Patch Analysis for November 2020

Welcome to this November Patch Monday Bulletin. This month there are updates for Adobe, Apple, Google, and Mozilla. The biggest issue this month is Chrome with 3 vulnerabilities that were actively attacked in the wild. CVE-2020-16009 is an “Inappropriate Implementation” vulnerability that allows an attacker to exploit the browser when a user visits a malicious web page. CVE-2020-16013 and CVE-2020-16017 were both attacked in the wild exploiting another “Inappropriate Implementation” as well as a “use after free in site isolation” vulnerability. Both vulnerabilities require a user to navigate to a malicious web page to execute code. Updates were available on November 11th for these vulnerabilities. Chrome should autoupdate but users will often leave browser sessions open for extended lengths of time if they do not reboot their machines frequently. Follow up Chrome with Firefox updates. CVE-2020-1599 was exploited in the wild against Chrome and may affect Firefox as well but it can only be exploited if an obscure preference is toggled on Firefox for Linux or Android OS. Adobe had relatively few updates this month and there were no Priority 1 patches, but you should review updates for Acrobat and Reader. Finally, review the environment for installations of iTunes for Windows and update if necessary.

Over the years we've had millions of visitors to Every month we have thousands and thousands of visitors to our Security Log Encyclopedia which documents all of the Security Log event ID’s for Windows Server OS’s. Back in 2007 when SharePoint added auditing capability, I realized that my audience not only needed the event information from SharePoint but I also found a similar need in SQL Server and Exchange. So not only did I document the data but I also started to develop the means to extract that event data from these applications so that it’s accessible and useable to the end user. Some 8 years later and LOGbinder is continuing to grow as companies realize LOGbinder bridges the gap between these applications and their infosec team. Visit to download a free 30-day fully functional trial and see the security event data that you have literally been missing.

So, without further ado, here’s the chart of non MS patches this month.

Patch data provided by:



Product Version Affected

Date Released by Vendor

Vulnerability Info

Severity / Our Recommendation

Multiple CVE’s

Adobe Connect

11.0 and earlier


Cross Site Scripting

Important Priority 3: Update at admin’s discretion

Multiple CVE’s

Adobe Acrobat and Reader

Continuous 2020.012.20048?and?earlier

Classic 2020 2020.001.30005 and earlier

Classic 2017 2017.011.30175?and?earlier


Arbitrary Code Execution, Privilege Escalation, Information Disclosure, Security Bypass

Critical Priority 2: Update within 30 days

Multiple CVE’s

iTunes for Windows

Before 12.11


Information Disclosure, Arbitrary Code Execution, Denial of Service

Update after testing

Multiple CVE’s

Google Chrome

Win/Linux before 87.0.4280.66

Mac Before 87.0.4280.67


Use After Free, Security Bypass,

Update as soon as possible

Multiple CVE’s

Mozilla Firefox

Before 83/ESR 78.5


Security Bypass, Information Disclosure, Cross Site Scripting, Denial of Service

Update after testing

Multiple CVE’s

Mozilla Thunderbird

Before 78.5


Security Bypass, Information Disclosure, Cross Site Scripting, Denial of Service

Update after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The "Randy’s Recommendation" comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Upcoming Webinars
    Additional Resources