Published on: 09 October 2019
Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20191008/security-update-deployment-information-october-8-2019
Please note that Microsoft announced that the extended support for Windows 7 will be ceased on 14 January 2020 and no security updates will be provided after that. Users should arrange should arrange upgrading the Windows to Windows 10 or migrating to other supported technology.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, spoofing, tampering, elevation of privilege, denial of service and security feature bypass.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/28ef0a64-489c-e911-a994-000d3a33c573
https://support.microsoft.com/en-us/help/20191008/security-update-deployment-information-october-8-2019
https://www.hkcert.org/my_url/en/alert/19100901
https://www.us-cert.gov/ncas/current-activity/2019/10/08/microsoft-releases-october-2019-security-updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1315 (to CVE-2019-1323)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1325 (to CVE-2019-1331)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1333 (to CVE-2019-1347)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1356 (to CVE-2019-1359)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1361 (to CVE-2019-1366)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1376