Welcome to this August Patch Monday Bulletin. We have fewer patch releases this month but they all have potential arbitrary code execution vulnerabilities present. Get started by applying the Adobe Flash patch for APSB15-19. At this point there does not seem to be active attacks against any of the 34 vulnerabilities that are being remediated but this should be a good start due to the active attacks against prior recent vulnerabilities. If Safari or Firefox are used then follow up with those since the browser is one of the top methods of infection within the enterprise. Quicktime also resolved several vulnerabilities this month so finish with this patch If Quicktime is found in your environment.
When it comes to endpoint security, the best first line of defense is patch management. Take the first step to quantifying your IT risk and enhancing your endpoint security posture with the Lumension® Patch Scanner you can:
Click here assess your vulnerabilities now
So, without further ado, here’s the chart of non-MS patches that affect Windows platforms in the past month.
Patch data provided by:
Product Version Affected
Date Released by Vendor
Severity / Our Recommendation
Arbitrary Code Execution
Critical: Priority 1/ Upgrade within 72 hours
Critical: Priority 3/ Update at admin’s discretion
Arbitrary Code Execution, Denial of Service
Update as soon as possible
Arbitrary Code Execution, Denial of Service, Spoofing, Security Bypass, Information Disclosure
Arbitrary Code Execution, Denial of Service, Privilege Escalation, Security Bypass