<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/brian-secrist/rss" /><link>https://www.ivanti.com/blog/authors/brian-secrist</link><item><guid isPermaLink="false">e52f4995-d4f6-476e-bc97-e8a6b563ae57</guid><link>https://www.ivanti.com/blog/patching-in-review-may-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – May 2020</title><description>&lt;p&gt;With June Patch Tuesday in full swing, let’s take a moment and look back at the last month of developments in the wonderful world of patching. Before we begin our upcoming analysis of this month’s releases, let’s reflect on the news from May. As always, be sure to join us on Wednesday, June 10, for our &lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday" target="_blank"&gt;June Patch Tuesday analysis&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Microsoft News&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/may-12-2020-kb4556799-os-builds-18362-836-and-18363-836-expired-f9db0abf-1b6c-7f35-5f80-8635f5b34d57" target="_blank" rel="noopener"&gt;KB4556799&lt;/a&gt; for Windows 10 1903 and 1909 was littered with issues ranging from &lt;a href="https://www.windowslatest.com/2020/05/25/windows-10-kb4556799-causes-bsod-and-network-issues/" target="_blank" rel="noopener"&gt;BSOD crashes&lt;/a&gt; and &lt;a href="https://www.bleepingcomputer.com/news/microsoft/latest-windows-10-updates-breaks-wireless-lte-connectivity/" target="_blank" rel="noopener"&gt;broken LTE connectivity&lt;/a&gt; to &lt;a href="https://www.bleepingcomputer.com/news/microsoft/windows-10-kb4556799-update-wont-install-has-audio-issues-bugs/" target="_blank" rel="noopener"&gt;installation failures and audio issues&lt;/a&gt;. While Microsoft stated it was looking into issues mid-month, we did not see any non-security updates for the month. Here’s hoping June goes more smoothly.&lt;/li&gt;
	&lt;li&gt;Windows 10 2004 is finally out at the end of May, but not without its concerns. Before you begin rolling out this update, keep an eye on Microsoft’s &lt;a href="https://learn.microsoft.com/en-us/windows/release-health/" target="_blank" rel="noopener"&gt;2004 status page&lt;/a&gt; to see active issues (currently 10 active bugs as I write this).&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Security Round-Up&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The wormable SMBv3 Windows 1903/1909 vulnerability disclosed in March 2020 under &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796" target="_blank" rel="noopener"&gt;CVE-2020-0796&lt;/a&gt; has confirmed reports of active exploitation according to &lt;a href="https://www.us-cert.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" target="_blank" rel="noopener"&gt;CISA&lt;/a&gt;. This vulnerability, which earned the moniker “SMBGhost” or “EternalDarkness”, allows an unauthenticated attacker to execute arbitrary code on an endpoint. Given the lack of authentication and privilege necessary for a successful attack, this can spread through an unpatched network with ease.&lt;/li&gt;
	&lt;li&gt;Reverse RDP attacks are coming back for a third round with confirmation that there still exists a vulnerability in this protocol for all versions of Windows. When exploited, an attacker can gain access to read and write to the system’s files. For background, this was initially patched in July 2019 under &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0887" target="_blank" rel="noopener"&gt;CVE-2019-0887&lt;/a&gt;, then patched again in February 2020 under &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0655" target="_blank" rel="noopener"&gt;CVE-2020-0655&lt;/a&gt; due to a discovered bypass. Discovered by &lt;a href="https://research.checkpoint.com/2020/reverse-rdp-the-path-not-taken/" target="_blank" rel="noopener"&gt;Check Point Research&lt;/a&gt;, although the RDP client built into Windows is fixed, the API is still vulnerable, leaving any 3&lt;sup&gt;rd&lt;/sup&gt; party RDP solution exposed to this attack.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Google Chrome took the lion’s share of CVEs for the month with a total of 33 vulnerabilities patched between two security releases under &lt;a href="https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html" target="_blank" rel="noopener"&gt;83.0.4103.61&lt;/a&gt; and &lt;a href="https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html" target="_blank" rel="noopener"&gt;83.0.4103.97&lt;/a&gt;. Microsoft Edge (Chromium) also released shortly after each patch under their own &lt;a href="https://msrc.microsoft.com/en-us/security-guidance/advisory/ADV200002" target="_blank" rel="noopener"&gt;advisory page&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Firefox released &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/" target="_blank" rel="noopener"&gt;Version 77&lt;/a&gt; covering only 7 vulnerabilities with only two of them affecting the corresponding &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2020-21/" target="_blank" rel="noopener"&gt;ESR release&lt;/a&gt;. Nearing the tail end of the month, Mozilla also released &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2020-22/" target="_blank" rel="noopener"&gt;Thunderbird 68.9.0&lt;/a&gt; to remediate the shared CVEs.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 09 Jun 2020 21:53:37 Z</pubDate></item><item><guid isPermaLink="false">98dbad3b-2156-4b87-a9cc-ce86c6412407</guid><link>https://www.ivanti.com/blog/patching-in-review-week-6-of-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 6 of 2020</title><description>&lt;p&gt;It’s hard to believe the second Patch Tuesday of the year is around the corner. With an IE zero-day still expected to be fixed, let us hope that we find ourselves with a smooth rollout. Make sure to tune in to our &lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday" target="_blank"&gt;Patch Tuesday webinar&lt;/a&gt; next week where we analyze the vulnerabilities and known issues from Microsoft for the month.&lt;/p&gt;

&lt;p&gt;In the news, Microsoft delivered with final updates this week for Windows 7 and Server 2008 R2. This fix comes after a nasty wallpaper bug where the background would be replaced by a black screen. Surprisingly, a standalone fix under &lt;a href="https://support.microsoft.com/en-us/topic/wallpaper-set-to-stretch-is-displayed-as-black-in-windows-7-sp1-and-server-2008-r2-sp1-3f58441f-12bd-446b-8ae3-caee76d7b09d" target="_blank" rel="noopener"&gt;KB4539602&lt;/a&gt; as well as a Monthly Rollup preview under &lt;a href="https://support.microsoft.com/en-us/topic/january-31-2020-kb4539601-preview-of-monthly-rollup-1768e5a4-04bc-e964-a7a7-9509f91b0d1f" target="_blank" rel="noopener"&gt;KB4539601&lt;/a&gt; have been released to remediate the wallpaper bug.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Google Chrome released a new major version this week with a total of 56 security fixes and 38 CVEs. &lt;a href="https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html" target="_blank" rel="noopener"&gt;Version 80.0.3987.87&lt;/a&gt; released on Tuesday with 10 of the vulnerabilities acquiring a High severity. Expect a corresponding release for Microsoft’s Edge browser as it is now based on the chromium engine.&lt;/p&gt;

&lt;p&gt;Node.JS released their &lt;a href="https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/" target="_blank" rel="noopener"&gt;February security updates&lt;/a&gt; for version 10, 12 and 13 with a total of 3 CVEs. The most notable vulnerability has been assigned CVE-2019-15605 with a Critical severity. &lt;a href="https://snyk.io/blog/node-js-release-fixes-a-critical-http-security-vulnerability/" target="_blank" rel="noopener"&gt;Synk.io&lt;/a&gt; wrote a great article detailing this vulnerability where unpatched versions can fall victim to an HTTP smuggling attack.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;The final week before Patch Tuesday ended with a relatively light release. See the list of non-securities below to prepare for your next cycle.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Box Drive 2.11.46&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BOXD-200114&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBOXD21146&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Dropbox 90.4.307&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-200204&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX904307&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Evernote 6.23.2.8859&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ENOT-200206&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QENOT62328859&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.21.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-200205&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1010211&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.21.5&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-200207&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1010215&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 66.0.3515.72&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-200205&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP660351572&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PeaZip 7.1.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PZIP-200203&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPZIP710&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.50.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-200205&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2500&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RealVNC Server 6.7.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RVNC-200207&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRVNC671&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Royal TS 5.02.60204.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RTS5-200204&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRTS502602040&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Royal TS 5.02.60207.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RTS5-200207&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRTS502602070&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.42.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS20-0207-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE142&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;div&gt;&lt;/div&gt;
</description><pubDate>Fri, 07 Feb 2020 23:43:38 Z</pubDate></item><item><guid isPermaLink="false">212b3b89-3e9d-43ca-8691-452c2d6292c4</guid><link>https://www.ivanti.com/blog/patching-in-review-week-5-of-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 5 of 2020</title><description>&lt;p&gt;The echoes of Patch Tuesday past and anticipation of our next patch week are the themes here with Microsoft staying in the spotlight and Apple keeping things interesting this week.&lt;/p&gt;

&lt;p&gt;It looks like the pesky wallpaper bug on Windows 7 from the final security release will indeed see a post end of life update for not just extended support customers, but all customers! The known issue listed in &lt;a href="https://support.microsoft.com/en-us/topic/january-14-2020-kb4534310-monthly-rollup-9ce32b1b-77ef-9a17-7ecb-2bcebcaa9ff5" target="_blank" rel="noopener"&gt;KB4534310&lt;/a&gt; was just updated with an anticipated resolution in the coming week.&lt;/p&gt;

&lt;p&gt;Mentioned in last week’s post, Microsoft released an advisory detailing a zero-day vulnerability that has yet to be patched but offered a workaround. According to &lt;a href="https://www.bleepingcomputer.com/news/security/microsofts-ie-zero-day-fix-is-breaking-windows-printing/" target="_blank" rel="noopener"&gt;BleepingComputer&lt;/a&gt;, this temporary fix is currently breaking windows printing with other unforeseen issues such as sfc failing when jscript.dll is read for integrity. It doesn’t look like we will see an out of band patch before February’s security release, so many environments may have to wait until then.&lt;/p&gt;

&lt;p&gt;To play a bit of catch up, I’m coming in with the whole month of January. Please see the other articles below to get prepared for February’s patch week!&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-1-of-2020" target="_blank"&gt;Week 1&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-2-of-2020" target="_blank"&gt;Week 2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-3-of-2020" target="_blank"&gt;Week 3&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-4-of-2020"&gt;Week 4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Apple released updates for their &lt;a href="https://support.apple.com/en-us/103755" target="_blank" rel="noopener"&gt;iTunes&lt;/a&gt; and &lt;a href="https://support.apple.com/en-us/103757" target="_blank" rel="noopener"&gt;iCloud&lt;/a&gt; applications on Windows with a total of 8 vulnerabilities shared between the two. The most severe vulnerability is awarded to CVE-2020-3825, CVE-2020-3868, and CVE-2020-3865 with a CVSSv3 score estimated at 8.8. All 3 vulnerabilities could lead to arbitrary code execution if malicious web content were to be accessed.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;See the list of additional third-party updates below from our supported vendors to keep your environments up to date.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Drive File Stream 36.0.18.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GDFS-200130&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFS360180&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 10.7.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-200131&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM1070&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LibreOffice 6.4.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LIBRE64-200129&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLIBRE6403&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Notepad++ 7.8.4&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NPPP-200130&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNPPP784&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 66.0.3515.60&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-200130&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP660351560&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.5.2309&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-200129&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11852309&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.4.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK20194-200131&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201943&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Prep Builder 2020.1.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABPREPB20-200131&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABPREPB202012&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Reader 2019.4.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABREAD20194-200131&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABREAD201943&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 15.2.2756&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW15-200129&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW1522756&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VirtualBox 6.0.16&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OVB60-200130&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOVB6016&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 31 Jan 2020 23:36:20 Z</pubDate></item><item><guid isPermaLink="false">98046a85-f441-4332-88b7-a79fbced76e3</guid><link>https://www.ivanti.com/blog/patching-in-review-week-4-of-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 4 of 2020</title><description>&lt;p&gt;We just wrapped up the first patch week of the year, and Microsoft is keeping things interesting with a newly announced IE zero-day vulnerability, but with no patch. According to &lt;a href="https://msrc.microsoft.com/en-us/security-guidance/advisory/ADV200001" target="_blank" rel="noopener"&gt;Microsoft’s advisory&lt;/a&gt;, there are limited active attacks against CVE-2020-0674 where a malicious website could allow an attacker access to the system. For a temporary, but risky fix, Microsoft has provided a workaround within the advisory jscript would need to be restricted on the endpoint.&lt;/p&gt;

&lt;p&gt;This might be the end of Windows 7 servicing, but Microsoft left us with a final present. It appears the final security update is &lt;a href="https://www.bleepingcomputer.com/news/microsoft/final-windows-7-update-breaks-desktop-wallpaper-functionality/" target="_blank" rel="noopener"&gt;breaking desktop wallpaper&lt;/a&gt; of all things, leaving a black background instead. Currently there’s no word whether Microsoft will provide a non-security fix, or if the unlucky users are stuck with this bug on their unsupported OS.&lt;/p&gt;

&lt;p&gt;To play a bit of catch up, I’m coming in with the whole month of January. Please see the other articles below to get prepared for February’s patch week!&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-1-of-2020" target="_blank"&gt;Week 1&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-2-of-2020" target="_blank"&gt;Week 2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-3-of-2020" target="_blank"&gt;Week 3&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-5-of-2020" target="_blank"&gt;Week 5&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Snagit was the only security release from our vendors this week with a single vulnerability. Version 2018.2.5 covers &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2019-5100" target="_blank" rel="noopener"&gt;CVE-2019-5100&lt;/a&gt; where their third-party BMP library could be used to execute arbitrary code on the system.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Even though we took a break this week in security releases, this non-security list is more than enough. See the summary of our additional patches for the week below.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Flash Player 32.0.0.321&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AFP32-200121&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAF3200321&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Camtasia 2019.0.9&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CAMTA19-200121&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCAMTASIA1909&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Dropbox 89.4.278&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-200123&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX894278&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Falcon sensor for Windows 5.24.10609&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CSFS-200122&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFS52410609&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM Player 2.3.49.5312&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM-200128&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGOM23495312&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.20.7&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1010207&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Backup and Sync 3.48.8668.1933&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GSYNC-200127&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGBS34886681933&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 13.7.0 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-200122&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC1370&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 66.0.3515.44&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-200122&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP660351544&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.49.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-200122&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2490&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Slack Machine-Wide Installer 4.3.2.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SMWI-200122&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSLACK4320&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2018.3.14&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK20183-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK2018314&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.1.12&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK20191-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK2019112&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.2.8&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK20192-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201928&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.3.4&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK20193-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201934&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.4.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK20194-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201942&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Reader 2019.4.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABREAD20194-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABREAD201942&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Thunderbird 68.4.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TB-200124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTB6842&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WinZip 23.0.13431&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WZ23-200128&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWZ23013431&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Client 4.6.17409.120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOM-200121&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOM4617409&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 24 Jan 2020 23:30:06 Z</pubDate></item><item><guid isPermaLink="false">4acdfbf7-de6c-47fb-8a35-e69899458085</guid><link>https://www.ivanti.com/blog/patching-in-review-week-3-of-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 3 of 2020</title><description>&lt;p&gt;What ever happened to the boring first Patch Tuesday of the year? Between the notorious CryptoAPI spoofing vulnerability and Oracle’s quarterly release, there is almost too much to cover! Without further ado, let’s get into this very dense week.&lt;/p&gt;

&lt;p&gt;As always, here are the quick links to stay up to date on any developing known issues:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059" target="_blank" rel="noopener"&gt;Windows 10 / Server 2019 / Server 2016&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6" target="_blank" rel="noopener"&gt;Windows 8.1 / Server 2012 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd" target="_blank" rel="noopener"&gt;Server 2012&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history-720c2590-fd58-26ba-16cc-6d8f3b547599" target="_blank" rel="noopener"&gt;Windows 7 / Server 2008 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2008-sp2-update-history-9197740a-7430-f69f-19ff-4998a4e8b25b" target="_blank" rel="noopener"&gt;Server 2008&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To play a bit of catch up, I’m coming in with the whole month of January. Please see the other articles below to get prepared for February’s patch week!&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-1-of-2020" target="_blank"&gt;Week 1&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-2-of-2020" target="_blank"&gt;Week 2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-4-of-2020" target="_blank"&gt;Week 4&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-5-of-2020" target="_blank"&gt;Week 5&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Patch Tuesday Follow-up&lt;/h2&gt;

&lt;p&gt;As mentioned earlier, January is usually a very mundane Patch Tuesday. With a traditionally small patch count and short vulnerability list, no one was expecting the &lt;a href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF" target="_blank" rel="noopener"&gt;NSA disclosure&lt;/a&gt; to come out the day before.&lt;/p&gt;

&lt;p&gt;Microsoft has since released patches for this alarming vulnerability, but security researchers have continued diving into the vulnerability with new developments. BleepingComputer has 2 great articles covering the CryptoAPI vulnerability for the week.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/pocs-for-windows-cryptoapi-bug-are-out-show-real-life-exploit-risks/" target="_blank" rel="noopener"&gt;Proof of concepts&lt;/a&gt; have already come out 2 days after the respective patches were released where the researcher spoofed the github certificate on a compromised system.&lt;/li&gt;
	&lt;li&gt;As a refresher, an additional article was written &lt;a href="https://www.bleepingcomputer.com/news/security/how-malware-gains-trust-by-abusing-the-windows-cryptoapi-flaw/" target="_blank" rel="noopener"&gt;explaining the chain of trust&lt;/a&gt; that is compromised in this attack.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally, we were all surprised this week to see an addition to the Windows 7 Monthly Rollup, which now will show &lt;a href="https://www.bleepingcomputer.com/news/microsoft/windows-7-begins-to-show-full-screen-windows-10-upgrade-alerts/" target="_blank" rel="noopener"&gt;unwanted upgrade alerts&lt;/a&gt;. Fortunately, there is a simple registry key to disable the nuisance.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Outside of Microsoft, there are more 3&lt;sup&gt;rd&lt;/sup&gt; party security patches than it’s even possible to talk about. Let’s cover this with h a quick rapid-fire summary:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The &lt;a href="https://www.oracle.com/security-alerts/cpujan2020.html" target="_blank" rel="noopener"&gt;January 2020 CPU&lt;/a&gt; (Critical Patch Update) released on the same day as Patch Tuesday. For our patching content, this includes security fixes for Java 8 and 11, VirtualBox 5 and 6, as well as the related OpenJDK solutions such as Amazon Corretto.&lt;/li&gt;
	&lt;li&gt;VMware Tools 11.0.5 released with CVE-2020-3941 under &lt;a href="https://www.vmware.com/security/advisories/VMSA-2020-0002.html" target="_blank" rel="noopener"&gt;VMSA-2020-0002&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Google Chrome released &lt;a href="https://chromereleases.googleblog.com/2020/01/stable-channel-update-for-desktop_16.html" target="_blank" rel="noopener"&gt;version 79.0.3945.130&lt;/a&gt; with a rare critical vulnerability under CVE-2020-6378.&lt;/li&gt;
	&lt;li&gt;Foxit released version 9.7.1 for &lt;a href="https://www.foxit.com/support/security-bulletins.html" target="_blank" rel="noopener"&gt;Reader and PhantomPDF&lt;/a&gt; with numerous CVEs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s safe to say this will be a very substantial patching cycle for everyone! Make sure to include the patches above in your weekend push.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Aside from the dizzying amount of security updates, there was an equally large amount of non-securities for the week. See the list below to include in this 3&lt;sup&gt;rd&lt;/sup&gt;-party-heavy patch week.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Flash Player 32.0.0.314&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AFP32-200114&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAF3200314&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP 4.60.2170&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP-200114&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAIMP4602170&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Falcon sensor for Windows 5.23.10504&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CSFS-200115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFS52310504&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Firefox 72.0.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FF-200120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFF7202&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Firefox ESR 68.4.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FFE-200120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFFE6842&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GIT for windows 2.25.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GIT-200114&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGIT2250&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM Player 2.3.49.5311&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM-200114&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGOM23495311&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.19.5&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-200113&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1010195&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 10.6.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-200120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM1061&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;KeePass Classic 1.38.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;KEEPC-200113&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QKPC138&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;KeePass Pro 2.44&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;KEEP-200120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QKPP244&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Notepad++ 7.8.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NPPP-200116&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNPPP783&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 66.0.3515.36&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-200116&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP660351536&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RealVNC Server 6.7.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RVNC-200116&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRVNC670&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RealVNC Viewer 6.20.113&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VNCV-200116&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVNCV620113&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Prep Builder 2020.1.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABPREPB20-200115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABPREPB202011&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 11.3.27434&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW11-200113&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW11327434&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 12.3.27435&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW12-200115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW12327435&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 13.2.36217&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW13-200115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW13236217&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 14.7.13736&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW14-200115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW14713736&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 15.1.3937&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW15-200115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW1513937&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Wireshark 2.6.14&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WIRES26-200116&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWIRES2614&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Outlook Plugin 4.8.17303.0117&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOMOUT-200120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOMO4817303&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 17 Jan 2020 23:22:02 Z</pubDate></item><item><guid isPermaLink="false">ee6c990d-fb20-4a40-80ec-ce9766cf977a</guid><link>https://www.ivanti.com/blog/patching-in-review-week-2-of-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 2 of 2020</title><description>&lt;p&gt;This week we can christen 2020 with our fist zero-day! Other patching news has been relatively quiet this week so let’s get to it.&lt;/p&gt;

&lt;p&gt;To play a bit of catch up, I’m coming in with the whole month of January. Please see the other articles below to get prepared for February’s patch week!&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-1-of-2020" target="_blank"&gt;Week 1&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-3-of-2020" target="_blank"&gt;Week 3&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-4-of-2020" target="_blank"&gt;Week 4&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-5-of-2020" target="_blank"&gt;Week 5&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;The highest profile releases this week are awarded to Firefox with not just one, but two releases including a zero day! Firefox and Firefox ESR initially released under version 72.0 and 68.4.0, but the next day released 72.1 and 68.4.1. The actively exploited vulnerability, CVE-2019-17206, details a flaw in the IonMonkey JIT compiler where an attacker can execute code within the application sandbox. This update comes 7 months after the Mozilla’s last patch containing a &lt;a href="https://blog.coinbase.com/responding-to-firefox-0-days-in-the-wild-d9c85a57f15b?gi=809b63f541b3" target="_blank" rel="noopener"&gt;pair of zero-day vulnerabilities&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;The second week of the year has proven to be far more active with a substantial list of non-security patches. Review the list below for any patches relevant to your environment.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP 4.60.2169&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP-200109&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAIMP4602169&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BlueJeans 2.18.39.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;JEANS-200106&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBJN218390&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Cumulative Update 1 for SQL Server 2019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SQL2019-CU01&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Q4527376&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Dropbox 88.4.172&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-200107&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX884172&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Backup and Sync 3.47.8667.1399&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GSYNC-200109&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGBS34786671399&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Chrome 79.0.3945.117&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CHROME-200107&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGC7903945117&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 10.18.1 (LTS Lower)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSLL-200109&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSLL10181&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.14.1 (LTS Upper)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSLU-200108&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSLU12141&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 13.6.0 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-200108&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC1360&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 66.0.3515.27&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-200108&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP660351527&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDF-Xchange PRO 8.0.336.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDFX-200107&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPDFX803360&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.48.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-200108&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2480&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.4.2171&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-200107&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11842171&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Snagit 2020.1.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SNAG20-200107&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSNAG2010&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Thunderbird 68.4.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;THUNDERBIRD-200110&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTB6841&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 10 Jan 2020 23:11:28 Z</pubDate></item><item><guid isPermaLink="false">c435746d-dece-4e08-96a2-4321701a6fd9</guid><link>https://www.ivanti.com/blog/patching-in-review-week-1-of-2020</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 1 of 2020</title><description>&lt;p&gt;Happy New Year, everyone! After a holiday hiatus, I’m back to talk about the riveting world of patching.&lt;/p&gt;

&lt;p&gt;BleepingComputer kicks off the year with a reminder of the upcoming &lt;a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-products-reaching-end-of-life-in-2020/" target="_blank" rel="noopener"&gt;Microsoft products reaching end of life&lt;/a&gt;. Most notable of course is Windows 7 and Server 2008 R2 with January Patch Tuesday being the final set of patches (aside from the extended support updates). Office 2010 is also on the chopping block this year, with support ending after October Patch Tuesday, so make sure to stay aware of this ubiquitous software.&lt;/p&gt;

&lt;p&gt;To play a bit of catch up, I’m coming in with the whole month of January. Please see the other articles below to get prepared for February’s patch week:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-2-of-2020" target="_blank"&gt;Week 2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-3-of-2020" target="_blank"&gt;Week 3&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-4-of-2020" target="_blank"&gt;Week 4&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/patching-in-review-week-5-of-2020" target="_blank"&gt;Week 5&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Surprisingly enough, we had a security release from GIT for Windows, one of our newly supported products! This release includes the security fixes from &lt;a href="https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u" target="_blank" rel="noopener"&gt;GIT 2.24.1&lt;/a&gt; as well as CVE-2018-19604 which is unique to this Windows client. Most of these CVEs are classified as “High” severity, with five of the vulnerabilities assigned a CVSSv3 score of 8.8, so make sure to roll out this update with urgency.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;As expected, the patching world was very quiet this week, with only a few additional updates released by our supported vendors. See the list below in case there was an update you were waiting for:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP 4.60.2167&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP-021&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAIMP4602167&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.18.8&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-200102&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1010188&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PeaZip 7.0.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PZIP-021&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPZIP701&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 03 Jan 2020 23:04:20 Z</pubDate></item><item><guid isPermaLink="false">53a574d9-8587-41db-b8ef-a4160efdb970</guid><link>https://www.ivanti.com/blog/patching-in-review-week-47-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><title>Patching in Review – Week 47 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;Fallout from Patch Tuesday rolled into this week with Microsoft announcing a new issue surrounding Access databases. According to &lt;a href="https://support.microsoft.com/en-us/office/access-error-query-is-corrupt-fad205a5-9fd4-49f1-be83-f21636caedec?ui=en-us&amp;amp;rs=en-us&amp;amp;ad=us" target="_blank" rel="noopener"&gt;Microsoft’s support article&lt;/a&gt;, after systems were updated with specific Microsoft Office November Patch Tuesday patches, the end user would get an error stating “Query is Corrupt” in all versions of Access. As of writing this, Microsoft has released &lt;a href="https://support.microsoft.com/en-us/topic/november-18-2019-update-for-office-2016-kb4484198-9f823ebe-2333-a4d4-5957-7ff82375827d" target="_blank" rel="noopener"&gt;KB4484198&lt;/a&gt; for Office 2016 MSI instances, but has yet to release updates for 2010 and 2013 installations. Interestingly enough, there was a release for &lt;a href="https://learn.microsoft.com/en-us/officeupdates/update-history-microsoft365-apps-by-date" target="_blank" rel="noopener"&gt;all branches of O365&lt;/a&gt; at the end of the week, but no documentation currently reflects the fix.&lt;/p&gt;

&lt;p&gt;In the news, numerous security vulnerabilities have been found in four popular VNC titles. According to &lt;a href="https://thehackernews.com/2019/11/vnc-remote-software-hacking.html" target="_blank" rel="noopener"&gt;The Hacker News&lt;/a&gt;, Kaspersky discovered a total of 37 vulnerabilities throughout the products, some of which have existed over the last 20 years. Many of these vulnerabilities, if exploited, could lead to the attacker gaining control of the system where arbitrary commands could be executed on the endpoint. UltraVNC topped the list with a massive 22 vulnerabilities alone. Keep an eye out for releases on these software titles soon so your affected environments can be protected as soon as possible.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Google released a security update for its Chrome browser under version &lt;a href="https://chromereleases.googleblog.com/2019/11/stable-channel-update-for-desktop_18.html" target="_blank" rel="noopener"&gt;78.0.3904.108&lt;/a&gt;, with a total of five security fixes. Two of the security fixes were assigned CVEs with “High” severity where an attacker could leverage the Bluetooth functionality to execute arbitrary code on the system. Let’s just hope this update doesn’t have any &lt;a href="https://www.theverge.com/2019/11/15/20966237/google-chrome-white-tab-screen-crash-experiment-it-admins" target="_blank" rel="noopener"&gt;experimental features&lt;/a&gt; enabled on it like the last Chrome release!&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;There might have only been a single security release for the week, but that’s far from all the updates we released in our content. Here’s a list of the non-security patches over this week to take note of:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apache Tomcat 8.5.49.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOMCAT-147&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOMCAT85490&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apache Tomcat 9.0.29.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOMCAT-148&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOMCAT90290&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Audacity 2.3.3.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AUDACITY-233&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAUD2330&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CDBurnerXP 4.5.8.7128&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CDBXP-049&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCDBXP4587128&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CoreFTP LE 2.2.1947&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;COREFTP-041&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCFTP221947&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM Player 2.3.47.5309&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM-032&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGOM23475309&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.75.5649.801&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-073&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2755649801&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.13.1 (LTS Upper)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSLU-013&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSLU12131&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 13.2.0 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-029&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC1320&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 65.0.3467.48&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-239&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP650346748&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Royal TS 5.01.61114.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RTS5-009&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRTS501611140&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Snagit 2020.0.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SNAG-032&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSNAG2002&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.1.10&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2019-021&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK2019110&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.2.6&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2019-020&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201926&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.3.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2019-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201932&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 15.0.8397&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-059&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW1508397&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TreeSize Free 4.4.1.510&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TSF-020&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTSF441510&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;UltraVNC 1.2.3.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;UVNC-024&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QUVNC1230&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;div&gt;&lt;/div&gt;</description><pubDate>Fri, 22 Nov 2019 22:58:26 Z</pubDate></item><item><guid isPermaLink="false">cba5558f-c961-4bc6-9282-06ab7a99a962</guid><link>https://www.ivanti.com/blog/patching-in-review-week-46-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><title>Patching in Review – Week 46 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;Against all odds, Microsoft gifted us with another relatively simple Patch Tuesday (aside from the surprise IE Zero Day &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1429" target="_blank" rel="noopener"&gt;CVE-2019-1429&lt;/a&gt;). Who knows what December will bring at this rate. Of course, Patch Tuesday wasn’t completely without issue with a few notable issues in the field, and not just from Microsoft!&lt;/p&gt;

&lt;p&gt;As always, here are the quick links to stay up to date on any developing known issues:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059" target="_blank" rel="noopener"&gt;Windows 10 / Server 2019 / Server 2016&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6" target="_blank" rel="noopener"&gt;Windows 8.1 / Server 2012 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd" target="_blank" rel="noopener"&gt;Server 2012&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history-720c2590-fd58-26ba-16cc-6d8f3b547599" target="_blank" rel="noopener"&gt;Windows 7 / Server 2008 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2008-sp2-update-history-9197740a-7430-f69f-19ff-4998a4e8b25b" target="_blank" rel="noopener"&gt;Server 2008&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Patch Tuesday Follow-Up&lt;/h2&gt;

&lt;p&gt;While this isn’t directly related to an update, Google Chrome graced headlines this week with an experimental feature that’s frustrating administrators across the globe.&lt;/p&gt;

&lt;p&gt;According to &lt;a href="https://www.bleepingcomputer.com/news/software/google-fixes-white-screen-problem-in-chrome-admins-furious/" target="_blank" rel="noopener"&gt;BleepingComputer&lt;/a&gt;, Google remotely enabled “WebContent Occlusion” across all v77 and v78 major versions on Patch Tuesday. This caused terminal server environments to be plagued by the aptly named “White Screen of Death”. After a flood of complaints to Google’s support forums, the change was reversed on Thursday. In the aftermath of this issue, enterprise administrators have raised extreme concerns around Google’s ability to modify Chrome configurations without any opt-in or blocking method available, so we will have to see what position Google takes from here.&lt;/p&gt;

&lt;p&gt;Administrators have been reporting issues with Microsoft’s Malicious Software Removal Tool since Patch Tuesday, with installation failures across whole environments. This has been covered in depth by &lt;a href="https://www.askwoody.com/2019/born-microsoft-incorrectly-signed-the-msrt-update-thats-been-bouncing-around-its-fixed-now/" target="_blank" rel="noopener"&gt;Woody on Windows&lt;/a&gt; and &lt;a href="https://borncity.com/win/2019/11/14/windows-7-error-0x800b0109-bei-update-kb890830-mrst/" target="_blank" rel="noopener"&gt;Born City&lt;/a&gt; where it appears the issue was around an improperly signed binary. It appears this has since been fixed, so refreshing the binary on your patching solution should resolve the issue.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;While the Microsoft updates have defined the week, other vendors have been releasing updates for their respective products. See the list below as these updates can still contain valuable security fixes.&lt;/p&gt;

&lt;table border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Bulletin title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Bulletin ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Acrobat DC and Acrobat Reader DC 19.021.20056&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ARDC19-014&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QADC1902120056&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Flash Player 32.0.0.293&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AFP32-00293&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAF3200293&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 85.4.155&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-125&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX854155&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.12.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-134&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS1010122&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Backup and Sync 3.47.7654.0300&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GSYNC-025&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGBS34776540300&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.75.5649.582&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-072&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2755649582&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Nitro Pro 13.6.0.108&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NITRO-029&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNITRO1360108&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Nitro Pro Enterprise 13.6.0.108&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NITROE-010&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNITROE1360108&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NVivo 12.6.0.959&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NVIVO-005&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNVIVO1260959&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 65.0.3467.38&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-237&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP650346738&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 65.0.3467.42&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-238&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP650346742&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Paint.net 4.2.5&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDN-012&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPDN425&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.45.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-048&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2450&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.1.2019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-050&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11812019&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.2.2029&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-051&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11822029&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RealVNC Viewer 6.19.1115&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VNCV-003&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVNCV6191115&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Skype 8.54.0.91&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SKYPE-170&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSKY854091&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Snagit 2020.0.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SNAG-031&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSNAG2001&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Thunderbird 68.2.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TB19-6822&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTB6822&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.40.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-1108-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1400&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.40.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-1114-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1401&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VMWare Horizon Client 5.2.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VMWH-011&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVMWH5200&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VMware Workstation 14.1.8 Pro&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VMWW-026&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVMWW1418&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Outlook Plugin 4.8.5743.1107&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOMOUT-013&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOMO485743&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 15 Nov 2019 22:39:05 Z</pubDate></item><item><guid isPermaLink="false">b80c59b8-f8e5-41f6-a10b-aa17df7cf32d</guid><link>https://www.ivanti.com/blog/patching-in-review-week-44-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 44 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;Boo! Google Chrome Zero-Day! Scared you, didn’t I? Unfortunately, this is not just a ghost story with a confirmed exploit in the wild for everyone’s favorite web browser.&lt;/p&gt;

&lt;p&gt;In the news, Microsoft has acknowledged a new known issue from October Patch Tuesday where TLS and SSL connections will intermittently fail. Under Microsoft’s &lt;a href="https://support.microsoft.com/en-us/topic/transport-layer-security-tls-connections-might-fail-or-timeout-when-connecting-or-attempting-a-resumption-326bd5b1-52a1-b367-8179-b154e5c01e90" target="_blank" rel="noopener"&gt;support article&lt;/a&gt;, the fix for &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1318" target="_blank" rel="noopener"&gt;CVE-2019-1318 &lt;/a&gt;may result in connections erroring out with 0x8009030f. Fortunately, multiple workarounds are now provided to those that are experiencing this issue. All Security-Only and Monthly Rollup patches released on Patch Tuesday are affected by this, so make sure to keep an eye out for this new issue in your environments.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Chrome is back for an encore this month with its second zero-day for the year. With an appropriate late release on Halloween, &lt;a href="https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html" target="_blank" rel="noopener"&gt;version 78.0.3904.87&lt;/a&gt; includes two security fixes with CVE-2019-13720 taking the spotlight. Details on this use-after-free vulnerability are scarce at the time of writing other than Google’s acknowledgement of an exploit in the wild. In early March this year, a different use-after-free vulnerability under &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2019-5786" target="_blank" rel="noopener"&gt;CVE-2019-5786&lt;/a&gt; was exploited in the wild in conjunction with &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0808" target="_blank" rel="noopener"&gt;CVE-2019-0808&lt;/a&gt;, a Windows vulnerability.&lt;/p&gt;

&lt;p&gt;Apple released &lt;a href="https://support.apple.com/en-us/103762" target="_blank" rel="noopener"&gt;iTunes 12.10.2&lt;/a&gt; and &lt;a href="https://support.apple.com/en-us/103754" target="_blank" rel="noopener"&gt;iCloud 7.15&lt;/a&gt; this week covering a total of 16 vulnerabilities. CVE-2019-8801 stands out from the group and is unique to iTunes where the installer could be used to execute an untrusted DLL under the signed installer process. The bulk of the other vulnerabilities are shared with Apple’s Safari browser on macOS to protect the application from exploitation if used to browse web content.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Here are the other updates we released in our content this week. These updates might not have CVEs, but they may still have helpful stability fixes as well as undisclosed security fixes:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Acrobat DC and Reader DC 15.006.30505&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ARDC19-012&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QADC1500630505&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Acrobat DC and Reader DC 17.011.30152&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ARDC19-013&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QADC1701130152&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 84.4.170&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-124&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX844170&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GIMP 2.10.14&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GIMP-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGIMP21014&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 10.2.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-075&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM1021&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LibreOffice 6.3.3.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LIBRE-120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLIBRE6332&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Notepad++ 7.8.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NPPP-095&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNPPP781&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 64.0.3417.83&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-235&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP640341783&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.1.1973&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-049&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11811973&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Slack Machine-Wide Installer 4.1.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SMWI-037&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSLACK412&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TortoiseSVN 1.13.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TORT-035&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTORT1130&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TreeSize Free 4.4.0.508&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TSF-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTSF440508&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio 2019 version 16.3.7&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-1030-VS2019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVS20191637&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 01 Nov 2019 20:16:20 Z</pubDate></item><item><guid isPermaLink="false">d3d7818c-1b1d-4fe3-8ffd-37c2756e041c</guid><link>https://www.ivanti.com/blog/patching-in-review-week-43-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><title>Patching in Review – Week 43 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Get expert insights you can't find anywhere else - watch now" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-experts.png"&gt;&lt;/a&gt;With major releases from both Firefox and Chrome this week, there has been enough to keep everyone busy for the month. In case you missed it, check out &lt;a href="https://www.ivanti.com/webinars/2019/october-threat-thursday" target="_blank"&gt;October Threat Thursday&lt;/a&gt; where we analyze the biggest security threats for the month!&lt;/p&gt;

&lt;p&gt;In the news, Microsoft SQL 2012 and 2014 are being actively attacked in the wild with previously unknown malware. Dubbed “Skip-2.0” by &lt;a href="https://www.welivesecurity.com/2019/10/21/winnti-group-skip2-0-microsoft-sql-server-backdoor/" target="_blank" rel="noopener"&gt;ESET security researchers&lt;/a&gt;, this backdoor malware is designed to be laid down after a successful exploit. After implementation, remote attackers can then connect later with a known password. This allows the attackers to then access, modify, or delete data at their convenience without creating a larger footprint than is necessary.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Google released &lt;a href="https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" target="_blank" rel="noopener"&gt;Chrome 78&lt;/a&gt; on Tuesday with a total of 37 security fixes, including 21 CVEs. While this release contains valuable security fixes, it appears that Symantec Endpoint Protection is not playing nicely with the update. According to Symantec’s&lt;a href="https://knowledge.broadcom.com/external/article?legacyId=tech256047" target="_blank" rel="noopener"&gt; support article&lt;/a&gt;, all tabs will crash in a browser session with the notorious “Aw, Snap!” error page. This error appears to be caused by Microsoft’s Code Integrity feature and can be disabled as a workaround until SEP can be upgraded later.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.mozilla.org/en-US/firefox/70.0/releasenotes/" target="_blank" rel="noopener"&gt;Firefox 70&lt;/a&gt; released on Tuesday as well, with a total of 13 CVEs listed in Mozilla’s &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/" target="_blank" rel="noopener"&gt;security advisory&lt;/a&gt;. The most interesting feature is titled “&lt;a href="https://support.mozilla.org/en-US/kb/firefox-password-manager-alerts-breached-websites?redirectslug=firefox-lockwise-alerts-breached-websites&amp;amp;redirectlocale=en-US" target="_blank" rel="noopener"&gt;Firefox Lockwise&lt;/a&gt;” that will keep track of the latest data breaches in relation to saved credentials and alert you if a breach occurs. As with most major releases by Mozilla, &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/" target="_blank" rel="noopener"&gt;Firefox ESR 68.2&lt;/a&gt; and &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/" target="_blank" rel="noopener"&gt;Thunderbird 68.2&lt;/a&gt; released as well, with many shared fixes to the vulnerabilities found in the leading branch.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;While Google and Mozilla were the high-profile releases this week, our other supported vendors were busy providing non-security updates for their products. Review the list below to make sure you stay up to date on your full environment.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Acrobat DC and Acrobat Reader DC 19.021.20049&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ARDC19-011&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QADC1902120049&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.10.10&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-132&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS10101010&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 10.1.2.15251&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-074&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM1012&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.74.5619.841&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-070&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2745619841&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.74.5619.862&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-071&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2745619862&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Nitro Pro 13.2.6.26&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NITRO-028&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNITRO132626&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Nitro Pro Enterprise 13.2.6.26&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NITROE-009&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNITROE132626&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 10.17.0 (LTS Lower)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSLL-008&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSLL10170&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.13.0 (LTS Upper)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSLU-012&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSLU12130&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 13.0.1 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-027&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC1301&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 64.0.3417.73&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-234&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP640341773&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Snagit 2020.0.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SNAG-030&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSNAG2000&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Splunk Universal Forwarder 8.0.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SPLUNKF-042&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSPLUNKF800&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 11.3.17789&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-058&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW11317789&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 12.3.17791&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-057&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEWH12317791&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 13.2.36216&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-056&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEWH13236216&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 14.7.1965&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-055&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEWH1471965&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VMware Tools 11.0.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VMWT-030&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVMWT1101&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Wireshark 2.6.12&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WIRES-105&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWIRES2612&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Wireshark 3.0.6&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WIRES-104&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWIRES306&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;</description><pubDate>Fri, 25 Oct 2019 17:23:44 Z</pubDate></item><item><guid isPermaLink="false">a8cd3b90-ba25-44ea-927c-07c281eed838</guid><link>https://www.ivanti.com/blog/patching-in-review-week-42-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><title>Patching in Review – Week 42 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;Where Patch Tuesday was relatively light, this week was destined to be a heavy one with the scheduled Oracle release, but I don’t think anyone was prepared for &lt;strong&gt;106&lt;/strong&gt; new unique CVEs in our patching content so far!&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Adobe kicked off the party early on Tuesday with &lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb19-49.html" target="_blank" rel="noopener"&gt;APSB19-49&lt;/a&gt; detailing security updates for Adobe Acrobat and Reader for a total of 68 vulnerabilities. Many of the vulnerabilities listed are classified as “Critical” where successful exploitation could lead to the execution of arbitrary code, most likely through a maliciously crafted document. Interestingly enough, Acrobat and Reader 19 got an &lt;a href="https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/continuous/dccontinuousoct2019ooc.html#dccontinuousocttwentynineteenooc" target="_blank" rel="noopener"&gt;out of cycle update&lt;/a&gt; two days later, with very few details on the stability fixes, so make sure to get this second patch out.&lt;/p&gt;

&lt;p&gt;Oracle came in next with the expected &lt;a href="https://www.oracle.com/security-alerts/cpuoct2019.html" target="_blank" rel="noopener"&gt;September Critical Patch Update&lt;/a&gt; covering a total of 270 vulnerabilities for its extensive product portfolio. &lt;a href="https://www.oracle.com/security-alerts/cpuoct2019.html#AppendixJAVA" target="_blank" rel="noopener"&gt;Java JRE and JDK&lt;/a&gt; updated with a total of 20 CVEs and a rather moderate maximum CVSS score of 6.8. For those that have migrated from Java SE, OpenJDK also released with patches for the same vulnerabilities on, including distributions such as &lt;a href="https://aws.amazon.com/corretto/" target="_blank" rel="noopener"&gt;Amazon Corretto&lt;/a&gt;. Oracle’s CPU also included &lt;a href="https://www.oracle.com/security-alerts/cpuoct2019.html#AppendixOVIR" target="_blank" rel="noopener"&gt;VirtualBox&lt;/a&gt; with a total of 11 CVEs remediated this quarter.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Other vendors have been hard at work releasing non-security fixes for their products. Review the list below to make sure you’ve included valuable updates for your end users.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Acrobat DC and Acrobat Reader DC 19.021.20048&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ARDC19-010&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QADC1902120048&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP 4.60.2153&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP-017&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAIMP4602153&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apache Tomcat 8.5.47&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOMCAT-145&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOMCAT8547&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apache Tomcat 9.0.27&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOMCAT-146&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOMCAT9027&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CCleaner 5.63.7540&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CCLEAN-085&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCCLEAN5637540&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 83.4.152&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-123&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX834152&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM Player 2.3.46.5308&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM-031&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGOM23465308&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 10.1.1.15160&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-073&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM1011&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LibreOffice 6.2.8.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LIBRE-119&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLIBRE6282&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.74.5619.621&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-069&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2745619621&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.12.0 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-026&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC12120&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 64.0.3417.61&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-233&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP640341761&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.0.1944&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-048&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11801944&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 18 Oct 2019 17:02:23 Z</pubDate></item><item><guid isPermaLink="false">ce6319da-73bc-45f3-b541-679efed9a0eb</guid><link>https://www.ivanti.com/blog/patching-in-review-week-41-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 41 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;Happy Cybersecurity Awareness Month, everyone! With yet another unexpected IE release this week, I can’t think of a better way to usher in the month! As we prepare for the upcoming Patch Tuesday, make sure you’re registered for &lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday"&gt;our webinar&lt;/a&gt; to get our analysis on high profile vulnerabilities and known issues.&lt;/p&gt;

&lt;p&gt;After September’s Patch Tuesday, we’ve been lucky enough to get a slow week. Hopefully in the next coming weeks, we can deploy with piece of mind for a change!&lt;/p&gt;

&lt;p&gt;Of course, here are the quick links to stay up to date on any developing known issues:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059" target="_blank" rel="noopener"&gt;Windows 10 / Server 2019 / Server 2016&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6" target="_blank" rel="noopener"&gt;Windows 8.1 / Server 2012 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd" target="_blank" rel="noopener"&gt;Server 2012&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history-720c2590-fd58-26ba-16cc-6d8f3b547599" target="_blank" rel="noopener"&gt;Windows 7 / Server 2008 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2008-sp2-update-history-9197740a-7430-f69f-19ff-4998a4e8b25b" target="_blank" rel="noopener"&gt;Server 2008&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Patch Tuesday Follow-Up&lt;/h2&gt;

&lt;p&gt;For those who attended our Patch Tuesday Webinar, it was a relatively quiet month with very few known issues present. The rest of the week has been no different with a relatively quiet patching community.&lt;/p&gt;

&lt;p&gt;Unexpectedly, the &lt;a href="https://support.apple.com/en-us/103108" target="_blank" rel="noopener"&gt;iTunes&lt;/a&gt; and &lt;a href="https://support.apple.com/en-us/103109" target="_blank" rel="noopener"&gt;iCloud&lt;/a&gt; security patch released on Tuesday has been promoted to a remediate a zero-day vulnerability! &lt;a href="https://blog.morphisec.com/apple-zero-day-exploited-in-bitpaymer-campaign" target="_blank" rel="noopener"&gt;Morphisec&lt;/a&gt; discovered the vulnerability in Apple Software Update where an unquoted path has been exploited. This attack can go easily undetected as the malicious process will display as a child of the signed Apple executable. Morphisec also noted Apple Software Update is a separate component that needs to be uninstalled separately and many endpoints contained this out-of-date software.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Google finishes out Patch Tuesday week with Chrome &lt;a href="https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop.html" target="_blank" rel="noopener"&gt;77.0.3865.120&lt;/a&gt; with eight security fixes. Of the vulnerabilities, five have been assigned CVEs with “High” severity. Make sure to get this update rolled into the patching cycle this weekend.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Of course, other vendors have been releasing updates for their respective software. While these updates might not have identified vulnerabilities, they still have helpful stability fixes as well as potential undisclosed security fixes:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Bulletin title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Bulletin ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Adobe Flash Player 32.0.0.270&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AFP32-00270&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAF3200270&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Beyond Compare 4.3.0.24364&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BEYOND-010&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBC43024364&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 82.4.156&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-122&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX824156&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Firefox 69.0.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FF19-022&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFF6903&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;iTunes 12.10.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AI19-006&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAI12101&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 8.16.2 (LTS Lower)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSLL-007&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSLL8162&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Notepad++ 7.8&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NPPP-094&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNPPP78&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 64.0.3417.47&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-231&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP640341747&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 64.0.3417.54&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-232&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP640341754&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.18.0.1913&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-047&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11801913&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Skype 8.53.0.85&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SKYPE-168&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSKY853085&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Slack Machine-Wide Installer 4.1.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SMWI-036&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSLACK411&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Prep Builder 2019.3.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABPREPB19-006&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABPREPB201932&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Thunderbird 68.1.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TB19-6812&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTB6812&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.39.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-1010-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1390&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.39.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-1011-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1391&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;div&gt;&lt;/div&gt;
</description><pubDate>Fri, 11 Oct 2019 22:09:46 Z</pubDate></item><item><guid isPermaLink="false">60e66f89-8962-451a-9856-58a40a1b044e</guid><link>https://www.ivanti.com/blog/patching-in-review-week-40-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 40 of 2019</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;Happy Cybersecurity Awareness Month, everyone! With yet another unexpected IE release this week, I can’t think of a better way to usher in the month! As we prepare for the upcoming Patch Tuesday, make sure you’re registered for &lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday"&gt;our webinar&lt;/a&gt; to get our analysis on high profile vulnerabilities and known issues.&lt;/p&gt;

&lt;h2&gt;Internet Explorer Out-of-Band&lt;/h2&gt;

&lt;p&gt;Following up from the zero-day release last week, Microsoft released an additional Internet Explorer update right before Patch Tuesday with vague origins. In review, on 9/23 Microsoft released a surprise zero-day patch for IE (&lt;a href="https://support.microsoft.com/en-us/topic/cumulative-security-update-for-internet-explorer-september-23-2019-e7d69be1-050e-86ea-d564-3ac6a5471d01" target="_blank" rel="noopener"&gt;KB4522007&lt;/a&gt;) and Windows 10 to remediate actively exploited &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1367" target="_blank" rel="noopener"&gt;CVE-2019-1367&lt;/a&gt;. The next day, a series of Quality Preview patches and again, Windows 10 cumulatives were released for all supported OSes that included the CVE (Windows 10 1903 was a few days later).&lt;/p&gt;

&lt;p&gt;Third time’s the charm, right? On October 3, Microsoft surprised us all with yet another re-release of the Internet Explorer patches (&lt;a href="https://support.microsoft.com/en-us/topic/cumulative-security-update-for-internet-explorer-october-3-2019-202ba376-ba12-08c9-2521-a5919c5fcf46" target="_blank" rel="noopener"&gt;KB4521435&lt;/a&gt;), a final set of Windows 10 cumulatives, and a surprising Monthly Rollup for all legacy OSes. There’s little evidence around the changes here, but it’s suspected that this new set of patches contains further bug fixes that the initial release contained.&lt;/p&gt;

&lt;p&gt;Here’s a list of the final KBs in case you’d like to get these out before the Patch Tuesday cycle:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;IE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Cumulative/Rollup&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Server 2008&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/cumulative-security-update-for-internet-explorer-october-3-2019-202ba376-ba12-08c9-2521-a5919c5fcf46" target="_blank" rel="noopener"&gt;KB4524135&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 7 / Server 2008 R2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/cumulative-security-update-for-internet-explorer-october-3-2019-202ba376-ba12-08c9-2521-a5919c5fcf46" target="_blank" rel="noopener"&gt;KB4524135&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524157-monthly-rollup-faadd9ae-7f0f-2011-e86d-8e80aace214e" target="_blank" rel="noopener"&gt;KB4524157&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Server 2012&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/cumulative-security-update-for-internet-explorer-october-3-2019-202ba376-ba12-08c9-2521-a5919c5fcf46" target="_blank" rel="noopener"&gt;KB4524135&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524156-monthly-rollup-35e2d913-9f73-b8cb-1792-f426a6a4d167" target="_blank" rel="noopener"&gt;KB4524156&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 8.1 / Server 2012 R2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/cumulative-security-update-for-internet-explorer-october-3-2019-202ba376-ba12-08c9-2521-a5919c5fcf46" target="_blank" rel="noopener"&gt;KB4524135&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524154-monthly-rollup-61345ad6-70ed-7478-0177-850b9d494d5c" target="_blank" rel="noopener"&gt;KB4524154&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1507&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524153-os-build-10240-18335-65a19d41-5538-ad60-6ae3-151607bd4120" target="_blank" rel="noopener"&gt;KB4524153&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1607 / Server 2016&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524152-os-build-14393-3243-fa70b3cd-f4c6-7894-b8cc-c568eb62bb60" target="_blank" rel="noopener"&gt;KB4524152&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1703&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524151-os-build-15063-2079-0683ce5f-ac00-d70c-33bd-00083be23529" target="_blank" rel="noopener"&gt;KB4524151&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1709&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524150-os-build-16299-1421-40b1e9e3-bd81-5ac0-b1ae-743c469bcc53" target="_blank" rel="noopener"&gt;KB4524150&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1803&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524149-os-build-17134-1040-a12f7d81-b3e4-af70-a597-9d219f9d3437" target="_blank" rel="noopener"&gt;KB4524149&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1809 / Server 2019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524148-os-build-17763-775-76e84bd2-661c-acc3-bf65-db615a7aebbb" target="_blank" rel="noopener"&gt;KB4524148&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Windows 10 1903&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://support.microsoft.com/en-us/topic/october-3-2019-kb4524147-os-build-18362-388-d2ba8b31-a375-35bf-f9ec-080e1461e8fb" target="_blank" rel="noopener"&gt;KB4524147&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Foxit released version 9.7 this week with 10 CVEs with the most severe CVEs acquiring a CVSS score of 8.7. Most of the vulnerabilities detail Remote Code Execution vulnerabilities that are dependent on opening a specially crafted malicious file that’s most commonly distributed in phishing attacks. Make sure to get this rolled out in your next patching cycle.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;While the Microsoft update have defined the week, other vendors have been releasing updates for their respective products. See the list below as these updates can still contain valuable security fixes.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Bulletin title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Bulletin ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BlueJeans 2.16.324.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;JEANS-024&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBJN2163240&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 82.4.155&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-121&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX824155&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FileZilla Client 3.45.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FILEZ-093&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFILEZ3451X64&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Firefox 69.0.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FF19-021&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFF6902&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.9.5&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-131&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS101095&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Backup and Sync 3.46.7175.2662&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GSYNC-023&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGBS34671752662&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Nitro Pro 13.2.6.26&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NITRO-027&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNITRO132326&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Nitro Pro Enterprise 13.2.3.26&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NITROE-008&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNITROE132326&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.11.1 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-025&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC12111&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.17.0.1841&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-046&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11701841&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PuTTY 0.73&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PUTTY-006&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPUTTY073&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Slack Machine-Wide Installer 4.1.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SMWI-035&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSLACK410&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Splunk Universal Forwarder 7.3.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SPLUNKF-041&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSPLUNKF732&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Sublime Text 3 Build 3211&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SUBL-006&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSUBL3211&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Client 4.5.5422&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOM-029&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOM455422&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Outlook Plugin 4.8.5336.0928&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOMOUT-012&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOMO485336&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
</description><pubDate>Fri, 04 Oct 2019 22:32:48 Z</pubDate></item><item><guid isPermaLink="false">71a7a7ad-4d52-48ef-8f9a-704fc85d3dfd</guid><link>https://www.ivanti.com/blog/patching-in-review-week-38-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 38 of 2019</title><description>&lt;p&gt;In last week’s blog post we covered a litany of issues plaguing September Patch Tuesday’s Windows 10 1903 (&lt;a href="https://support.microsoft.com/en-us/topic/september-10-2019-kb4515384-os-build-18362-356-88bbd87a-2918-34e2-9352-288a0fcf3660" target="_blank" rel="noopener"&gt;KB4515384&lt;/a&gt;) patch. It appears more issues are coming out in the week after Patch Tuesday. Bleeping Computer has reported on two additional issues (one that applies to all versions!):&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Machines with certain Intel Centrino and Broadcom adapters have been &lt;a href="https://www.bleepingcomputer.com/news/microsoft/windows-10-1903-is-now-having-problems-with-network-adapters/" target="_blank" rel="noopener"&gt;rendered unusable&lt;/a&gt; on Windows 10 1903. While &lt;a href="https://learn.microsoft.com/en-us/windows/release-health/" target="_blank" rel="noopener"&gt;Microsoft reports this issue&lt;/a&gt; with a workaround, there is no current known resolution.&lt;/li&gt;
	&lt;li&gt;Systems that use Chinese IME have been experiencing scenarios where &lt;a href="https://www.bleepingcomputer.com/news/microsoft/windows-10-with-chinese-ime-installed-causing-high-cpu-usage/" target="_blank" rel="noopener"&gt;the system becomes unresponsive&lt;/a&gt; due to high CPU usage. All versions of Windows 10 are affected &lt;a href="https://learn.microsoft.com/en-us/windows/release-health/" target="_blank" rel="noopener"&gt;according to Microsoft&lt;/a&gt; so keep an eye out for a fix sooner than later.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Google Chrome released version &lt;a href="https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html" target="_blank" rel="noopener"&gt;77.0.3865.90&lt;/a&gt; this week with a total of four CVEs, including another rare “Critical” vulnerability for the month. CVE-2019-13685 details a use-after-free UI vulnerability where a specially crafted website could lead to code execution outside of the context of the browser.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Of course, other vendors have been releasing updates for their respective software. While these updates might not have identified vulnerabilities, they still have helpful stability fixes as well as potential undisclosed security fixes:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Box Edit 4.6.0.647&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BEDIT-006&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBEDIT460647&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Citrix Workspace app 19.9.0.21&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CTXWA-003&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCTXWA199021&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 81.4.193&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-119&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX814193&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DropBox 81.4.195&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;DROPBOX-120&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QDROPBOX814195&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Firefox 69.0.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;FF19-020&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFF6901&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM Player 2.3.45.5307&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOM-030&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGOM23455307&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.8.8&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-130&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS101088&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Google Drive File Stream 33.0.16.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GDFS-014&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QFS330160&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 8.47.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-071&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM8472&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LogMeIn 4.1.13002&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LMI-020&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLMI4113002&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 63.0.3368.94&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-229&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP630336894&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.42.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-046&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2420&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.16.6.1592&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-044&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11661592&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Skype 8.52.0.138&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SKYPE-167&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSKY8520138&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Splunk Universal Forwarder 7.3.1.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SPLUNKF-040&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSPLUNKF7311&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.3.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2019-012&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201930&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Prep Builder 2019.3.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABPREPB19-004&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABPREPB201931&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Reader 2019.3.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABREAD2019-008&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABREAD201930&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Teamviewer 14.6.2452&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-053&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW1462452&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.2.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Fri, 20 Sep 2019 19:25:48 Z</pubDate></item><item><guid isPermaLink="false">c1e53586-6dec-4ca4-949f-c5976418a56e</guid><link>https://www.ivanti.com/blog/patching-in-review-week-37-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 37 of 2019</title><description>&lt;p&gt;Another Patch Tuesday in the books for the year, but not without its surprises. Have a look at the surprisingly long list of quirks and issues that emerged throughout the rest of the week.&lt;/p&gt;

&lt;p&gt;Of course, here are the quick links to stay up to date on any developing known issues:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059" target="_blank" rel="noopener"&gt;Windows 10 / Server 2019 / Server 2016&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-8-1-and-windows-server-2012-r2-update-history-47d81dd2-6804-b6ae-4112-20089467c7a6" target="_blank" rel="noopener"&gt;Windows 8.1 / Server 2012 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd" target="_blank" rel="noopener"&gt;Server 2012&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history-720c2590-fd58-26ba-16cc-6d8f3b547599" target="_blank" rel="noopener"&gt;Windows 7 / Server 2008 R2&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/windows-server-2008-sp2-update-history-9197740a-7430-f69f-19ff-4998a4e8b25b" target="_blank" rel="noopener"&gt;Server 2008&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Patch Tuesday Follow-Up&lt;/h2&gt;

&lt;p&gt;While we try to cover all the currently known issues in the &lt;a href="https://www.ivanti.com/resources/patch-tuesday"&gt;Patch Tuesday Webinar&lt;/a&gt;, more issues tend to come out over the remainder of the week. Here’s a list of the interesting quirks and known issues that have been discovered:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It looks like the two “Zero-Day” CVEs that were reported by Microsoft have been updated to report that they’re not exploited. Both &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1214" target="_blank" rel="noopener"&gt;CVE-2019-1214&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1215" target="_blank" rel="noopener"&gt;CVE-2019-1215&lt;/a&gt; have had their pages updated to reflect Microsoft’s change, but few details have been provided outside of this fact.&lt;/li&gt;
	&lt;li&gt;The Windows 10 1903 update (&lt;a href="https://support.microsoft.com/en-us/topic/september-10-2019-kb4515384-os-build-18362-356-88bbd87a-2918-34e2-9352-288a0fcf3660" target="_blank" rel="noopener"&gt;KB4515384&lt;/a&gt;) resolved the 100% CPU issue mentioned in &lt;a href="https://www.ivanti.com/blog/patching-in-review-week-36-of-2019"&gt;last week’s post&lt;/a&gt;, but it appears new issues have taken its place:
	&lt;ul&gt;
		&lt;li&gt;&lt;a href="https://www.windowslatest.com/2019/09/12/windows-10-kb4515384-audio-issues/" target="_blank" rel="noopener"&gt;WindowsLatest&lt;/a&gt; is reporting audio issues on select machines where audio is no longer functional or is heavily reduced in applications.&lt;/li&gt;
		&lt;li&gt;The Reddit sysadmin Patch Tuesday thread is mentioning &lt;a href="https://www.reddit.com/r/sysadmin/comments/d296nh/patch_tuesday_megathread_20190910/ezv2qop?utm_source=share&amp;amp;utm_medium=web2x" target="_blank" rel="noopener"&gt;issues with the Start Menu&lt;/a&gt; where an error is thrown when opened. Only rolling back to an earlier update has resolved the issue.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Users of &lt;a href="https://www.dell.com/support/article/us/en/04/sln318627/dell-encryption-enterprise-dell-encryption-personal-endpoint-displays-bad-system-config-info-after-installing-windows-update-kb4512941-and-or-kb4515384?lang=en" target="_blank" rel="noopener"&gt;Dell Encryption&lt;/a&gt; should be cautious as the Windows 10 1809 (&lt;a href="https://support.microsoft.com/en-us/topic/september-10-2019-kb4515384-os-build-18362-356-88bbd87a-2918-34e2-9352-288a0fcf3660" target="_blank" rel="noopener"&gt;KB4515384&lt;/a&gt;) and Windows 10 1903 (&lt;a href="https://support.microsoft.com/en-us/topic/september-10-2019-kb4515384-os-build-18362-356-88bbd87a-2918-34e2-9352-288a0fcf3660" target="_blank" rel="noopener"&gt;KB4515384&lt;/a&gt;) updates are running into blue screens displaying BAD SYSTEM CONFIG INFO.&lt;/li&gt;
	&lt;li&gt;On Patch Tuesday, we noticed issues with the Windows 10 1809 x64 update (&lt;a href="https://support.microsoft.com/en-us/topic/september-10-2019-kb4512578-os-build-17763-737-695c1350-93dc-40dc-72c3-5af9743c6340" target="_blank" rel="noopener"&gt;KB4512578&lt;/a&gt;) where the patch binary would fail to download. In our testing, we found that depending on the file server, the download size would only return around 233MB instead of 262MB and the file would be corrupt. Attempting the download multiple times seems to eventually return the proper file.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/servicing-stack-update-for-windows-server-2008-sp2-april-9-2019-8f49b928-2090-0cce-3ed6-21b6dc8c494b" target="_blank" rel="noopener"&gt;KB4493730&lt;/a&gt;, the April servicing stack update for Server 2008 is required&amp;nbsp;before the next servicing stack and September updates can be installed.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.microsoft.com/en-us/topic/servicing-stack-update-for-windows-7-sp1-and-windows-server-2008-r2-sp1-march-12-2019-b4dc0cff-d4f2-a408-0cb1-cb8e918feeba" target="_blank" rel="noopener"&gt;KB4490628&lt;/a&gt;, the March servicing stack for Windows 7 and Server 2008 R2 is required&amp;nbsp;before the next servicing stack and September updates can be installed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Of course, other vendors have been releasing updates for their respective software. While these updates might not have identified vulnerabilities, they still have helpful stability fixes as well as potential undisclosed security fixes:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apple Mobile Device Support 13.0.0.38&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AMDS-026&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAMDS130038&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CoreFTP LE 2.2.1941&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;COREFTP-040&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCFTP221941&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;iTunes 12.10&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AI19-005&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAI1210&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.73.5586.661&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-064&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2735586661&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 63.0.3368.88&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-228&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP630336888&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDF-Xchange PRO 8.0.333.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDFX-033&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPDFX803330&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.41.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-045&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2410&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Thunderbird 68.1.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TB19-6810&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTB6810&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio 2019 version 16.2.4&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-09-VS2019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVS20191624&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.38.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-0912-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1381&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Wireshark 2.6.11&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WIRES-101&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWIRES2611&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Wireshark 3.0.4&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;WIRES-102&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QWIRES304&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Client 4.5.3372&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOM-028&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOM453372&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;div&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Fri, 13 Sep 2019 22:59:55 Z</pubDate></item><item><guid isPermaLink="false">3ad2b3c3-662f-4768-b1d8-824e42417a3b</guid><link>https://www.ivanti.com/blog/patching-in-review-week-36-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 36 of 2019</title><description>&lt;p&gt;Is Patch Tuesday coming up so soon? It feels like we just had one! Make sure to register for our &lt;a href="https://www.ivanti.com/webinars/2019/september-patch-tuesday" target="_blank"&gt;Patch Tuesday webinar&lt;/a&gt; if you haven’t already to get a detailed summary of Microsoft’s releases next week.&lt;/p&gt;

&lt;p&gt;Microsoft finally released the mid-month non-security update for Windows 10 1903 under &lt;a href="https://support.microsoft.com/en-us/topic/718203aa-33ff-813d-37c9-ed9a2954fa98" target="_blank" rel="noopener"&gt;KB4512941&lt;/a&gt;. This patch came surprisingly late considering the high-profile bug around &lt;a href="https://www.bleepingcomputer.com/news/microsoft/windows-10-updates-cause-visual-basic-apps-to-stop-responding/" target="_blank" rel="noopener"&gt;Visual Basic applications&lt;/a&gt;. The list of fixes is impressive, but it looks like a much more annoying bug is included. According to &lt;a href="https://borncity.com/win/2019/09/05/windows-10-v1903-review-of-update-kb4512941/" target="_blank" rel="noopener"&gt;BornCity&lt;/a&gt;, a couple of issues around Search and RDP are causing high CPU usage, which has now been confirmed by Microsoft. Unfortunately, Microsoft’s expected ETA on a resolution is “mid-September” so there’s a high probability this bug will be present in September’s Patch Tuesday release.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Mozilla released a new major version of its Firefox browser this week with a total of 20 CVEs in the main release branch. CVE-2019-11751 stands out from the pack in this release where an exploit was found in the command line parameters. In the description, a user could click a malicious link that would launch Firefox and write a log file to an arbitrary location such as “Startup” for later execution. Aside from the CVEs, &lt;a href="https://blog.mozilla.org/en/products/firefox/todays-firefox-blocks-third-party-tracking-cookies-and-cryptomining-by-default/" target="_blank" rel="noopener"&gt;Firefox 69&lt;/a&gt; contains two great new features, blocking third-party tracking cookies and cryptominers. It’s also worth noting that this is the end of Firefox ESR 60, so expect an upgrade to 68 in the next Firefox release! See the grid of CVEs and color-coded severities below for further details:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/" target="_blank" rel="noopener"&gt;&lt;strong&gt;Firefox 69.0&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/" target="_blank" rel="noopener"&gt;&lt;strong&gt;Firefox ESR 68.1&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/" target="_blank" rel="noopener"&gt;&lt;strong&gt;Firefox ESR 60.9&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11751&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11751&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11746&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11746&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11746&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11744&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11744&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11744&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11742&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11742&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11742&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11736&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11736&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11753&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11753&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11753&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11752&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11752&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11752&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-9812&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-9812&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-9812&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11743&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11743&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11743&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11748&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11748&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11749&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11749&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-5849&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11750&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11750&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11737&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11738&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11738&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11747&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11747&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11734&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11735&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11735&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11740&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11740&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11740&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CVE-2019-11741&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;As always, our other supported third-party vendors have been releasing non-security updates for their respective products. While these updates might not have CVEs, they may also contain valuable stability updates for your end users:&amp;nbsp;&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CoreFTP LE 2.2.1939&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;COREFTP-039&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCFTP221939&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 8.47.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-070&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM8471&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LibreOffice 6.2.7.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LIBRE-116&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLIBRE6271&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LibreOffice 6.3.1.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;LIBRE-117&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QLIBRE6312&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.10.0 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-023&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC12100&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 63.0.3368.71&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-227&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP630336871&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PeaZip 6.9.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PZIP-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPZIP692&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RealTimes RealPlayer 18.1.18.202&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;RP18-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QRP18118202&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;VirtualBox 6.0.12&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OVB-026&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOVB6012&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.38.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-0905-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1380&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;XnView 2.49&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;XNVW-009&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QXNVW249&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Fri, 06 Sep 2019 17:01:56 Z</pubDate></item><item><guid isPermaLink="false">2000140a-0d01-4779-9642-7bdb903a1260</guid><link>https://www.ivanti.com/blog/patching-in-review-week-35-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>Patching in Review – Week 35 of 2019</title><description>&lt;p&gt;As we approach Labor Day weekend, vendors have been busy releasing numerous updates, with Google Chrome getting a final security release for the month.&lt;/p&gt;

&lt;p&gt;This week Microsoft finally removed the WSUS hold for KB4512506/KB4512486. In review, the highest-profile bug from August’s Patch Tuesday originated from the SHA-2 migration for Windows 7 and Server 2008 R2 and its &lt;a href="https://knowledge.broadcom.com/external/article?legacyId=tech255857" target="_blank" rel="noopener"&gt;compatibility with Symantec Endpoint Protection&lt;/a&gt;. The issue stemmed from a fear that the software may not correctly identify system files being patched and might leave the machine in an incomplete state, which could affect stability. &lt;a href="https://www.computerworld.com/article/3434563/microsoft-removes-august-patch-block-on-win72008r2-systems-running-norton-symantec-av.html" target="_blank" rel="noopener"&gt;Woody on Windows via ComputerWorld&lt;/a&gt; wrote an article detailing the aftermath with a great point: “The block is gone, but questions remain. Nothing has changed, so why was it blocked in the first place?”&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;Google Chrome released &lt;a href="https://chromereleases.googleblog.com/2019/08/stable-channel-update-for-desktop_26.html" target="_blank" rel="noopener"&gt;version 76.0.3809.132&lt;/a&gt; with a total of three security fixes reported by the vendor and a single CVE. Although CVE-2019-5869 was classified as a “High” severity, CIS released an &lt;a href="https://www.cisecurity.org/advisory" target="_blank" rel="noopener"&gt;advisory&lt;/a&gt; recommending expedited remediation. The vulnerability covers a scenario where an attacker could execute arbitrary code though a maliciously crafted website to perform numerous functions in the context of the user rights.&lt;/p&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;Outside of the critical release above, this week has not been boring with considerable non-security releases for the week. It’s worth remembering that these updates may contain undisclosed security remediations as well as helpful stability fixes.&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP 4.60.0.2146&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP-016&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAIMP4602146&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Camtasia 2019.0.7&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CAMTA-022&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCAMTASIA1907&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Citrix Receiver 4.9.8000, LTSR Cumulative Update 8&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CTXR-020&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCTXR498000&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.7.7&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-129&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS101077&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoToMeeting 8.46.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOM-069&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTM8461&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Malwarebytes 3.8.3.2965&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MBAM-014&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QMBAM3832965&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.9.1 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-022&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC1291&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 63.0.3368.53&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-226&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP630336853&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDF-Xchange PRO 8.0.332.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PDFX-032&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPDFX803320&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PeaZip 6.9.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PZIP-018&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPZIP691&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.16.5.1554&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-043&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11651554&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Skype 8.51.0.92&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SKYPE-166&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSKY851092&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2018.1.16&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2018-019&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK2018116&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2018.2.13&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2018-020&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK2018213&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2018.3.10&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2018-021&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK2018310&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.1.7&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2019-010&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201917&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Desktop 2019.2.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABDESK2019-011&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABDESK201923&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Tableau Reader 2019.2.3&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TABREAD2019-007&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTABREAD201923&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 14.5.5819&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-052&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW1455819&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Thunderbird 68.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TB19-6800&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTB6800&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Client 4.5.3261&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOM-027&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOM453261&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Thu, 29 Aug 2019 16:46:51 Z</pubDate></item><item><guid isPermaLink="false">4ac6b00f-9531-49c0-9d57-d077a742af5b</guid><link>https://www.ivanti.com/blog/patching-in-review-week-34-of-2019</link><atom:author><atom:name>Brian Secrist</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brian-secrist</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>Patching in Review – Week 34 of 2019</title><description>&lt;p&gt;Microsoft as well as other 3&lt;sup&gt;rd&lt;/sup&gt; party vendors have not slowed their cadence the week after Patch Tuesday. With a high profile stability fix for Windows alongside multiple software titles getting new security releases, there’s plenty to cover.&lt;/p&gt;

&lt;h2&gt;Security Releases&lt;/h2&gt;

&lt;p&gt;VLC released version 3.0.8 this week with 13 new CVEs. According to VLC’s &lt;a href="https://www.videolan.org/security/sb-vlc308.html" target="_blank" rel="noopener"&gt;security bulletin&lt;/a&gt;, the assorted vulnerabilities could be exploited through a malicious file or website. The two highest profile vulnerabilities are &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2019-13602" target="_blank" rel="noopener"&gt;CVE-2019-13602&lt;/a&gt; and &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2019-13962" target="_blank" rel="noopener"&gt;CVE-2019-13962&lt;/a&gt; with a very controversial severity. NIST considers these CVEs at a High (8.8) and Critical (9.8) severity while VLC disputes the claim, saying that the metrics point to a more benign base score of 4.3. Regardless of perceived impact, be sure to get this software update out in your next patching cycle.&lt;/p&gt;

&lt;p&gt;Node.JS also released a series of &lt;a href="https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" target="_blank" rel="noopener"&gt;security updates&lt;/a&gt; for their supported versions with 8 CVEs that were discovered by Netflix. All CVEs detail flaws in the implementation of HTTP/2 where an attacker can execute a denial of service against the target. In line with Netflix’s &lt;a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" target="_blank" rel="noopener"&gt;security bulletin&lt;/a&gt;, Microsoft has already remediated these vulnerabilities, but keep an eye out for other vendors in the future to cover these CVEs.&lt;/p&gt;

&lt;h2&gt;Microsoft Non-Securities&lt;/h2&gt;

&lt;p&gt;On an earlier than normal cadence, Microsoft released non-security updates for all supported platforms as early as last Saturday. These emergency updates resolve the widespread Visual Basic errors caused by August’s Patch Tuesday release. It appears that this issue is widespread enough that Microsoft also released a one-off standalone fix for those that implement the security-only bundle as opposed to the rollup. If you have been holding off for this release, this will give you the opportunity to patch the high-profile wormable vulnerabilities announced last week. See the table below to reference the needed patches for your environment:&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Standalone&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Rollup/Cumulative&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Server 2008&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/update-for-windows-server-2008-sp2-august-16-2019-9189ac0d-098e-c413-9e47-7c2316709487" target="_blank" rel="noopener"&gt;KB4517301&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512499-preview-of-monthly-rollup-2a438d29-30c3-c80c-59e9-1cd2ec197af7" target="_blank" rel="noopener"&gt;KB4512499&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 7/Server 2008 R2&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/update-for-windows-7-sp1-and-windows-server-2008-r2-sp1-august-16-2019-1b673d02-872f-f65e-cd77-839ecb942099" target="_blank" rel="noopener"&gt;KB4517297&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512514-preview-of-monthly-rollup-eaffc486-f646-9090-c851-c1d3c39c567c" target="_blank" rel="noopener"&gt;KB4512514&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Server 2012&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/update-for-windows-server-2012-and-windows-embedded-8-standard-august-16-2019-174ba525-d26c-be4f-3520-8bea5d043ca4" target="_blank" rel="noopener"&gt;KB4517302&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512512-preview-of-monthly-rollup-7629a59a-99c7-3b17-92d2-91479c1384ee" target="_blank" rel="noopener"&gt;KB4512512&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 8.1/Server 2012 R2&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/update-for-windows-8-1-and-windows-server-2012-r2-august-16-2019-0b764a95-7c0f-d877-cfcb-fb0160796dcd" target="_blank" rel="noopener"&gt;KB4517298&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512478-preview-of-monthly-rollup-1479b9ae-d4e1-fd59-83a1-25a6de73aef5" target="_blank" rel="noopener"&gt;KB4512478&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 10 LTSB 2015&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4517276-os-build-10240-18308-29fbc9ad-be58-00f5-5846-906ae1e9e700" target="_blank" rel="noopener"&gt;KB4517276&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 10 LTSB 2016/Server 2016&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512495-os-build-14393-3181-25a21b30-f678-2672-9d36-74ed72cfc5ca" target="_blank" rel="noopener"&gt;KB4512495&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 10 1703&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512474-os-build-15063-2021-5f190d47-36e2-207c-4faa-625ca25d7268" target="_blank" rel="noopener"&gt;KB4512474&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 10 1709&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-16-2019-kb4512494-os-build-16299-1365-42525c42-a885-4d4b-f6b2-9305bda05a1c" target="_blank" rel="noopener"&gt;KB4512494&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 10 1803&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-19-2019-kb4512509-os-build-17134-984-f1054558-460a-4393-fa16-f361ab29bc5b" target="_blank" rel="noopener"&gt;KB4512509&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Windows 10 1809/Server 2019&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p align="center"&gt;&lt;a href="https://support.microsoft.com/en-us/topic/august-17-2019-kb4512534-os-build-17763-720-0b45b181-5c48-75b4-8b44-aed65f56edc5" target="_blank" rel="noopener"&gt;KB4512534&lt;/a&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;Third-Party Updates&lt;/h2&gt;

&lt;p&gt;As always, our other supported third-party vendors have been releasing non-security updates for their respective products. While these updates might not have CVEs, they may also contain valuable stability updates for your end users:&amp;nbsp;&lt;/p&gt;

&lt;table align="center" border="1" cellpadding="0" cellspacing="0"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Software Title&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti ID&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;&lt;strong&gt;Ivanti KB&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP 4.60.0.2144&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;AIMP-015&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QAIMP4602144&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apache Tomcat 8.5.45&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOMCAT-142&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOMCAT8545&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Apache Tomcat 9.0.24&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TOMCAT-141&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTOMCAT9024&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;BlueJeans 2.15.279.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;JEANS-023&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBJN2152790&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CCleaner 5.61.7392&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CCLEAN-083&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCCLEAN5617392&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;CoreFTP LE 2.2.1935&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;COREFTP-038&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QCFTP221935&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoodSync 10.10.6.6&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOODSYNC-128&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGS101066&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GoTo Opener 1.0.527&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;GOTOO-003&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QGTO10527&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Microsoft Power BI Desktop 2.72.5556.801&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PBID-063&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QBI2725556801&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Node.JS 12.9.0 (Current)&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;NOJSC-021&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QNODEJSC1290&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 63.0.3368.35&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-224&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP630336835&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Opera 63.0.3368.43&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;OPERA-225&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QOP630336843&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PeaZip 6.9.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PZIP-017&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPZIP690&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Player 2.40.0&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXP-044&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXP2400&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Plex Media Server 1.16.5.1488&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;PLXS-042&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QPLXS11651488&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Skype 8.51.0.86&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SKYPE-165&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSKY851086&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Slack Machine-Wide Installer 4.0.2&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;SMWI-034&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QSLACK402&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TeamViewer 14.5.1691&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;TVIEW-051&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QTVIEW1451691&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Visual Studio Code 1.37.1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;MSNS19-0815-CODE&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QVSCODE1371&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;Zoom Outlook Plugin 4.8.2721.0811&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;ZOOMOUT-011&lt;/p&gt;
			&lt;/td&gt;
			&lt;td nowrap="nowrap"&gt;
			&lt;p&gt;QZOOMO482721&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Thu, 22 Aug 2019 20:19:08 Z</pubDate></item></channel></rss>