HomeSample Page

Sample Page Title


Microsoft on Tuesday launched patches for 104 vulnerabilities, together with 80 for Home windows. Ten different product teams are additionally affected. Of the 104 CVEs addressed, 11 are thought of Crucial in severity; ten of these are in Home windows, whereas one falls within the Microsoft Widespread Information Mannequin SDK. (The Widespread Information Mannequin is a metadata system for business-related information.) One CVE, an Vital-severity denial-of-service subject (CVE-2023-38171), impacts not solely Home windows however each .NET and Visible Studio.

At patch time, two points involving WordPad and Skype are identified to be underneath exploit within the wild. An extra 10 vulnerabilities in Home windows, Alternate, and Skype are by the corporate’s estimation extra more likely to be exploited within the subsequent 30 days. For ease of prioritization, these 12 points are:

Product householdCVELively exploitationSuggestion
SkypeCVE-2023-41763Detected within the wildPatch instantly
Home windows (WordPad)CVE-2023-36563Detected within the wildPatch instantly
AlternateCVE-2023-36778Seemingly with 30 daysPatch ASAP
SkypeCVE-2023-36780Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-36594Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-36713Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-36731Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-36732Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-36743Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-36776Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-38159Seemingly with 30 daysPatch ASAP
Home windowsCVE-2023-41772Seemingly with 30 daysPatch ASAP

 

Some of the fascinating gadgets on this month’s launch isn’t even a patch – although to be truthful, it’s not a difficulty that may be “patched” within the normal sense, for Microsoft merchandise or many others. CVE-2023-44487, an Vital-severity denial of service subject, describes a rapid-reset assault in opposition to HTTP/2, presently underneath extraordinarily lively exploit within the wild. It carries a MITRE-assigned CVE quantity (a rarity; normally Microsoft assigns its personal CVEs numbers) and, in accordance with Microsoft’s finder-acknowledgement system, is “credited” to Google, Amazon, and Cloudflare. The checklist of affected product households is lengthy: .NET, ASP.NET, Visible Studio, and numerous iterations of Home windows.  Microsoft has printed an article on the matter. It’s not included within the patch tallies on this put up, although the article states that the corporate is releasing mitigations – not patches, mitigation — for IIS, .NET, and Home windows.  There’s a really useful workaround, although – going into RegEdit and disabling the HTTP/2 protocol in your net server. Google has posted a great rationalization of this assault.

Past Patch Tuesday, the keepers of curl (the open-source command-line software) additionally had a major patch on faucet for Wednesday, 11 October. In line with the advisory posted to GitHub, CVE-2023-38545 and CVE-2023-38546 each describe points in libcurl, with CVE-2023-38545, a heap-overflow subject, additionally touching curl itself. These are critical enterprise; in accordance with Daniel Stenberg, the maintainer who wrote the GitHub advisory, “[CVE-2023-38545] might be the worst curl safety flaw in a very long time.” Since curl lies on the coronary heart of such in style protocols as SSL, TLS, HTTP, and FTP, system directors are suggested within the strongest doable phrases to familiarize themselves with the brand new curl 8.4.0 launch, which addresses this subject.

October can also be an enormous month for goodbyes. The tables in Appendix E on the finish of this text checklist the Microsoft merchandise reaching end-of-servicing (coated underneath the Trendy Coverage) and finish of help (coated underneath the Fastened Coverage) right now, in addition to these transferring from Mainstream to Prolonged help. Prolonged help consists of free safety updates, however no extra new options or design modifications. The checklist of merchandise affected is lengthy and thrilling – particularly, Workplace 2019 not taking function updates is a milestone – however the headline act on this month’s cruise into the sundown is definitely Server 2012 and Server 2012R2. As a going-away current, that venerable model of the platform receives 65 patches, 11 of them critical-severity, one underneath lively exploit within the wild.

We’re as normal together with on the finish of this put up three appendices itemizing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product household. As per Microsoft’s steering we’ll deal with the Chromium patch as information-only and never embody it within the following charts and totals, although we’ve added a chart on the finish of the put up offering fundamental info on that. (CVE-2023-44487, mentioned above, additionally applies to Chromium; that is additionally famous within the appendix.)

  • Whole Microsoft CVEs: 2
  • Whole advisories delivery in replace: 2
  • Publicly disclosed: 2
  • Exploited: 2
  • Severity
    • Crucial: 13
    • Vital: 91
  • Impression
    • Distant Code Execution: 45
    • Elevation of Privilege: 26
    • Denial of Service: 16
    • Data Disclosure: 12
    • Safety Characteristic Bypass: 4
    • Spoofing: 1

A bar chart showing distribution of October 2023 Patch Tuesday releases by severity and impact

Determine 1: October is a heavy patch month with a little bit little bit of every part

Merchandise

  • Home windows: 80 (together with one shared with .NET and Visible Studio)
  • Azure: 6
  • SQL: 5
  • Skype: 4
  • Dynamics 365: 3
  • Workplace: 3
  • .NET: 1 (shared with Visible Studio and Home windows)
  • Alternate: 1
  • Microsoft Widespread Information Mannequin SDK: 1
  • MMPC: 1
  • Visible Studio: 1 (shared with .NET and Home windows)

A bar chart showing October 2023 Patch Tuesday releases by product family and severity

Determine 2: Merchandise affected by October’s patches. For gadgets that apply to a couple of product household (e.g., the patch shared by Home windows, Visible Studio, and .NET), the chart represents these patches in every household to which they apply, making the workload look barely heavier than it is going to be in observe

Notable October updates

Along with the high-priority points mentioned above, a couple of fascinating gadgets current themselves.

9 CVEs — Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
5 CVEs — Win32k Elevation of Privilege Vulnerability

Identically named CVEs are hardly uncommon in these releases; this month additionally has identically named units of 16 (Microsoft Message Queuing Distant Code Execution Vulnerability), 4 (Microsoft Message Queuing Denial of Service Vulnerability), and three (too many to checklist) CVEs. Nevertheless, the 9 RCEs touching Home windows’ Layer 2 tunnelling protocol additionally share Crucial-severity standing (CVSS 3.1 base is 8.1) and are thus price sooner fairly than later. Fortuitously, Microsoft doesn’t consider any of them to be extra more likely to be exploited within the subsequent 30 days. The 5 EoP points touching Win32K, alternatively, are all thought of extra more likely to see exploitation within the subsequent 30 days.

CVE-2023-36563 — Microsoft WordPad Data Disclosure Vulnerability

That is as talked about one of many two vulnerabilities underneath lively exploit within the wild; Microsoft states that Preview Pane is a vector.

A bar chart showing cumulative Patch Tuesday totals for 2023; in descending order, RCE, EoP, info disclosure, DoS, spoofing, security feature bypass, tampering

Determine 3: With two months to go in 2023, Microsoft has issued precisely 300 patches in opposition to distant code execution subject, essentially the most of any class of vulnerability this yr

Sophos protections

CVESophos Intercept X/Endpoint IPSSophos XGS Firewall
CVE-2023-36594Exp/2336594-AExp/2336594-A
CVE-2023-36713Exp/2336713-AExp/2336713-A
CVE-2023-36731Exp/2336731-AExp/2336731-A
CVE-2023-36743Exp/2336743-AExp/2336743-A
CVE-2023-36776Exp/2336776-AExp/2336776-A
CVE-2023-38159Exp/2338159-AExp/2338159-A
CVE-2023-41772Exp/2341772-AExp/2341772-A

 

As you may each month, in case you don’t wish to wait on your system to drag down Microsoft’s updates itself, you may obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe software to find out which construct of Home windows 10 or 11 you’re operating, then obtain the Cumulative Replace package deal on your particular system’s structure and construct quantity.

With regard to CVE-2023-44487, the best choice for thwarting the denial-of-service assault enabled by the vulnerability is to comply with Microsoft’s printed recommendation.

Appendix A: Vulnerability Impression and Severity

This can be a checklist of October’s patches sorted by impression, then sub-sorted by severity. Every checklist is additional organized by CVE.

Distant Code Execution (45 CVEs)

Crucial severity
CVE-2023-35349Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36697Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36718Home windows Digital Trusted Platform Module Elevation of Privilege Vulnerability
CVE-2023-38166Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41765Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41767Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41768Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41769Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41770Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41771Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41773Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41774Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
Vital severity
CVE-2023-36414Azure Id SDK Distant Code Execution Vulnerability
CVE-2023-36415Azure Id SDK Distant Code Execution Vulnerability
CVE-2023-36417Microsoft SQL OLE DB Distant Code Execution Vulnerability
CVE-2023-36418Azure RTOS GUIX Studio Distant Code Execution Vulnerability
CVE-2023-36420Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability
CVE-2023-36436Home windows MSHTML Platform Distant Code Execution Vulnerability
CVE-2023-36557PrintHTML API Distant Code Execution Vulnerability
CVE-2023-36570Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36571Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36572Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36573Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36574Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36575Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36577Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2023-36578Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36582Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36583Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36589Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36590Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36591Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36592Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36593Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36598Microsoft WDAC ODBC Driver Distant Code Execution Vulnerability
CVE-2023-36702Microsoft DirectMusic Distant Code Execution Vulnerability
CVE-2023-36704Home windows Setup Recordsdata Cleanup Distant Code Execution Vulnerability
CVE-2023-36710Home windows Media Basis Core Distant Code Execution Vulnerability
CVE-2023-36730Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability
CVE-2023-36778Microsoft Alternate Server Distant Code Execution Vulnerability
CVE-2023-36780Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-36785Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability
CVE-2023-36786Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-36789Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-36902Home windows Runtime Distant Code Execution Vulnerability


Elevation of Privilege (26 CVEs)

Vital severity
CVE-2023-36419Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability
CVE-2023-36434Home windows IIS Server Elevation of Privilege Vulnerability
CVE-2023-36561Azure DevOps Server Elevation of Privilege Vulnerability
CVE-2023-36565Microsoft Workplace Graphics Elevation of Privilege Vulnerability
CVE-2023-36568Microsoft Workplace Click on-To-Run Elevation of Privilege Vulnerability
CVE-2023-36569Microsoft Workplace Elevation of Privilege Vulnerability
CVE-2023-36594Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2023-36605Home windows Named Pipe Filesystem Elevation of Privilege Vulnerability
CVE-2023-36701Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2023-36711Home windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVE-2023-36712Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36721Home windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-36723Home windows Container Supervisor Service Elevation of Privilege Vulnerability
CVE-2023-36725Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36726Home windows Web Key Alternate (IKE) Extension Elevation of Privilege  Vulnerability
CVE-2023-36729Named Pipe File System Elevation of Privilege Vulnerability
CVE-2023-36731Win32k Elevation of Privilege Vulnerability
CVE-2023-36732Win32k Elevation of Privilege Vulnerability
CVE-2023-36737Azure Community Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2023-36743Win32k Elevation of Privilege Vulnerability
CVE-2023-36776Win32k Elevation of Privilege Vulnerability
CVE-2023-36790Home windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability
CVE-2023-38159Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2023-41763Skype for Enterprise Elevation of Privilege Vulnerability
CVE-2023-41766Home windows Shopper Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVE-2023-41772Win32k Elevation of Privilege Vulnerability


Denial of Service (16 CVEs)

Crucial severity
CVE-2023-36566Microsoft Widespread Information Mannequin SDK Denial of Service Vulnerability
Vital severity
CVE-2023-36431Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36435Microsoft QUIC Denial of Service Vulnerability
CVE-2023-36579Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36581Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36585Lively Template Library Denial of Service Vulnerability
CVE-2023-36602Home windows TCP/IP Denial of Service Vulnerability
CVE-2023-36603Home windows TCP/IP Denial of Service Vulnerability
CVE-2023-36606Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36703DHCP Server Service Denial of Service Vulnerability
CVE-2023-36707Home windows Deployment Companies Denial of Service Vulnerability
CVE-2023-36709Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2023-36717Home windows Digital Trusted Platform Module Denial of Service Vulnerability
CVE-2023-36720Home windows Combined Actuality Developer Instruments Denial of Service Vulnerability
CVE-2023-36728Microsoft SQL Server Denial of Service Vulnerability
CVE-2023-38171Microsoft QUIC Denial of Service Vulnerability


Data Disclosure (12 CVEs)

Vital severity
CVE-2023-29348Home windows Distant Desktop Gateway (RD Gateway) Data Disclosure Vulnerability
CVE-2023-36429Microsoft Dynamics 365 Data Disclosure Vulnerability
CVE-2023-36433Microsoft Dynamics 365 (On-Premises) Data Disclosure Vulnerability
CVE-2023-36438Home windows TCP/IP Data Disclosure Vulnerability
CVE-2023-36563Microsoft WordPad Data Disclosure Vulnerability
CVE-2023-36567Home windows Deployment Companies Data Disclosure Vulnerability
CVE-2023-36576Home windows Kernel Data Disclosure Vulnerability
CVE-2023-36596Distant Process Name Data Disclosure Vulnerability
CVE-2023-36706Home windows Deployment Companies Data Disclosure Vulnerability
CVE-2023-36713Home windows Widespread Log File System Driver Data Disclosure Vulnerability
CVE-2023-36722Lively Listing Area Companies Data Disclosure Vulnerability
CVE-2023-36724Home windows Energy Administration Service Data Disclosure Vulnerability


Safety Characteristic Bypass (4 CVEs)

Vital severity
CVE-2023-36564Home windows Search Safety Characteristic Bypass Vulnerability
CVE-2023-36584Home windows Mark of the Net Safety Characteristic Bypass Vulnerability
CVE-2023-36698Home windows Kernel Safety Characteristic Bypass Vulnerability
CVE-2023-36700Microsoft Defender Safety Characteristic Bypass Vulnerability


Spoofing (1 CVE)

Vital severity
CVE-2023-36416Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Appendix B: Exploitability

This can be a checklist of the October CVEs judged by Microsoft to be extra more likely to be exploited within the wild throughout the first 30 days post-release, in addition to these already identified to be underneath exploit. Every checklist is additional organized by CVE.

Exploitation detected
CVE-2023-36563Microsoft WordPad Data Disclosure Vulnerability
CVE-2023-41763Skype for Enterprise Elevation of Privilege Vulnerability
Exploitation extra probably
CVE-2023-36594Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2023-36713Home windows Widespread Log File System Driver Data Disclosure Vulnerability
CVE-2023-36731Win32k Elevation of Privilege Vulnerability
CVE-2023-36732Win32k Elevation of Privilege Vulnerability
CVE-2023-36743Win32k Elevation of Privilege Vulnerability
CVE-2023-36776Win32k Elevation of Privilege Vulnerability
CVE-2023-36778Microsoft Alternate Server Distant Code Execution Vulnerability
CVE-2023-36780Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-38159Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2023-41772Win32k Elevation of Privilege Vulnerability

 

 Appendix C: Merchandise Affected

This can be a checklist of October’s patches sorted by product household, then sub-sorted by severity. Every checklist is additional organized by CVE.

Home windows (80 CVEs)

Crucial severity
CVE-2023-35349Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36697Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36718Home windows Digital Trusted Platform Module Elevation of Privilege Vulnerability
CVE-2023-38166Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41765Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41767Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41768Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41769Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41770Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41771Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41773Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
CVE-2023-41774Layer 2 Tunneling Protocol Distant Code Execution Vulnerability
Vital severity
CVE-2023-29348Home windows Distant Desktop Gateway (RD Gateway) Data Disclosure Vulnerability
CVE-2023-36431Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36434Home windows IIS Server Elevation of Privilege Vulnerability
CVE-2023-36435Microsoft QUIC Denial of Service Vulnerability
CVE-2023-36436Home windows MSHTML Platform Distant Code Execution Vulnerability
CVE-2023-36438Home windows TCP/IP Data Disclosure Vulnerability
CVE-2023-36557PrintHTML API Distant Code Execution Vulnerability
CVE-2023-36563Microsoft WordPad Data Disclosure Vulnerability
CVE-2023-36564Home windows Search Safety Characteristic Bypass Vulnerability
CVE-2023-36567Home windows Deployment Companies Data Disclosure Vulnerability
CVE-2023-36570Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36571Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36572Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36573Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36574Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36575Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36576Home windows Kernel Data Disclosure Vulnerability
CVE-2023-36577Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2023-36578Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36579Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36581Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36582Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36583Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36584Home windows Mark of the Net Safety Characteristic Bypass Vulnerability
CVE-2023-36585Lively Template Library Denial of Service Vulnerability
CVE-2023-36589Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36590Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36591Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36592Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36593Microsoft Message Queuing Distant Code Execution Vulnerability
CVE-2023-36594Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2023-36596Distant Process Name Data Disclosure Vulnerability
CVE-2023-36598Microsoft WDAC ODBC Driver Distant Code Execution Vulnerability
CVE-2023-36602Home windows TCP/IP Denial of Service Vulnerability
CVE-2023-36603Home windows TCP/IP Denial of Service Vulnerability
CVE-2023-36605Home windows Named Pipe Filesystem Elevation of Privilege Vulnerability
CVE-2023-36606Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36698Home windows Kernel Safety Characteristic Bypass Vulnerability
CVE-2023-36701Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2023-36702Microsoft DirectMusic Distant Code Execution Vulnerability
CVE-2023-36703DHCP Server Service Denial of Service Vulnerability
CVE-2023-36704Home windows Setup Recordsdata Cleanup Distant Code Execution Vulnerability
CVE-2023-36706Home windows Deployment Companies Data Disclosure Vulnerability
CVE-2023-36707Home windows Deployment Companies Denial of Service Vulnerability
CVE-2023-36709Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2023-36710Home windows Media Basis Core Distant Code Execution Vulnerability
CVE-2023-36711Home windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVE-2023-36712Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36713Home windows Widespread Log File System Driver Data Disclosure Vulnerability
CVE-2023-36717Home windows Digital Trusted Platform Module Denial of Service Vulnerability
CVE-2023-36720Home windows Combined Actuality Developer Instruments Denial of Service Vulnerability
CVE-2023-36721Home windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-36722Lively Listing Area Companies Data Disclosure Vulnerability
CVE-2023-36723Home windows Container Supervisor Service Elevation of Privilege Vulnerability
CVE-2023-36724Home windows Energy Administration Service Data Disclosure Vulnerability
CVE-2023-36725Home windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36726Home windows Web Key Alternate (IKE) Extension Elevation of Privilege  Vulnerability
CVE-2023-36729Named Pipe File System Elevation of Privilege Vulnerability
CVE-2023-36731Win32k Elevation of Privilege Vulnerability
CVE-2023-36732Win32k Elevation of Privilege Vulnerability
CVE-2023-36743Win32k Elevation of Privilege Vulnerability
CVE-2023-36776Win32k Elevation of Privilege Vulnerability
CVE-2023-36790Home windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability
CVE-2023-36902Home windows Runtime Distant Code Execution Vulnerability
CVE-2023-38159Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2023-38171Microsoft QUIC Denial of Service Vulnerability
CVE-2023-41766Home windows Shopper Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVE-2023-41772Win32k Elevation of Privilege Vulnerability


Azure (6 CVEs)

Vital severity
CVE-2023-36414Azure Id SDK Distant Code Execution Vulnerability
CVE-2023-36415Azure Id SDK Distant Code Execution Vulnerability
CVE-2023-36418Azure RTOS GUIX Studio Distant Code Execution Vulnerability
CVE-2023-36419Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability
CVE-2023-36561Azure DevOps Server Elevation of Privilege Vulnerability
CVE-2023-36737Azure Community Watcher VM Agent Elevation of Privilege Vulnerability


SQL (5 CVEs)

Vital severity
CVE-2023-36417Microsoft SQL OLE DB Distant Code Execution Vulnerability
CVE-2023-36420Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability
CVE-2023-36728Microsoft SQL Server Denial of Service Vulnerability
CVE-2023-36730Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability
CVE-2023-36785Microsoft ODBC Driver for SQL Server Distant Code Execution Vulnerability


Skype (4 CVEs)

Vital severity
CVE-2023-36780Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-36786Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-36789Skype for Enterprise Distant Code Execution Vulnerability
CVE-2023-41763Skype for Enterprise Elevation of Privilege Vulnerability


Dynamics 365 (3 CVEs)

Vital severity
CVE-2023-36416Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-36429Microsoft Dynamics 365 Data Disclosure Vulnerability
CVE-2023-36433Microsoft Dynamics 365 (On-Premises) Data Disclosure Vulnerability


Workplace (3 CVEs)

Vital severity
CVE-2023-36565Microsoft Workplace Graphics Elevation of Privilege Vulnerability
CVE-2023-36568Microsoft Workplace Click on-To-Run Elevation of Privilege Vulnerability
CVE-2023-36569Microsoft Workplace Elevation of Privilege Vulnerability


.NET (1 CVE)

Vital severity
CVE-2023-38171Microsoft QUIC Denial of Service Vulnerability


Alternate (1 CVE)

Vital severity
CVE-2023-36778Microsoft Alternate Server Distant Code Execution Vulnerability


Microsoft Widespread Information Mannequin SDK (1 CVE)

Crucial severity
CVE-2023-36566Microsoft Widespread Information Mannequin SDK Denial of Service Vulnerability


MMPC (1 CVE)

Vital severity
CVE-2023-36700Microsoft Defender Safety Characteristic Bypass Vulnerability


Visible Studio (1 CVE)

Vital severity
CVE-2023-38171Microsoft QUIC Denial of Service Vulnerability

 

Appendix D: Different Merchandise

This can be a checklist of advisories within the October Microsoft launch, sorted by product group.

Chromium / Edge (1 subject)

CVE-2023-5346Chromium: CVE-2023-5346 Sort Confusion in V8

The CVE-2023-44487 coated extensively above additionally applies to Chromium / Edge.

 

 Appendix E: Finish of Servicing, Finish of Help, and different modifications

These three tables cowl Microsoft merchandise altering standing on 10 October 2023.

Finish of Servicing (2 merchandise)
Dynamics 365 Enterprise Central on-premises (Trendy Coverage), 2022 launch wave 1, model 20.x
Home windows 11 Dwelling and Professional, Model 21H2

 

Finish of Help (21 merchandise)
Excel 2019 for Mac
Hyper-V Server 2012
Hyper-V Server 2012 R2
Web Explorer 7
Web Data Companies (IIS), IIS 8 on Home windows Server 2012
Web Data Companies (IIS), IIS 8.5 on Home windows Server 2012 R2
Microsoft Workplace 2019 for Mac
Microsoft Workplace Audit and Management Administration Server 2013
Outlook 2019 for Mac
PowerPoint 2019 for Mac
Home windows Embedded Compact 2013
Home windows Embedded POSReady 7, Prolonged Safety Replace Yr 2*
Home windows Embedded Normal 7, Prolonged Safety Replace Yr 3*
Home windows MultiPoint Server 2012
Home windows Server 2012
Home windows Server 2012 R2
Home windows Server Replace Companies for Home windows Server 2012
Home windows Server Replace Companies for Home windows Server 2012 R2
Home windows Storage Server 2012
Home windows Storage Server 2012 R2
Phrase 2019 for Mac

 

Transferring from Mainstream to Prolonged Help (11 merchandise)
Entry 2019
Dynamics 365 Enterprise Central on-premises (Fastened Coverage)
Excel 2019
Microsoft Workplace 2019
OneNote 2016
Outlook 2019
PowerPoint 2019
Mission 2019
Writer 2019
Visio 2019
Phrase 2019

 

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles