Back in November; Microsoft released their routine monthly security updates. These updates resolved 53 vulnerabilities with 14 individual updates (which are grouped when downloaded). As always these are detailed within Microsoft’s new Security Updates Guide.
Sorry for not posting this sooner; travelling for my job meant my time was much more limited.
Microsoft have listed 6 Known Issues that can occur from Windows 7 up to and including Windows 10 (version 1703):
Windows 10 (versions 1511, 1607 and 1703 potentially impacted):
could cause Internet Explorer 11 to not provide users of SQL Server Reporting Services (SSRS) the ability to scroll through drop-down menus.
Windows Pro devices on the Current Branch for Business (CBB) will upgrade unexpectedly.
The above issue regarding Epson printers could also occur. All 3 of the above issues have been resolved. Please see KB4048954 for details of the additional updates containing the appropriate fixes.
Details 2 of the above issues as well as an additional issue regarding an error message for the CDP User Service. Please see KB4048953 for details of the additional updates containing the appropriate fixes.
Windows 8.1 and Windows Server 2012 R2:
Please see KB4048958 for details of the additional updates containing the appropriate fixes for the issues already discussed above.
Please see KB4048961 for details of an additional update containing the appropriate fix for an issue already discussed above.
Windows 7 SP1 and Windows Server 2008 R2 Standard:
Please see KB4048957 for details of the additional updates containing the appropriate fixes for the issues already discussed above.
Please see KB4048960 for details of an additional update containing the appropriate fix for an issue already discussed above.
This month there are 4 Known Issues (kb4041691, kb4042895 , kb4041676 and kb4041681) for this month’s Microsoft updates. 2 of these issues relate to an exception error dialog box appearing, with the others causing a black screen, updates not to install in express , a BSOD and changing of display languages. Microsoft states in each link above they are working on resolutions to these issues.
Adobe also made available their scheduled security updates for the following products:
Adobe Acrobat and Reader (priority 2, 56 CVEs)
Adobe Connect (priority 3, 5 CVEs)
Adobe DNG Converter (priority 3, 1 CVE)
Adobe Digital Editions (priority 3, 6 CVEs)
Adobe Experience Manager (priority 3, 3 CVEs)
Adobe Flash Player (priority 2, 5 CVEs)
Adobe InDesign CC (priority 3, 1 CVE)
Adobe Photoshop CC (priority 3, 2 CVEs)
Adobe Shockwave Player (priority 2, 1 CVE)
As always the priority updates are Flash Player first and Adobe Acrobat (in that order).
One point to note is that Adobe Acrobat 11 (or XI) / Reader 11 are now out of support from November onwards. These will be the final updates they receive. Adobe recommends upgrading to Adobe Acrobat DC or Reader DC (as appropriate). Apart from the different user interface of the DC version, possible privacy concerns were raised about one of the components of this newer version namely RdrCEF.exe (the purpose of which is described here). The suggestions to resolve these concerns were:
- Adding cloud.adobe.com to your Hosts file (defined) to redirect it to localhost (defined) (to prevent it disclosing any private info)
- Blocking RdRCEF.exe from accessing the internet using your software firewall
As always you can monitor the availability of security updates for most your software from the following websites (among others) or use Secunia PSI:
US Computer Emergency Readiness Team (CERT) (please see the “Information on Security Updates” heading of the “Protecting Your PC” page):
A further useful source of update related information is the Calendar of Updates. News/announcements of updates in the categories of General Software, Security Software and Utilities are available on their website. The news/announcements are very timely and (almost always) contain useful direct download links as well as the changes/improvements made by those updates (where possible).
If you like and use it, please also consider supporting that entirely volunteer run website by donating.
If you use any of the above software, please install the appropriate updates as soon as possible. Steps for installing updates for Windows are provided on the “Protecting Your PC” page.
For Novembers Microsoft updates, I will prioritize the order of installation below:
Microsoft Office Vulnerability : CVE-2017-11882 : was described as “extremely dangerous” by researchers at security firm Embedi to disclosed the vulnerability to Microsoft. In addition to installing the security update they recommend disabling the legacy equation editor to protect against future attackers against the code which does not benefit from the more secure coding practices.
Please install the remaining updates at your earliest convenience.
As usual; I would recommend backing up the data on any device for which you are installing updates to prevent data loss in the rare event that any update causes unexpected issues.
VMware Workstation, Fusion and Horizon View Client
A security advisory with details of how to obtain updates for the above mentioned products to address 6 CVEs was made available by VMware in November.
Google Chrome updates automatically and will apply the update the next time Chrome is closed and then re-opened. Chrome can also be updated immediately by clicking the Options button (it looks like 3 stacked small horizontal lines, sometimes called a “hamburger” button) in the upper right corner of the window and choosing “About Google Chrome” from the menu. Follow the prompt to Re-launch Chrome for the updates to take effect.
v2.2.11: 3 CVEs resolved
As per standard process Linux distributions can obtain this update using the operating systems standard package manager (if the latest version is not installed automatically using the package manager you can instead compile the source code (v2.4.3) or v2.2.11). This forum thread and this forum thread may also be helpful to you with installing Wireshark on your Linux based system.
Apple security update:
An updates was made available by Apple on the 29th of November for macOS High Sierra to resolve a critical security vulnerability that could have resolved in the creation of a root (defined) account on the affected system allowing an unauthorised user privileged access to that system. Further details of this vulnerability are available here. As discussed in that link, this security update should have been installed automatically (no user action required).
Mozilla Firefox and Firefox ESR
During November Mozilla released security updates for Firefox and Firefox ESR(Extended Support Release) raising their version numbers to 57 (and later to 57.0.1) and 52.5 respectively.
- Firefox 57 resolves 15 security issues more formally known as CVEs (defined) while 57.0.1 resolves 2 CVEs.
- Firefox ESR 52.5 resolves 3 CVEs.
As always full details of the security issues resolved by these updates are available in the following links:
Details of how to install updates for Firefox are here. If Firefox is your web browser of choice, please update it as soon as possible to resolve these security issues.