Source: heimdalsecurity.com – Author: Vladimir Unterfingher
The second month of summer comes a-calling with a hefty list of bug fixes; throughout July, Microsoft has released no lesst than 142 patches for various types of vulnerabilities, with scores ranging from Important to Critical. Without further ado, here’s what Patch Tuesday July has in stock for us. Enjoy and don’t forget to subscribe to Heimdal®’s newsletter.
Patch Tuesday July 2023 – Highlights
We’ll kick off July’s fix list with CVE-2023-35373; classified as a Mono Authenticode Validation spoofing vulnerability, this defect can potentially allow a threat actor to execute arbitrary code or perform various actions on the victim’s machine via packet spoofing by leveraging a flawed Mono component. The vulnerability has received an official Microsoft fix.
Next on the list is CVE-2023-35305, a Windows Kernel Elevation of Privilege vulnerability. If abused, this defect could grant the threat actor SYSTEM-level privileges. The vulnerability, which previously received a CVSS 3.1.7.8 score of 6.8 (i.e., computed Max Severity Score = “Important”) was fixed during July’s patching bout.
Up next is CVE-2023-35302, a Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution vulnerability. With a CVSS 3.1.7.8 score of 7.7, this defect allows an attacker to remotely execute arbitrary code on the target machine by abusing some defective components associated with PostScript and the PCL6 Class Printer Driver. An official Microsoft patch was made available, alongside several workaround should the patching process fail. The workarounds can be found below.
Method 1: Terminate the Print Spooler Service.
First, determine if the Print Spooler service is running on the machine. To do that, start a Windows PowerShell session (i.e., with administrator rights) and type in the following command: Get-Service -Name Spooler.
To disable the service, type in Stop-Service -Name Spooler – Force, followed by Set-Service -Name Spooler -StartupType Disabled.
Method 2: Using Group Policy to terminate the inbound remote printing service.
Use the method above to determine if the Print Spooler service is running. Consequently, go to Group Policy and access the “Printers” section. You will find under Administrative Templates in the Computer Configuration menu. Scroll down and disable the option “Allows Print Spooler to access client connections.” Don’t forget to restart the Print Spooler service. Otherwise the changes won’t take effect.
Please note that both workarounds can impact printing operations. For instance, after terminating the Print Spooler Service (i.e., method 1), you will no longer be able to print documents remotely or locally. On the other hand, method 2 (i.e. disabling the inbound remote printing service via Group Policy) will disable the server printer service, but local printing will still be available (i.e., only works for directly attacked devices).
The full list of released patches can be reviewed below.
Release Date | CVE Number | CVE Title |
---|---|---|
Jul 11, 2023 | CVE-2023-36871 | Azure Active Directory Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-36868 | Azure Service Fabric on Windows Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-36867 | Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35374 | Paint 3D Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35373 | Mono Authenticode Validation Spoofing Vulnerability |
Jul 11, 2023 | CVE-2023-35335 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Jul 11, 2023 | CVE-2023-35312 | Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35311 | Microsoft Outlook Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-35310 | Windows DNS Server Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35309 | Microsoft Message Queuing Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35308 | Windows MSHTML Platform Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-35306 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35305 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35304 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35303 | USB Audio Class System Driver Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35302 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35300 | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35299 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35298 | HTTP.sys Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35297 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35296 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32085 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32084 | HTTP.sys Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-32083 | Microsoft Failover Cluster Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32057 | Microsoft Message Queuing Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-32056 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-32055 | Active Template Library Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-32054 | Volume Shadow Copy Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-32053 | Windows Installer Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-32052 | Microsoft Power Apps (online) Spoofing Vulnerability |
Jul 11, 2023 | CVE-2023-33171 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Jul 11, 2023 | CVE-2023-33170 | ASP.NET and Visual Studio Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-33164 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33163 | Windows Network Load Balancing Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33162 | Microsoft Excel Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-33161 | Microsoft Excel Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33160 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33159 | Microsoft SharePoint Server Spoofing Vulnerability |
Jul 11, 2023 | CVE-2023-33158 | Microsoft Excel Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33157 | Microsoft SharePoint Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33156 | Microsoft Defender Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-33155 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-33154 | Windows Partition Management Driver Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-33134 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33127 | .NET and Visual Studio Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-29347 | Windows Admin Center Spoofing Vulnerability |
Jul 11, 2023 | ADV230001 | Guidance on Microsoft Signed Drivers Being Used Maliciously |
Jul 11, 2023 | CVE-2023-21526 | Windows Netlogon Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-36884 | Office and Windows HTML Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-36874 | Windows Error Reporting Service Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-36872 | VP9 Video Extensions Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35367 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35366 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35365 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35364 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35363 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35362 | Windows Clip Service Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35361 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35360 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35358 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35357 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35356 | Windows Kernel Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35353 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35352 | Windows Remote Desktop Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-35351 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35350 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35348 | Active Directory Federation Service Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-35347 | Microsoft Install Service Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35346 | Windows DNS Server Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35345 | Windows DNS Server Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35344 | Windows DNS Server Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35343 | Windows Geolocation Service Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35342 | Windows Image Acquisition Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35341 | Microsoft DirectMusic Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35340 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35339 | Windows CryptoAPI Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35338 | Windows Peer Name Resolution Protocol Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35337 | Win32k Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35336 | Windows MSHTML Platform Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-35333 | MediaWiki PandocUpload Extension Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35332 | Windows Remote Desktop Protocol Security Feature Bypass |
Jul 11, 2023 | CVE-2023-35331 | Windows Local Security Authority (LSA) Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35330 | Windows Extended Negotiation Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35329 | Windows Authentication Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35328 | Windows Transaction Manager Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35326 | Windows CDP User Components Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35325 | Windows Print Spooler Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35324 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35323 | Windows OLE Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35322 | Windows Deployment Services Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35321 | Windows Deployment Services Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35320 | Connected User Experiences and Telemetry Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35319 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35318 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35317 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-35316 | Remote Procedure Call Runtime Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-35315 | Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-35314 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-35313 | Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-32051 | Raw Image Extension Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-32050 | Windows Installer Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-32049 | Windows SmartScreen Security Feature Bypass Vulnerability |
Jul 11, 2023 | ADV230002 | Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules |
Jul 11, 2023 | CVE-2023-32047 | Paint 3D Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-32046 | Windows MSHTML Platform Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-32045 | Microsoft Message Queuing Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-32044 | Microsoft Message Queuing Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-32043 | Windows Remote Desktop Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-32042 | OLE Automation Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32041 | Windows Update Orchestrator Service Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32040 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32039 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32038 | Microsoft ODBC Driver Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-32037 | Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-32035 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-32034 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-32033 | Microsoft Failover Cluster Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33174 | Windows Cryptographic Information Disclosure Vulnerability |
Jul 11, 2023 | CVE-2023-33173 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33172 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33169 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33168 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33167 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33166 | Remote Procedure Call Runtime Denial of Service Vulnerability |
Jul 11, 2023 | CVE-2023-33165 | Microsoft SharePoint Server Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-33153 | Microsoft Outlook Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33152 | Microsoft ActiveX Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33151 | Microsoft Outlook Spoofing Vulnerability |
Jul 11, 2023 | CVE-2023-33150 | Microsoft Office Security Feature Bypass Vulnerability |
Jul 11, 2023 | CVE-2023-33149 | Microsoft Office Graphics Remote Code Execution Vulnerability |
Jul 11, 2023 | CVE-2023-33148 | Microsoft Office Elevation of Privilege Vulnerability |
Jul 11, 2023 | CVE-2023-21756 | Windows Win32k Elevation of Privilege Vulnerability |
Jun 15, 2023 | CVE-2023-29349 | Microsoft ODBC and OLE DB Remote Code Execution Vulnerability |
Jun 15, 2023 | CVE-2023-32028 | Microsoft OLE DB Remote Code Execution Vulnerability |
Jun 15, 2023 | CVE-2023-32027 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Jun 15, 2023 | CVE-2023-32026 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Jun 15, 2023 | CVE-2023-32025 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Jun 15, 2023 | CVE-2023-29356 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
May 9, 2023 | CVE-2023-24932 | Secure Boot Security Feature Bypass Vulnerability |
Nov 8, 2022 | CVE-2022-38023 | Netlogon RPC Elevation of Privilege Vulnerability |
Nov 8, 2022 | CVE-2022-37967 | Windows Kerberos Elevation of Privilege Vulnerability |
Nov 13, 2018 | ADV990001 | Latest Servicing Stack Updates |
Additional Patch & Vulnerability Management Tips
This wraps up the July edition Heimdal®’s Patch Tuesday updates. Since no patching article should be without tips, tricks, and everything in between, here are a couple of things you can try out to shore up your defenses and up your vulnerability management game.
Revert to previous builds
Patching is a trial-and-error process, which means something’s bound to happen at any point in time (e.g., unexpected patch failure, connectivity issues, no mobile control, insufficient privileges, failure to meet regulatory compliance standards, etc.). Ensure that your backups are viable in case you to revert the app(s) to a previous version and/or build.
Vulnerability scanning
Don’t forget to work up a functional vulnerability scanning schedule. The best practice dictates that scanning should occur at least once per month. Don’t forget about documenting your findings.
Automatic patching
Smaller organizations tend to rely on manual patching in order to deploy all relevant improvement-carrying packages. However, things tend to change a bit when you’re in the shoes of an IT admin catering to the needs of hundreds of users. The best way around this issue is, of course, automatic patching.
If configured correctly, an automatic patching solution can ensure timely (and correct) deployment and a low risk of incompatibility. Heimdal®’s Patch & Asset Management can aid you in quickly distributing your patches, regardless if they are OS-specific, 3rd party, proprietary, or UX/UI-oriented.
Back to the drawing board
If you’re managing a team, consider drafting up a list of patching protocols. Include dates, times, Operating Systems, tests, and everything you can think of. Don’t forget to scribble down any modifications made to the software.
Conclusion
This concludes the July edition of Heimdal®’s Patch Tuesday series. Hope you’ve enjoyed it. As always, stay safe, patch your heart out, and keep away from suspicious websites.
If you liked this article, follow us on LinkedIn, Twitter, Facebook, and YouTube for more cybersecurity news and topics.
If you liked this post, you will enjoy our newsletter.
Get cybersecurity updates you’ll actually want to read directly in your inbox.
Original Post URL: https://heimdalsecurity.com/blog/patch-tuesday-july-2023/
Category & Tags: Patch Tuesday Updates – Patch Tuesday Updates
Views: 2