Tuesday, June 11, 2019

Microsoft Security Updates for June, 2019



The June security updates have been released and consist of 88 CVEs and 4 advisories. Of these 88 CVEs, 21 are rated Critical and 66 are rated Important and 1 Moderate in severity. Four are listed as publicly known and none are listed as under active attack at the time of release.

The updates address Remote Code Execution, Information Disclosure, Spoofing, Elevation of Privilege, Denial of Service,  Security Feature Bypass, and Tampering.  They apply to the following:  Adobe Flash Player, Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office and Microsoft Office Services and Web Apps, ChakraCore, Skype for Business and Microsoft Lync, Microsoft Exchange Server and Azure.


Known Issues:  See the Known Issues and accompanying work-around in the KB Articles:

KB Article Applies To
4493730 Windows Server 2008 Service Pack 2 Servicing stack update
4503027 Exchange Server 2019, Exchange Server 2016
4503028 Exchange Server 2010 Service Pack 3, Exchange Server 2013
4503263 Windows Server 2012 (Security-only update)
4503267 Windows 10, version 1607, Windows Server 2016
4503276 Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)
4503279 Windows 10, version 1703
4503284 Windows 10, version 1709
4503285 Windows Server 2012 (Monthly Rollup)
4503286 Windows 10, version 1803
4503290 Windows 8.1 Windows Server 2012 R2 (Security-only update)
4503291 Windows 10
4503292 Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Security-only update)
4503293 Windows 10, version 1903
4503327 Windows 10, version 1809, Windows Server 2019

Recommended Reading:  

See Dustin Childs review and analysis in Zero Day Initiative — The June 2019 Security Update Review.

For more information about the updates released today, see https://portal.msrc.microsoft.com/en-us/security-guidance/summary.  Updates can be sorted by OS from the search box. Information about the update for Windows 10 is available at Windows 10 Update history.

Additional Update Notes:

  • Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 and Windows 10, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates as identified above.
  • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.  Note:  Users who are paranoid about the remote possibility of a FP can opt to run this tool from a Command Prompt, appending a   /N   parameter [for "detect only" mode].
  • Servicing Stack Updates -- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update. 
  • Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are also available via the Microsoft Update Catalog.
  • For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
  • Windows Update History:

References


Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...





1 comment:

nathan_usa said...

https://securitygarden.blogspot.com/2019/06/adobe-flash-player-and-air-critical.html

The article at above link appears to be mistaken. Yes Adobe Flash Player 32.0.0.207 is now available but AIR is still version 32.0.0.125 at https://get.adobe.com/air/. This is not a newer version.

Your story misled me to invest time in doing prep work to deploy a new version of AIR to an enterprise only to find out it was the same version we already have.