Monday, April 15, 2024

Microsoft Released New Security Patch Updates for More than 30 Critical Security Issues

Microsoft released security updates for December to patch 34 security issues in different software category and some of the patch released under very critical list.

This Released fix categorized to different Microsoft products and most of the fixed bugs are belongs to servers and Windows 8 and 10 system based vulnerabilites.

Many of office vulnerabilities are catogoried as a defense-in-depth measure and the update disables the Dynamic Update Exchange protocol (DDE) in all supported editions of Microsoft Word.

Microsoft Edge and Internet Explorer 11 having many bug fixes along with this security updates.

Also Read: New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

All the windows 10 bugs are fixed by security realsed and In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.

Microsoft released security updates for following catogories
– Internet Explorer
– Microsoft Edge
– Microsoft Windows
– Microsoft Office and Microsoft Office Services and Web Apps
– Microsoft Exchange Server
– ChakraCore
– Microsoft Malware Protection Engine

Higly critical information disclouser vulneabities are exists when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL.

According to Microsoft,This could potentially result in the disclosure of sensitive information to a malicious site.
To exploit the vulnerability an attacker would have to trick a user into browsing to a malicious website or to an SMB or UNC path destination. An attacker who successfully tricked a user into disclosing the user’s NTLM hash could attempt a brute-force attack to disclose the corresponding hash password.
Windows 10 for 32-bit Systems 4053581Security UpdateInformation DisclosureImportant4048956
Windows 10 for x64-based Systems 4053581Security UpdateInformation DisclosureImportant4048956
Windows 10 Version 1511 for 32-bit Systems 4053578Security UpdateInformation DisclosureImportant4048952
Windows 10 Version 1511 for x64-based Systems 4053578Security UpdateInformation DisclosureImportant4048952
Windows 10 Version 1607 for 32-bit Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 10 Version 1607 for x64-based Systems 4053579Security UpdateInformation DisclosureImportant4048953
Windows 10 Version 1703 for 32-bit Systems 4053580Security UpdateInformation DisclosureImportant4048954
Windows 10 Version 1703 for x64-based Systems 4053580Security UpdateInformation DisclosureImportant4048954
Windows 10 Version 1709 for 32-bit Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 10 Version 1709 for x64-based Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 7 for 32-bit Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows 7 for x64-based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows 8.1 for 32-bit systems 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows 8.1 for x64-based systems 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows RT 8.1 4054519Monthly Rollup Information DisclosureImportant4048958
Windows Server 2008 for 32-bit Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for Itanium-Based Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for x64-based Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2012 4054520Monthly RollupInformation DisclosureImportant4048959
4054523Security Only
Windows Server 2012 (Server Core installation) 4054520Monthly RollupInformation DisclosureImportant4048959
4054523Security Only
Windows Server 2012 R2 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows Server 2012 R2 (Server Core installation) 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows Server 2016 4053579Security UpdateInformation DisclosureImportant4048953
Windows Server 2016 (Server Core installation) 4053579Security UpdateInformation DisclosureImportant4048953
Windows Server, version 1709 (Server Core Installation) 4054517Security UpdateInformation DisclosureImportant4048955
Website

Latest articles

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent...

Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks

A new remote code execution vulnerability has been identified to be affecting multiple Microsoft...

LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data

The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple...

LightSpy Malware Attacking Android and iOS Users

A new malware known as LightSpy has been targeting Android and iOS users.This sophisticated...

This Startup Aims To Simplify End-to-End Cybersecurity, So Anyone Can Do It

The Web3 movement is going from strength to strength with every day that passes....

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles