Tuesday, December 31, 2019

Happy New Year!


Home
Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...

Tuesday, December 10, 2019

Microsoft December 2019 Security Updates Released



The Microsoft December security updates have been released and consist of 36 CVEs. Of these 36 CVEs, 7 are rated Critical, 28 are rated Important and 1 moderate in severity. None of the patches released this month are listed as publicly known, but one is listed as being actively exploited at the time of release.

The updates apply to the following:  Microsoft Windows, Internet Explorer, Microsoft Office and Microsoft Office Services and Web Apps, SQL Server, Visual Studio and Skype for Business.

Reminder:  After 1/14/2020 Windows 7 and Windows Server 2008 R2 will be out of extended support and no longer getting security updates.

Known Issues:  The following KBs contain information about known issues with the security updates. For a complete list of security update KBs, please see 20191210.

KB Article Applies To
4484190 Excel 2013
4484179 Excel 2016
4461590 PowerPoint 2013
4484190 PowerPoint 2016
4484190 Word 2013
4484190 Word 2016
4530681 Windows 10
4530684 Windows 10, version 1803, Windows Server version 1803, Windows 10, version 1809, Windows Server version 1809
4530689 Windows 10, version 1607, Windows Server 2016
4530691 Windows Server 2012 (Monthly Rollup)
4530698 Windows Server 2012 (Security-only update)
4530702 Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)
4530714 Windows 10, version 1709
4530715 Windows 10, version 1809, Windows Server 2019
4530717 Windows 10, version 1803, Windows Server version 1803
4530730 Windows 8.1, Windows Server 2012 R2 (Security-only update)
4530734 Windows 7 SP1, Windows Server 2008 R2 SP1 (Monthly Rollup)

Recommended Reading:  

See Dustin Childs review and analysis in Zero Day Initiative — The December 2019 Security Update Review.

For more information about the updates released today, see https://portal.msrc.microsoft.com/en-us/security-guidance/summary.  Updates can be sorted by OS from the search box. Information about the update for Windows 10 is available at Windows 10 Update history.

Additional Update Notes:

  • Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 and Windows 10, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates as identified above.
  • MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.  Note:  Users who are paranoid about the remote possibility of a FP can opt to run this tool from a Command Prompt, appending a   /N   parameter [for "detect only" mode].
  • Servicing Stack Updates -- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update. Learn more about SSU's in Servicing Stack Updates (SSU)
  • Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are also available via the Microsoft Update Catalog.
  • For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
  • Windows Update History:

References


Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...





Adobe FLash Player Update Released


Adobe Flashplayer

Adobe released Version 32.0.0.303 of Adobe Flash Player for Windows, macOS, Linux and Chrome OS. The update contains assorted functional fixes.

Release date:  December 10, 2019
Vulnerability identifier: None
Platform:  Windows, Macintosh, Linux and Chrome OS

Update:

*Important Note:  Downloading the update from the Adobe Flash Player Download Center link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive.  If you use the download center, uncheck any unnecessary extras that you do not want.  They are not needed for the Flash Player update.

    Verify Installation

    To verify the Adobe Flash Player version number installed on your computer, go to the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe Flash Player" from the menu. 

    Do this for each browser installed on your computer.

    To verify the version of Adobe Flash Player for Android, go to Settings/Applications/Manage Applications/Adobe Flash Player x.x.

    References



    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...









    Adobe Acrobat DC and Acrobat Reader DC Security Updates Released

    Adobe
    Adobe has released security updates for Adobe Acrobat and Reader addressing critical security updates.  The update additionally includes bug fixes. 

    Release date:  December 10, 2019
    Vulnerability identifier: APSB19-55
    Platform: Windows and MacOS

    Update or Complete Download

    Reader DC and Acrobat DC were updated to version 2019.02.2.20058. 

     Update checks can be manually activated by choosing Help/Check for Updates. 
    Note: UNcheck any pre-checked additional options presented with the update. They are not part of the software update and are completely optional.

    References





    Home
    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...



    Pale Moon Version 28.8.0 Released with Security Updates


    Pale Moon
    Pale Moon has been updated to version 28.8.0 with security updates*.  This is a major development release that includes many improvements as well as some landmark features added/enabled.  In addition, many libraries have been updated for added stability and performance.

    *A fix identified as "DiD" ("Defense-in-Depth") means that it is a fix that does not apply to a (potentially) actively exploitable vulnerability in Pale Moon, but prevents future vulnerabilities caused by the same code, e.g. when surrounding code changes, exposing the problem, or when new attack vectors are discovered. 

    From the Release Notes:


    New features:
    • Added support for modern Solaris operating systems like Illumos (thanks Athenian200!).
    • Implemented position:sticky for table parts - You can now use CSS to e.g. stick table headers so they don't scroll off the screen!
    • Enabled basic implementation of module type scripting. While not fully spec compliant (yet), this will fix the few web compatibility issues with sites that rely on this feature without fallback (e.g. the Chromium bugtracker).
    • Implemented Promise.prototype.finally() (ES2018).
    • Implemented Regular Expression lookbehind (ES2018).
    • Implemented Regular Expression /s flag (dotAll support) (ES2018).
    • Implemented String.prototype.matchAll (regex) (ES2020).
    • Added Ekoru to the list of default search engines. This is a Bing-backed search engine that donates the majority of its revenue to various charities that support the planet and animals. An environment-supporting alternative to Ecosia if you don't want to support Google in the process.
    Changes/fixes:
    • Changed the way tables are rendered to fix a number of spec compliance issues and allow relative positioning of table parts.
    • Now building against the Windows 10 SDK 10.0.17763.132 for increased compatibility with Windows 10 and improved Spectre mitigation.
    • Removed the unused DiskSpaceWatcher component.
    • Updated cairo code.
    • Updated SQLite to 3.30.1.
    • Updated the Brotli library to 1.0.7.
    • Updated the woff2 library to 1.0.2.
    • Updated the OpenType Sanitizer to 8.0.0.
    • Updated the Javascript math library for precision and performance fixes.
    • Updated the embedded Emoji font to Mozilla's COLR-mapped twemoji 0.5.0 (Twemoji 12.1.3), to support Emoji 12.
    • Improved CSS grid rendering.
    • Changed packaging for archives to use 7z/xz instead of zip/bz2.
    • Made the second argument of (DOM/CSS) insertRule() optional for (Chrome) web compatibility.
    • Removed the non-standard object.prototype.watch()/unwatch() functions. Please note that this may affect some extensions; those will need to be updated to no longer use these non-standard functions.
    • Fixed the status bar module to work around an issue with relying on watch()/unwatch().
    • Fixed a build failure in the libcubeb sndio module.
    • Fixed a small oversight in the release branch that would potentially still mark jnlp files as executable.
    • Fixed the certificate retrieval logic in the certificate exception dialog.
    • Fixed an issue with add-ons potentially getting confused during add-on updates due to cached scripts.
    • Fixed a crash due to unnecessary reparenting calls in layout.
    • Reinstated the mentioning of the number of accelerated/total windows in Troubleshooting Information, for completeness.
    • Moved the embedded font for Emoji from application to platform so all UXP applications can easily benefit from it (thanks Tobin!).
    • Cleaned up the jemalloc code: Removed dead/unused code, removed conditionals around "always on" code, and made the allocator VLA-free.
    • Fixed an oversight in the release branch still marking "jnlp" (Java Web Start) as executable.
    Security-related fixes:
    • Removed the silent fallback to insecure install locations on Windows.
      Pale Moon will no longer by default install into unprotected program locations (this was a regression in v28).
      If your operating system account does not have the necessary privileges, you need to manually select an accessible folder to install into. This is important to prevent malware from modifying installed programs in well-known but otherwise unprotected installation locations.
    • Added a preference for, and disabled, the confirmation prompt for URL authentication (prevents evil traps).
    • Disabled the use of HPKP by default due to the inherent risks involved with this feature. A preference was added to completely disable header processing, and using preloaded pins is effectively disabled. Please note that this is automatically disabled by default for everyone, regardless of your previous setting for this feature, and it is strongly recommended you keep this feature disabled. HPKP will eventually be removed (overall Internet concensus).
    • Fixed a potential issue when interacting with plugins. (DiD)
    • Fixed a potential crash scenario when reading PAC configuration. (DiD)
    • Fixed a potential issue with text selection painting. (DiD)
    • Fixed an issue with element references not being properly updated. (DiD)
    • Fixed an issue with incorrect saving of web pages as text. (DiD)
    • Fixed a potential issue with clipboard handling. (DiD)
    • Fixed a potential issue with attaching the debugger to web workers. (DiD)
    • Updated NSS to 3.41.4 to address CVE-2019-11756 and CVE-2019-11745.
    • Unified XUL Platform Mozilla Security Patch Summary: 2 fixed, 8 DiD, 16 not applicable.

    UpdateTo get the update now, select "Help" from the Pale Moon menu at the upper left of the browser window.  Click About Pale Moon and  Check for Updates.




    Remember - "A day without laughter is a day wasted."
    May the wind sing to you and the sun rise in your heart...



    Tuesday, December 03, 2019

    Mozilla Firefox Version 71.0 Released with Security Updates

    Firefox

    Mozilla sent Firefox Version 71.0 to the release channel today.  The update included thirteen (13) security updates of which six (6) are high and five (5) are rated moderate. 

    Also released was Firefox ESR Version 68.3.

    Note:  The following extensions have been removed from the Mozilla addon repository due to concerns that they were tracking a user's activity as they are browsed the web:  Avast Online Security, Avast SafePrice, AVG Online Security, and AVG SafePrice.  Additional information is available at Bleeping Computer.

    High


    Moderate

    New

      • Improvements to Lockwise, our integrated password manager:
        • Firefox now recognizes subdomains and will autofill domain logins from Lockwise
        • Integrated breach alerts from Firefox Monitor are now available to users with screen readers
      • More information about Enhanced Tracking Protection in action:
        • Notifications when Firefox blocks cryptominers
        • A running tally of blocked trackers in the protection panel accessed by clicking the address bar shield
      • Picture-in-picture video comes to Firefox for Windows: Select the blue icon from the right edge of a video to pop open a floating window so you can keep watching while working in other tabs. Learn how the feature works.
      • Native MP3 decoding on Windows, Linux, and macOS

      Changed

      Update:  To get the update now, select "Help" from the Firefox menu, then pick "About Firefox."  Mac users need to select "About Firefox" from the Firefox menu. If you do not use the English language version, Fully Localized Versions are available for download.

      References


      Remember - "A day without laughter is a day wasted."
      May the wind sing to you and the sun rise in your heart...