Security

Microsoft holds last Patch Tuesday of the year with 72 gifts for admins

Twas the night before Christmas, and all through the house, patching was done with the click of a mouse


Patch Tuesday Microsoft hasn't added too much coal to the stocking this Patch Tuesday, with just 72 fixes, only one of which scored more than nine on the CVSS threat ranking scale.

Of more immediate concern is one vulnerability in the list that is actively being exploited - CVE-2024-49138 - which is allowing escalation of privilege attacks on the Windows Common Log File System Driver that can lead to full system access. Windows 10 and 11 systems are vulnerable, as are Server 2019 and later builds.

The highest-rated vuln in this month's goodie bag is CVE-2024-49112, which gets a CVSS score of 9.8, but Microsoft notes it's difficult to exploit it. The problem lies with Windows Lightweight Directory Access Protocol (LDAP), which would allow an attacker to remotely execute code on Windows 10 systems and every server OS since 2008 using custom LDAP calls.

Microsoft does suggest a workaround for anyone unwilling or unable to patch. If domain controllers are set to block inbound RPCs from untrusted networks, or shut off from the internet altogether, then the flaw is unexploitable. The issue was spotted by Yuki Chen, one of Microsoft's top private flaw finders.

Of the six fixes rated as most likely to be exploited, CVE-2024-49093 is the most serious, with the flaw in Windows Resilient File System earning a CVSS score of 8.8 and leaving operators vulnerable to malicious low-privilege AppContainers. Once on the system, the attacker could upgrade their privileges and execute code.

Two of the other likely exploitation targets are the elevation of privileges flaws in Windows Common Log File System Driver - CVE-2024-49088 and CVE-2024-49090. Neither require any user interaction and could allow a rogue operator to grasp system privileges, as does CVE-2024-49114 in Windows Cloud Files Mini Filter Driver.

The last two on the most likely to get hit list are code execution flaws. CVE-2024-49070 is a Sharepoint issue, but the attacker would need local access to make it work. But CVE-2024-49122 in Microsoft Message Queuing can allow remote code execution if the intruder gets a malicious packet to an MSMQ server.

Adobe the grinch

After Microsoft's relatively mild patch unboxing, Adobe dropped a total of 167 flaw fixes today. Hopefully its heart will grow three sizes next month.

If you're using Adobe Experience Manager then there are a whopping 91 flaws to fix. Only one is critical but all should be patched - it looks like Adobe has been saving some of these up for a rainy day.

Adobe Connect also got a big update - 22 flaws were fixed and six of them are rated critical. They are mostly cross-site scripting issues, but there's a nasty CVSS 9.3 improper access control issue that should be corrected.

Things are better for Acrobat; only six flaws fixed, none of which have a CVSS score higher than seven. Adobe Animate gets an unlucky 13, all with a CVSS score of 7.8 oddly enough. InDesign and Substance 3D Modeler each have nine issues to fix, but none exceed a CVSS score of 7.8.

Of the four flaws in Adobe Media Encoder, three allow arbitrary code execution (plus three more for Adobe Substance 3D Sampler) and there's a denial-of-service issue to be fixed in the former too. Illustrator has a couple of critical issues to patch, as does Adobe Substance 3D Painter. ®

Send us news
24 Comments

Microsoft investigating 365 Office activation gremlin

Says it's not sure what the issue is but points at admins tweaking licensing options

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Microsoft Edge takes a victory lap with some high-looking usage stats for 2024

Lots of big numbers, but market share wasn't one of them

Microsoft coughs up yet more Windows 11 24H2 headaches

Users report the sound of silence from operating system update

AI's rising tide lifts all chips as AMD Instinct, cloudy silicon vie for a slice of Nvidia's pie

Analyst estimates show growing apetite for alternative infrastructure

When old Microsoft codenames crop up in curious places

Chicago is my kind of driver model

Suggested Actions fails to suggest its own survival as Windows 11 feature killed

Final curtain call for weird wingman

The winner of last year's Windows Ugly Sweater is ...

Register readers have spoken

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Windows 11 24H2 strikes again – Outlook might not start with Google Workspace Sync running

Meanwhile, 365 Enterprise users have a date for new Outlook rollout

Microsoft hijacks keyboard shortcut to bring Copilot to your attention

AI assistant goes native – sort of – for Windows Insiders

Good news! You'll soon be able to send faxes again with Windows 11 24H2

Microsoft squashes eSCL bug