Sunday, February 5, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Microsoft revealed a total of 74 patches in November

Microsoft revealed a total of 74 patches in November

Microsoft revealed a total of 74 patches, 13 of which were classified as critical patches for remote code execution (RCE) vulnerabilities in November before major Windows update.


Seda Nur Cinar Seda Nur Cinar
November 14, 2019
3 min read
Microsoft revealed a total of 74 patches in November

Microsoft reached 74 patches for fixing vulnerabilities in November before Windows 10 November 2019 Update. When 13 of these patches were classified as critical, the remaining majority includes patches for Windows graphics components and Microsoft SharePoint. Cybersecurity firm TrendMicro shared some detailed about Microsoft’s patches.

Table of Contents

  • Hyper-V patches
  • Microsoft Exchange patch
  • SharePoint patch
  • Windows TCP/IP patch
  • Windows Graphics patches
  • Mac Macro patch

Hyper-V patches

Most of the critical patches were caused by flaws in Hyper-V, Microsoft’s virtualization software. These were CVE-2019-0721, CVE-2019-1389, CVE-2019-1397, and CVE-2019-1398. According to TrendMicro, the vulnerabilities exist in how Hyper-V fails to adequately validate input from a guest operating system. Hackers can use a special application on a guest operating system that could have the Hyper-V host operating system to execute arbitrary code.

Microsoft Exchange patch

CVE-2019-1373 is also a critical patch for fixing an RCE vulnerability in Microsoft Exchange which manifests in the deserialization of metadata through PowerShell. This vulnerability allows a successful threat actor to run arbitrary code like a legitimate system user.

SharePoint patch

Important patches address an information disclosure vulnerability. CVE-2019-1443 is defined as an important patch that fixes the vulnerability in SharePoint. This vulnerability causes uploading a specifically crafted file to the SharePoint server and obtains SMB hashes.

Windows TCP/IP patch

CVE-2019-1324 fixes a vulnerability in the Windows TCP/IP stack that improperly handles IPv6 packets. It allows hackers to acquire the information they can use to more heavily compromise the system. Also, it sends specially crafted IPv6 packets to the targeted Windows computer.

Windows Graphics patches

One of the most important patches, CVE-2019-1439 is responsible for rendering graphical objects in output devices like monitors and printers vulnerability in Windows’ Graphics Device Interface (GDI). TrendMicro researchers said that sackers can use social engineering techniques to have a user open a malicious document or visit an untrusted webpage that would allow them to exploit the vulnerability and steal sensitive information.

Windows Graphics Component has also another vulnerability. In order to fix these vulnerabilities, CVE-2019-1407 and CVE-2019-1433 are another two patches that address the way graphics component handles objects in memory and prevents possible hackers from running processes in an elevated context.

Mac Macro patch

CVE-2019-1457 is for fixing an earlier reported vulnerability in Microsoft Office for Mac. The November list also includes a notable fix to an earlier reported vulnerability in Microsoft Office for Mac. The option “Disable all macros without notification,” in the flaw enables a certain macro format called XLM to run without any prompt. It augments the security risk linked to an opening to run arbitrary code.

See more Cybersecurity News


Tags: Microsoft
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Mist Systems is expanding with new Mist Wired Assurance Service

Mist Systems is expanding with new Mist Wired Assurance Service

Related News

LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
LibreOffice 7.5 Community is released. What's new

LibreOffice 7.5 Community is released. What’s new?

February 3, 2023 3:30 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Radware announces a new partner program

Radware announces a new partner program

February 3, 2023 1:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Weekly round-up: 30 January – 3 February
  • What is Deep Learning?
  • What is GitHub Copilot?
  • Cloud7 Expert Series: Dennis Kittrell from CloudLinux
  • Best Ubuntu alternatives for desktop of 2023

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.