A vulnerability in the Active Directory forest trusts component of Microsoft Windows could allow an unauthenticated, remote malicious user to escalate privileges on a targeted system. The vulnerability is due to an improper default setting. An attacker in the trusting forest could exploit this vulnerability by using standard operations permitted by the setting to request delegation of a ticket-granting ticket (TGT) for an identity from the trusted forest. A successful exploit could allow the malicious user to impersonate a user identity. Microsoft confirmed the vulnerability and released software updates.
This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.
Posted: 13 Mar, 201920 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – March 2019This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining ...
DHCP client has trio of remote-code exec vulns – plus SAP, Adobe issue updates
Patch Tuesday It's the second Tuesday of the month, and you know what that means: a fresh dump of security fixes from Microsoft, Adobe and others.
The March edition of Patch Tuesday includes fixes for 64 CVE-listed vulnerabilities, while Adobe addressed a pair of bugs in Photoshop and Digital Editions. Even SAP has got in on the game.
Of the 64 bugs squashed in Redmond's March update, researchers are pointing to five particular bugs as being especially noteworthy.
First, there ...
Microsoft released patches for two Win32k bugs actively under attack, along with fixes for four additional bugs that are publicly known, as part of its March Patch Tuesday security bulletin. The Win32k bugs are both elevation of privilege vulnerabilities, rated important, and tied to the way Windows handles objects in memory.
“An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete...