Thursday, March 28, 2024

Microsoft Released New Security Patch Updates for More than 30 Critical Security Issues

Microsoft released security updates for December to patch 34 security issues in different software category and some of the patch released under very critical list.

This Released fix categorized to different Microsoft products and most of the fixed bugs are belongs to servers and Windows 8 and 10 system based vulnerabilites.

Many of office vulnerabilities are catogoried as a defense-in-depth measure and the update disables the Dynamic Update Exchange protocol (DDE) in all supported editions of Microsoft Word.

Microsoft Edge and Internet Explorer 11 having many bug fixes along with this security updates.

Also Read: New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

All the windows 10 bugs are fixed by security realsed and In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.

Microsoft released security updates for following catogories
– Internet Explorer
– Microsoft Edge
– Microsoft Windows
– Microsoft Office and Microsoft Office Services and Web Apps
– Microsoft Exchange Server
– ChakraCore
– Microsoft Malware Protection Engine

Higly critical information disclouser vulneabities are exists when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL.

According to Microsoft,This could potentially result in the disclosure of sensitive information to a malicious site.
To exploit the vulnerability an attacker would have to trick a user into browsing to a malicious website or to an SMB or UNC path destination. An attacker who successfully tricked a user into disclosing the user’s NTLM hash could attempt a brute-force attack to disclose the corresponding hash password.
Windows 10 for 32-bit Systems 4053581Security UpdateInformation DisclosureImportant4048956
Windows 10 for x64-based Systems 4053581Security UpdateInformation DisclosureImportant4048956
Windows 10 Version 1511 for 32-bit Systems 4053578Security UpdateInformation DisclosureImportant4048952
Windows 10 Version 1511 for x64-based Systems 4053578Security UpdateInformation DisclosureImportant4048952
Windows 10 Version 1607 for 32-bit Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 10 Version 1607 for x64-based Systems 4053579Security UpdateInformation DisclosureImportant4048953
Windows 10 Version 1703 for 32-bit Systems 4053580Security UpdateInformation DisclosureImportant4048954
Windows 10 Version 1703 for x64-based Systems 4053580Security UpdateInformation DisclosureImportant4048954
Windows 10 Version 1709 for 32-bit Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 10 Version 1709 for x64-based Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 7 for 32-bit Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows 7 for x64-based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows 8.1 for 32-bit systems 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows 8.1 for x64-based systems 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows RT 8.1 4054519Monthly Rollup Information DisclosureImportant4048958
Windows Server 2008 for 32-bit Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for Itanium-Based Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for x64-based Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2012 4054520Monthly RollupInformation DisclosureImportant4048959
4054523Security Only
Windows Server 2012 (Server Core installation) 4054520Monthly RollupInformation DisclosureImportant4048959
4054523Security Only
Windows Server 2012 R2 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows Server 2012 R2 (Server Core installation) 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows Server 2016 4053579Security UpdateInformation DisclosureImportant4048953
Windows Server 2016 (Server Core installation) 4053579Security UpdateInformation DisclosureImportant4048953
Windows Server, version 1709 (Server Core Installation) 4054517Security UpdateInformation DisclosureImportant4048955
Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles