Tripwire Patch Priority Index for August 2019

Tripwire Patch Priority Index for August 2019
Tripwire’s August 2019 Patch Priority Index (PPI) brings together important security vulnerabilities from Microsoft and Adobe.First on the Patch Priority Index are patches for Microsoft’s Browser and Scripting Engine. These patches resolve 12 vulnerabilities including fixes for memory corruption, information disclosure and security feature bypass vulnerabilities.Next on the PPI are patches for Microsoft Outlook and Word. These patches resolve four vulnerabilities including fixes for remove code execution and elevation of privilege vulnerabilities.Up next on the Patch Priority Index are fixes for Adobe Acrobat and Reader (APSB19-41). These patches resolve 76 vulnerabilities that address issues for out of bounds read, out of bounds write, command injection, use after free, heap overflow, buffer error, double free, integer overflow, internal IP disclosure, type confusion and untrusted pointer dereference vulnerabilities.There are also patches for Microsoft Windows on the PPI. These patches address numerous vulnerabilities across Windows Kernel, GDI, Microsoft Graphics, Remote Desktop, MS XML, Windows Subsystem for Linux, NTFS, VBScript, XmlLite Runtime, Hyper-V, DHCP client, DirectX and Jet Database Engine. These updates fix 62 vulnerabilities including elevation of privilege, information disclosure, security feature bypass, denial of service and remote code execution vulnerabilities.Lastly on this month’s Patch Priority Index, administrators should focus on server-side patches available for Microsoft SharePoint, Windows DHCP, Windows HTTP/2 and Microsoft Dynamics Server. These patches resolve 11 vulnerabilities including cross-site scripting (XSS), elevation of privilege, denial of service, remote code execution and information disclosure vulnerabilities. To learn more about Tripwire’s Vulnerability and Exposure Research Team (VERT), including its Patch Priority Index, click here.Or you can follow VERT on Twitter: @tripwirevert.

Support the originator by clicking the read the rest link below.