Tripwire’s November 2019 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Oracle, Linux Kernel and Adobe.
Exploit Alert: Metasploit
First, on the patch priority list, this month are vulnerabilities that have been recently added to Metasploit. Two vulnerabilities, identified by CVE-2019-11539 and CVE-2019-11510 that affect the Pulse Connect Secure product have been added to Metasploit. Administrators can learn more about these vulnerabilities via the Pulse Connect Secure advisory SA44101.
Exploit Alert: Exploit-DB
Up next, system administrators should focus on several vulnerabilities from Adobe for Acrobat & Reader as well as Microsoft for Internet Explorer and Windows Universal Plug and Play (UPnP). Vulnerabilities impacting these products, identified by CVE-2019-8196, CVE-2019-8195, CVE-2019-1429, and CVE-2019-1405, have been added to Exploit-DB with information detailing technical aspects that could lead to direct exploitation of these vulnerabilities.
Other Patch Priorities
Up next are patches for Microsoft Browser, Scripting Engine and VBScript. These patches resolve 6 vulnerabilities including fixes for memory corruption, remote code execution, and security feature bypass flaws.
Next on the list are patches for Microsoft Excel, Office, and Visual Studio. These patches resolve 5 vulnerabilities including fixes for information disclosure, remote code execution, security feature bypass, and elevation of privilege vulnerabilities.
Up next are patches for Microsoft Windows. These patches address numerous vulnerabilities across Windows Kernel, GDI, Microsoft Graphics, Jet Database Engine, Windows Data Sharing Service, Windows AppX, Windows Error Reporting, DirectWrite, ActiveX, Windows Modules Installer Service, and Windows RPC. These patches fix over 40 vulnerabilities including elevation of privilege, information disclosure, spoofing, security feature bypass, and remote code execution vulnerabilities.
Next, this month are patches for Windows Hyper-V. These patches resolve 9 vulnerabilities including fixes for denial of service and remote code execution vulnerabilities.
Lastly this month, administrators should focus on server-side patches available for Microsoft Exchange, SharePoint, and Office Online (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Lane Thames. Read the original post at: https://www.tripwire.com/state-of-security/vert/vert-news/patch-priority-index-november-2019/