT SDK

Known Issues: 4093112 4093118 4093108

Note:  KB4100375 (OS Build 17133.73) has been released to Windows Insiders running Build 17133 in the Fast, Slow, and Release Preview rings. This update includes the following quality improvements (no new OS features):
  • Addresses a PDF security issue in Microsoft Edge.
  • Addresses an issue that, in some instances, prevents Internet Explorer from identifying custom controls.
  • Security updates to Internet Explorer, Microsoft Edge, Microsoft scripting engine, Windows kernel, Microsoft graphics component, Windows Server, Windows cryptography, and Windows datacenter networking.

As usual, Dustin Childs has provided a closer look at some of the patches for this month.in this month's Zero Day Initiative — The April 2018 Security Update Review.

More:  For more information about the updates released today, see https://portal.msrc.microsoft.com/en-us/security-guidance/summary.  Updates can be sorted by OS from the search box. Information about the update for Windows 10 is available at Windows 10 Update history.

Additional Update Notes

  • Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 and Windows 10, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates as identified above.
  • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.  Note:  Users who are paranoid about the remote possibility of a FP can opt to run this tool from a Command Prompt, appending a   /N   parameter [for "detect only" mode].
  • Windows 10 -- A summary of important product developments included in each update, with links to more details is available at Windows 10 Update History. The page will be regularly refreshed, as new updates are released.

References


Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...





No comments: