web analytics

Patch Tuesday July 2023 – Microsoft Publishes Bug Fixes for 142 Vulnerabilities – Source: heimdalsecurity.com

Rate this post

Source: heimdalsecurity.com – Author: Vladimir Unterfingher

The second month of summer comes a-calling with a hefty list of bug fixes; throughout July, Microsoft has released no lesst than 142 patches for various types of vulnerabilities, with scores ranging from Important to Critical. Without further ado, here’s what Patch Tuesday July has in stock for us. Enjoy and don’t forget to subscribe to Heimdal®’s newsletter.

Patch Tuesday July 2023 – Highlights

We’ll kick off July’s fix list with CVE-2023-35373; classified as a Mono Authenticode Validation spoofing vulnerability, this defect can potentially allow a threat actor to execute arbitrary code or perform various actions on the victim’s machine via packet spoofing by leveraging a flawed Mono component. The vulnerability has received an official Microsoft fix.

Next on the list is CVE-2023-35305, a Windows Kernel Elevation of Privilege vulnerability. If abused, this defect could grant the threat actor SYSTEM-level privileges. The vulnerability, which previously received a CVSS 3.1.7.8 score of 6.8 (i.e., computed Max Severity Score = “Important”) was fixed during July’s patching bout.

Up next is CVE-2023-35302, a Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution vulnerability. With a CVSS 3.1.7.8 score of 7.7, this defect allows an attacker to remotely execute arbitrary code on the target machine by abusing some defective components associated with PostScript and the PCL6 Class Printer Driver. An official Microsoft patch was made available, alongside several workaround should the patching process fail. The workarounds can be found below.

Method 1: Terminate the Print Spooler Service.

First, determine if the Print Spooler service is running on the machine. To do that, start a Windows PowerShell session (i.e., with administrator rights) and type in the following command: Get-Service -Name Spooler.

To disable the service, type in Stop-Service -Name Spooler – Force, followed by Set-Service -Name Spooler -StartupType Disabled.

Method 2: Using Group Policy to terminate the inbound remote printing service.

Use the method above to determine if the Print Spooler service is running. Consequently, go to Group Policy and access the “Printers” section. You will find under Administrative Templates in the Computer Configuration menu. Scroll down and disable the option “Allows Print Spooler to access client connections.” Don’t forget to restart the Print Spooler service. Otherwise the changes won’t take effect.

Please note that both workarounds can impact printing operations. For instance, after terminating the Print Spooler Service (i.e., method 1), you will no longer be able to print documents remotely or locally. On the other hand, method 2 (i.e. disabling the inbound remote printing service via Group Policy) will disable the server printer service, but local printing will still be available (i.e., only works for directly attacked devices).

The full list of released patches can be reviewed below.

Release Date CVE Number CVE Title
Jul 11, 2023 CVE-2023-36871 Azure Active Directory Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-36868 Azure Service Fabric on Windows Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-36867 Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35374 Paint 3D Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35373 Mono Authenticode Validation Spoofing Vulnerability
Jul 11, 2023 CVE-2023-35335 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Jul 11, 2023 CVE-2023-35312 Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35311 Microsoft Outlook Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-35310 Windows DNS Server Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35309 Microsoft Message Queuing Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35308 Windows MSHTML Platform Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-35306 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35305 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35304 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35303 USB Audio Class System Driver Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35302 Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35300 Remote Procedure Call Runtime Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35299 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35298 HTTP.sys Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35297 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35296 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32085 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32084 HTTP.sys Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-32083 Microsoft Failover Cluster Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32057 Microsoft Message Queuing Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-32056 Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-32055 Active Template Library Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-32054 Volume Shadow Copy Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-32053 Windows Installer Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-32052 Microsoft Power Apps (online) Spoofing Vulnerability
Jul 11, 2023 CVE-2023-33171 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Jul 11, 2023 CVE-2023-33170 ASP.NET and Visual Studio Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-33164 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33163 Windows Network Load Balancing Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33162 Microsoft Excel Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-33161 Microsoft Excel Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33160 Microsoft SharePoint Server Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33159 Microsoft SharePoint Server Spoofing Vulnerability
Jul 11, 2023 CVE-2023-33158 Microsoft Excel Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33157 Microsoft SharePoint Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33156 Microsoft Defender Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-33155 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-33154 Windows Partition Management Driver Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-33134 Microsoft SharePoint Server Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33127 .NET and Visual Studio Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-29347 Windows Admin Center Spoofing Vulnerability
Jul 11, 2023 ADV230001 Guidance on Microsoft Signed Drivers Being Used Maliciously
Jul 11, 2023 CVE-2023-21526 Windows Netlogon Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-36874 Windows Error Reporting Service Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-36872 VP9 Video Extensions Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35367 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35366 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35365 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35364 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35363 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35362 Windows Clip Service Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35361 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35360 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35358 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35357 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35356 Windows Kernel Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35353 Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35352 Windows Remote Desktop Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-35351 Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35350 Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35348 Active Directory Federation Service Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-35347 Microsoft Install Service Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35346 Windows DNS Server Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35345 Windows DNS Server Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35344 Windows DNS Server Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35343 Windows Geolocation Service Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35342 Windows Image Acquisition Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35341 Microsoft DirectMusic Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35340 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35339 Windows CryptoAPI Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35338 Windows Peer Name Resolution Protocol Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35337 Win32k Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35336 Windows MSHTML Platform Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-35333 MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35332 Windows Remote Desktop Protocol Security Feature Bypass
Jul 11, 2023 CVE-2023-35331 Windows Local Security Authority (LSA) Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35330 Windows Extended Negotiation Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35329 Windows Authentication Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35328 Windows Transaction Manager Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35326 Windows CDP User Components Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35325 Windows Print Spooler Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35324 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35323 Windows OLE Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35322 Windows Deployment Services Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35321 Windows Deployment Services Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35320 Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35319 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35318 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35317 Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-35316 Remote Procedure Call Runtime Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-35315 Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-35314 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-35313 Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-32051 Raw Image Extension Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-32050 Windows Installer Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-32049 Windows SmartScreen Security Feature Bypass Vulnerability
Jul 11, 2023 ADV230002 Microsoft Guidance for Addressing Security Feature Bypass in Trend Micro EFI Modules
Jul 11, 2023 CVE-2023-32047 Paint 3D Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-32046 Windows MSHTML Platform Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-32045 Microsoft Message Queuing Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-32044 Microsoft Message Queuing Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-32043 Windows Remote Desktop Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-32042 OLE Automation Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32041 Windows Update Orchestrator Service Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32040 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32039 Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32038 Microsoft ODBC Driver Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-32037 Windows Layer-2 Bridge Network Driver Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-32035 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-32034 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-32033 Microsoft Failover Cluster Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33174 Windows Cryptographic Information Disclosure Vulnerability
Jul 11, 2023 CVE-2023-33173 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33172 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33169 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33168 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33167 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33166 Remote Procedure Call Runtime Denial of Service Vulnerability
Jul 11, 2023 CVE-2023-33165 Microsoft SharePoint Server Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-33153 Microsoft Outlook Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33152 Microsoft ActiveX Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33151 Microsoft Outlook Spoofing Vulnerability
Jul 11, 2023 CVE-2023-33150 Microsoft Office Security Feature Bypass Vulnerability
Jul 11, 2023 CVE-2023-33149 Microsoft Office Graphics Remote Code Execution Vulnerability
Jul 11, 2023 CVE-2023-33148 Microsoft Office Elevation of Privilege Vulnerability
Jul 11, 2023 CVE-2023-21756 Windows Win32k Elevation of Privilege Vulnerability
Jun 15, 2023 CVE-2023-29349 Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
Jun 15, 2023 CVE-2023-32028 Microsoft OLE DB Remote Code Execution Vulnerability
Jun 15, 2023 CVE-2023-32027 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Jun 15, 2023 CVE-2023-32026 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Jun 15, 2023 CVE-2023-32025 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Jun 15, 2023 CVE-2023-29356 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
May 9, 2023 CVE-2023-24932 Secure Boot Security Feature Bypass Vulnerability
Nov 8, 2022 CVE-2022-38023 Netlogon RPC Elevation of Privilege Vulnerability
Nov 8, 2022 CVE-2022-37967 Windows Kerberos Elevation of Privilege Vulnerability
Nov 13, 2018 ADV990001 Latest Servicing Stack Updates

Additional Patch & Vulnerability Management Tips

This wraps up the July edition Heimdal®’s Patch Tuesday updates. Since no patching article should be without tips, tricks, and everything in between, here are a couple of things you can try out to shore up your defenses and up your vulnerability management game.

Revert to previous builds

Patching is a trial-and-error process, which means something’s bound to happen at any point in time (e.g., unexpected patch failure, connectivity issues, no mobile control, insufficient privileges, failure to meet regulatory compliance standards, etc.). Ensure that your backups are viable in case you to revert the app(s) to a previous version and/or build.

Vulnerability scanning

Don’t forget to work up a functional vulnerability scanning schedule. The best practice dictates that scanning should occur at least once per month. Don’t forget about documenting your findings.

Automatic patching

Smaller organizations tend to rely on manual patching in order to deploy all relevant improvement-carrying packages. However, things tend to change a bit when you’re in the shoes of an IT admin catering to the needs of hundreds of users. The best way around this issue is, of course, automatic patching.

If configured correctly, an automatic patching solution can ensure timely (and correct) deployment and a low risk of incompatibility. Heimdal®’s Patch & Asset Management can aid you in quickly distributing your patches, regardless if they are OS-specific, 3rd party, proprietary, or UX/UI-oriented.

Back to the drawing board

If you’re managing a team, consider drafting up a list of patching protocols. Include dates, times, Operating Systems, tests, and everything you can think of. Don’t forget to scribble down any modifications made to the software.

Conclusion

This concludes the July edition of Heimdal®’s Patch Tuesday series. Hope you’ve enjoyed it. As always, stay safe, patch your heart out, and keep away from suspicious websites.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

If you liked this post, you will enjoy our newsletter.

Get cybersecurity updates you’ll actually want to read directly in your inbox.

Original Post URL: https://heimdalsecurity.com/blog/patch-tuesday-july-2023/

Category & Tags: Patch Tuesday Updates – Patch Tuesday Updates

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts