Tuesday, July 10, 2018

Microsoft Security Bulletin Release for July, 2018

The July security release consists of 53 CVEs, of which 18 are listed as Critical and 33 are rated Important, 1 is rated as Moderate and 1 is rated as Low in severity.

The updates address Remote Code Execution, Security Feature Bypass, Elevation of Privilege, Denial of Service, Tampering, Information Disclosure, and Spoofing with known issues for 4338825 and 4338818.

The release consists of security updates for the following software:  Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office and Microsoft Office, Services and Web Apps, ChakraCore, Adobe Flash Player, .NET Framework, ASP.NET, Microsoft Research JavaScript Cryptography Library, Skype for Business and Microsoft Lync, Visual Studio, Microsoft Wireless Display Adapter V2 Software, PowerShell Editor Services, PowerShell Extension for Visual Studio Code, and Web Customizations for Active Directory Federation Services.

Recommended Reading: 

ven though on vacation, Dustin Childs dedicated time to provide a
closer look at some of the patches for this month in Zero Day Initiative — The July 2018 Security Update Review.  Although he indicated "
None of the bugs patched this month are listed as publicly known or under active attack at the time of release." his evaluation is definitely appreciated.

More:  For more information about the updates released today, see https://portal.msrc.microsoft.com/en-us/security-guidance/summary.  Updates can be sorted by OS from the search box. Information about the update for Windows 10 is available at Windows 10 Update history.

Additional Update Notes

  • Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 and Windows 10, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates as identified above.
  • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.  Note:  Users who are paranoid about the remote possibility of a FP can opt to run this tool from a Command Prompt, appending a   /N   parameter [for "detect only" mode].
  • Windows 10 -- A summary of important product developments included in each update, with links to more details is available at Windows 10 Update History. The page will be regularly refreshed, as new updates are released.


Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...

No comments: