-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2021.0193
           Microsoft Patch Tuesday update for Microsoft Extended
              Security Update (ESU) products for October 2021
                              13 October 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          Windows 7
                  Windows Server 2008
                  Windows Server 2008 R2
Operating System: Windows
Impact/Access:    Execute Arbitrary Code/Commands -- Remote with User Interaction
                  Increased Privileges            -- Existing Account            
                  Denial of Service               -- Remote/Unauthenticated      
                  Provide Misleading Information  -- Remote with User Interaction
                  Access Confidential Data        -- Existing Account            
                  Unauthorised Access             -- Existing Account            
Resolution:       Patch/Upgrade
CVE Names:        CVE-2021-41343 CVE-2021-41342 CVE-2021-41340
                  CVE-2021-41335 CVE-2021-41332 CVE-2021-41331
                  CVE-2021-40489 CVE-2021-40469 CVE-2021-40467
                  CVE-2021-40466 CVE-2021-40465 CVE-2021-40460
                  CVE-2021-40455 CVE-2021-40449 CVE-2021-40443
                  CVE-2021-38663 CVE-2021-38662 CVE-2021-36970
                  CVE-2021-36953 CVE-2021-26442 
Reference:        ASB-2021.0190

Comment: Microsoft notes that CVE-2021-40449 is being actively exploited

OVERVIEW

        Microsoft has released its monthly security patch update for the
        month of October 2021.
        
        This update resolves 20 vulnerabilities across the following
        products: [1]
        
         Windows 7 for 32-bit Systems Service Pack 1
         Windows 7 for x64-based Systems Service Pack 1
         Windows Server 2008 R2 for x64-based Systems Service Pack 1
         Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
         Windows Server 2008 for 32-bit Systems Service Pack 2
         Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
         Windows Server 2008 for x64-based Systems Service Pack 2
         Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2021-26442  Elevation of Privilege   Important
         CVE-2021-36953  Denial of Service        Important
         CVE-2021-36970  Spoofing                 Important
         CVE-2021-38662  Information Disclosure   Important
         CVE-2021-38663  Information Disclosure   Important
         CVE-2021-40443  Elevation of Privilege   Important
         CVE-2021-40449  Elevation of Privilege   Important
         CVE-2021-40455  Spoofing                 Important
         CVE-2021-40460  Security Feature Bypass  Important
         CVE-2021-40465  Remote Code Execution    Important
         CVE-2021-40466  Elevation of Privilege   Important
         CVE-2021-40467  Elevation of Privilege   Important
         CVE-2021-40469  Remote Code Execution    Important
         CVE-2021-40489  Elevation of Privilege   Important
         CVE-2021-41331  Remote Code Execution    Important
         CVE-2021-41332  Information Disclosure   Important
         CVE-2021-41335  Elevation of Privilege   Important
         CVE-2021-41340  Remote Code Execution    Important
         CVE-2021-41342  Remote Code Execution    Important
         CVE-2021-41343  Information Disclosure   Important


MITIGATION

        Microsoft recommends updating the software with the version made
        available on the Microsoft Update Catalogue for the following
        Knowledge Base articles. [1].
        
         KB5006671, KB5006715, KB5006728, KB5006736, KB5006743


REFERENCES

        [1] Microsoft Security Update Guidance
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=DkMp
-----END PGP SIGNATURE-----