Article Details

Scrape Timestamp (UTC): 2023-10-11 12:19:50.009

Source: https://thehackernews.com/2023/10/microsoft-releases-october-2023-patches.html

Original Article Text

Click to Toggle View

Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits. Microsoft has released its Patch Tuesday updates for October 2023, addressing a total of 103 flaws in its software, two of which have come under active exploitation in the wild. Of the 103 flaws, 13 are rated Critical and 90 are rated Important in severity. This is apart from 18 security vulnerabilities addressed in its Chromium-based Edge browser since the second Tuesday of September. The two vulnerabilities that been weaponized as zero-days are as follows - "To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system," Microsoft said in an advisory for CVE-2023-36563. "Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file." Also fixed by Redmond are dozens of flaws impacting Microsoft Message Queuing (MSMQ) and Layer 2 Tunneling Protocol that could lead to remote code execution and denial-of-service (DoS). The security update further resolves a severe privilege escalation bug in Windows IIS Server (CVE-2023-36434, CVSS score: 9.8) that could permit an attacker to impersonate and login as another user via a brute-force attack. The tech giant has also released an update for CVE-2023-44487, also referred to as the HTTP/2 Rapid Reset attack, which has been exploited by unknown actors as a zero-day to stage hyper-volumetric distributed denial-of-service (DDoS) attacks. "While this DDoS has the potential to impact service availability, it alone does not lead to the compromise of customer data, and at this time we have seen no evidence of customer data being compromised," it said. Finally, Microsoft has announced that Visual Basic Script (aka VBScript), which is often exploited for malware distribution, is being deprecated, adding, "in future releases of Windows, VBScript will be available as a feature on demand before its removal from the operating system." Software Patches from Other Vendors In addition to Microsoft, security updates have also been released by other vendors since the start of the month to rectify several vulnerabilities, including —

Daily Brief Summary

CYBERCRIME // Microsoft Issues Patch for 103 Software Flaws, Some Under Active Exploitation

Microsoft has updated its software, addressing 103 vulnerabilities, with two cases actively exploited in the wild.

Out of the 103 flaws, 13 are evaluated as Critical, and the remaining 90 deemed Important. Besides, 18 security vulnerabilities were addressed in its Edge browser since the second Tuesday of September.

The two weaponized zero-days require the attacker to first log on to the system and then run a crafted application to exploit the vulnerability.

Microsoft also identified flaws in Microsoft Message Queuing (MSMQ) and Layer 2 Tunneling Protocol, potentially leading to remote code execution and denial-of-service (DoS) attacks.

A severe privilege escalation bug in Windows IIS Server, allowing an attacker to impersonate and log in as another user through a brute force attack, was also resolved.

Microsoft also released an update for the HTTP/2 Rapid Reset attack, exploited in a zero-day to perform hyper-volumetric distributed denial-of-service (DDoS) attacks.

Lastly, Microsoft announced the deprecation of Visual Basic Script, often exploited for malware distribution. It will soon be a feature on demand before its removal from the operating system.