Critical remote code execution vulnerability in Windows DNS server (CVE-2020-1350)
Hello there, Patch Tuesday July 2020 comes with a fix for the critical vulnerability CVE-2020-1350 in Windows DNS Server. This vulnerability is classified 'wormable' and has been given a CVSS score of 10. Cause of this vulnerability: This vulnerability exists due to the improper handling of requests by Windows Domain Name System (DNS) Servers. Impact of this vulnerability: To exploit this vulnerability, an unauthenticated attacker should send malicious requests to a Windows DNS server.
Patch Tuesday July 2020 - Supported updates
Hello everyone, Below is breakdown of all the updates released this Patch Tuesday. New Security Bulletins : 2020-07 Servicing Stack Update for Windows 10 Version 1809 and Windows Server 2019 (KB4558997) 2020-07 Servicing Stack Update for Windows 10 Version 1803 (KB4565552) 2020-07 Servicing Stack Update for Windows 10 Version 1709 (KB4565553) 2020-07 Servicing Stack Update for Windows 10 Version 1903 and Windows Server, version 1903 (KB4565554) 2020-07 Servicing Stack Update for Windows 10 Version
Google stable channel updated to 84.0.4147.89
Hello everyone, Chrome 84 has been updated to stable channel 84.0.4147.89 for Windows, Mac, and Linux. Various security issues have been fixed with this release, the details of which are as follows: CVE-ID Vulnerability details Severity CVE-2020-6510 Heap buffer overflow in background fetch Critical CVE-2020-6511 Side-channel information leakage in content security policy High CVE-2020-6512 Type Confusion in V8 High CVE-2020-6513 Heap buffer overflow in PDFium High
Combine Patch Manager Plus Cloud with Desktop Central
Hi, we are Desktop Central users (on-premise) and I have seen that Patch Manager Plus has a "Cloud" version. Is there a way to combine cloud patching in our current Desktop Central management? We would like to update patches in remote users and foreign delegations (without a remote on premise server for each delegation). Thanks.
Microsoft Visual C++ 2015-2019 Redistributable (14.26.28720)
Hi everyone Has anyone looked into these two updates that Desktop Central offers as third-party updates? Microsoft Visual C++ 2015-2019 Redistributable (14.26.28720) - patch ID 31457 Microsoft Visual C++ 2015-2019 Redistributable (x64) (14.26.28720) - patch ID 314573 Reason I am asking: DC says these updates are missing, however, Microsoft Update, WSUS and a third-party vulnerability scanner do not show these updates as missing. The fact that Microsoft does not even offer these updates via Microsoft
Job history for Automatic Patch Deployment
Hi, We have two automatic patch deployment routines configured to run every fortnight. Is there any way to view the history of those routines to see when they last ran, what computers were patched and what patches were installed? Also can this information be got by way of a scheduled report? thanks Ed.
Google releases chrome stable channel update 83.0.4103.116
Hello everyone, Google has updated its chrome stable channel to 83.0.4103.116 for Windows, Mac, and Linux. This following high severity vulnerability has been fixed in this release. CVE-2020-6509: Use-after-free in extensions To patch this vulnerability using Desktop Central, initiate a sync between the Patch Database and Desktop Central server. Once this is done, search for the following Patch IDs or Bulletin ID and install them in target systems. Patch ID Bulletin ID Patch Description 314753
Patch Tuesday June 2020 - Supported updates
Hello everyone, This month, we are witnessing the largest ever Patch Tuesday with 129 security fixes. Here is the list of supported updates New Security Bulletins : 2020-06 Security Update for Adobe Flash Player for Windows (KB4561600) 2020-06 Security Only Quality Update for Windows Server 2008 (KB4561645) (ESU) 2020-06 Security Only Quality Update for Windows 7 and Windows Server 2008 R2 (KB4561669) (ESU) 2020-06 Security Only Quality Update for Windows Server 2012 (KB4561674) 2020-06 Security
Patching In Progress - stuck on offline machines
Here's the situation: I have a production deployment that consists of 1400 machines. We are at roughly 80% complete however, there is a list of 11 machines that have the status of "Patching in Progress." The problem here is that 9 of those machines have shown as offline for the last 3 days. This seems to be causing an issue to where the remainder of the machines are falling behind on getting patched. The WOL Status is always listed as "In Progress." and the WOl Remarks are listed as Processing wake
Chrome releases security updates to fix critical vulnerabilities
Hello everyone, Chrome has updated its stable channel to 83.0.4103.97 for Windows, Mac, and Linux. This update comes with security fixes for several vulnerabilities. The details of the vulnerabilities are as follows: CVE ID Vulnerabilities Severity CVE-2020-6493 Use after free in WebAuthentication High CVE-2020-6494 Incorrect security UI in payments High CVE-2020-6495 Insufficient policy enforcement in developer tools High CVE-2020-6496 Use after free in payments High To patch these vulnerabilities
Chrome stable channel update fixes 3 vulnerabilities
Hello folks, Google has updated its chrome stable channel to 83.0.4103.106 for Windows, Mac, and Linux. This update comes with fixes for three vulnerabilities. The details of these vulnerabilities are as follows: CVE ID Vulnerability Severity CVE-2020-6505 Use after free in speech High CVE-2020-6506 Insufficient policy enforcement in WebView High CVE-2020-6507 Out of bounds write in V8 High To install this update using Desktop Central, initiate a sync between the Patch Database and Desktop
Windows SMB protocol hit again by a new critical vulnerability - SMBleed
Hello everyone, A mere three months after patching a wormable SMBv3 vulnerability dubbed SMBGhost (CVE-2020-0796), cybersecurity researchers have identified another similar vulnerability in Windows SMB protocol. This vulnerability is called SMBleed (CVE-2020-1206) and has a severity rating score of 10. What is SMBleed? SMBleed is a new critical wormable vulnerability found in the Windows Server Message Block (SMB) protocol. This vulnerability allows attackers to leak kernel memory remotely. SMBleed
Unknown Error. Code : -2145116137
On a Windows 2008 R2 server I am getting this error code. Please advise.
Mozilla releases security fixes for Firefox 77
Hello everyone, Mozilla has released security fixes for vulnerabilities in Firefox 77. The details of the vulnerabilities fixed are as follows CVE ID Vulnerability Severity CVE-2020-12399 Timing attack on DSA signatures in NSS library High CVE-2020-12405 Use-after-free in SharedWorkerService High CVE-2020-12406 JavaScript type confusion with NativeTypes High CVE-2020-12407 WebRender leaking GPU memory when using border-image CSS directive Moderate CVE-2020-12408 URL spoofing when using IP
Rollout of Windows 10 2004 Feature updates
Hello All, A Quick heads-up, Microsoft has released its Windows 10 2004 feature updates for users. Below you can find a few highlights of this feature update. Fast identity authentication through Windows Hello is now supported across all major browsers. Windows Defender system guard enables a higher level of firmware protection. Setup Diag is automatically installed. Improvements in Windows Powershell cmdlets. Go ahead and read this document to know what the pre-requisites are and how
Critical issue while deploying Cisco Webex patch
Hello everyone, The Cisco Webex patch with Patch ID 313977 was released on Apr-28-2020 at 04:40 pm GMT. Regrettably, on installing this patch in certain machines, few of our customers got in touch with us stating a few issues. Following this, the patch was removed from the Desktop Central repository on the morning of Apr-29-2020, for further analysis of the situation. Issue when deploying Cisco Webex patch: Customers who have synced the database and deployed the Cisco Webex patch in the following
Desktop Central patch management cloud install for Remote Workers
Hi, since Covid-19 about 95% of our staff is now working from home. We have to be able to approve patches for our systems. All of our systems connect through a vpn however we do not want the patches to push to system through vpn because it causes bandwidth issues. We have heard there is an option to have employees working from home to receive the patches directly from the cloud and not from the DC server repository. Essentially they would receive the patch approval through vpn but the actual patches
Patchscan timeout
Hello, i have a problem with desktop central. first the setup: i installed windows central 10 on a windows server 2019 essentials with installed domain controller in a virtual machine for evaluation purposes. Agent installed fine on the machine. But when i start the patchscan i always get a timeout. Checked the article for that but no success. Any help is appreciated. thanks and best regards
Chrome 83.0.4103.61 fixes 38 security flaws
Hello everyone, The latest stable version of the web browser ' Google Chrome ', version 83.0.4103.61, aka Chrome 83, is released for Windows, Mac and Linux. This update contains 38 security fixes and packs a number of new features including enhanced privacy controls, new settings for managing cookie files, a new Safety Check option, support for tab groups, new graphics for web form elements, a new API for detecting barcodes, and a new anti-XSS security feature. Here's a quick glance at the list
Software installed but Patch not applicable?
Hello, short Question, according Desktop Central, the Software is installed in a minor Version, but the Patch is not applicable? 1. Installed Software at Example Desktops: 2. Patch for Deployment: 3. Not Applicable Message I configured the Task as "Patch Installation"....could it be, that DC think, Version 15.5.xx is not applicable because the installed Version is 15.1.xx? But if i choose "Software Deployment", did DC install the new Version 15.5.xx additionally or did DC upgrade the existing Version
Zoom Update 4.6.20033.0407 not working
Hi, Today a patch for Zoom was available. None of our clients show this patch as needed (installed version 4.6.19253). Patch version is Zoom (4.6.20033.0407). If apply this patch log shows: Patch detected as Not applicable since its components are available in the system through other patches deployed in the same configuration or due to some other reason. Any advice appreciated. Thanks, Juergen
Adobe releases patches for vulnerabilities in Reader and Acrobat
Hello everyone, In this month's security release, Adobe has fixed security vulnerabilities in Reader and Acrobat for Windows and macOS. If these vulnerabilities are exploited, they could cause remote code execution attacks and information leaks. The details of the vulnerabilities are as follows: CVE-ID Severity Impact CVE-2020-9610 Important Application denial-of-service CVE-2020-9612 Critical Arbitrary Code Execution CVE-2020-9615 Critical Security feature bypass CVE-2020-9597 CVE-2020-9594
May 2020 Patch Tuesday updates
Hello Everyone, Below is breakdown of all the updates released this Patch Tuesday. New Security Bulletins : 2020-05 Security Only Quality Update for Windows Server 2008 (KB4556854) (ESU) 2020-05 Security Only Quality Update for Windows 7 and Windows Server 2008 R2 (KB4556843) (ESU) 2020-05 Security Only Quality Update for Windows Server 2012 (KB4556852) 2020-05 Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2 (KB4556853) 2020-05 Security Monthly Quality Rollup for Windows Server
Need additional field in "Inventory" --> "Software", "Managed Installations" column to display system names, not just count of systems where software is installed
Requesting that the "Managed Installations" field display not just the count of systems where a particular software application is installed but the actual hostname of the system on which that particular software application is installed.
Chrome fixes critical vulnerabilities - CVE-2020-6831 and CVE-2020-6464
Hello everyone, Google Chrome has updated its stable channel to 81.0.4044.138 for Windows, Mac, and Linux. This update addresses two security vulnerabilities. CVE ID Vulnerability Severity CVE-2020-6831 Stack buffer overflow in SCTP High CVE-2020-6464 Type confusion in Blink High To patch these vulnerabilities, initiate a sync between the Desktop Central server and the Central Patch repository. After the sync, search for the following Patch IDs or Bulletin ID and install them in your target
Mozilla fixes security vulnerabilities in Firefox 76
Hello everyone, Mozilla has released fixes for several security vulnerabilities in Firefox 76. Below are the details of the vulnerabilities fixed. CVE ID Vulnerability Severity CVE-2020-12387 Use-after-free during worker shutdown Critical CVE-2020-12388 Sandbox escape with improperly guarded access tokens Critical CVE-2020-12389 Sandbox escape with improperly separated process types High CVE-2020-12390 Incorrect serialization of nsIPrincipal.origin for IPv6 addresses Moderate CVE-2020-12391
Patching for closed network not finishing update from internet
Its been 4 days trying to sync the patch database from internet but it never complete downloading update information using the command "patchsync.bat -c updatedb", it always stuck some where in the process, I left it for two days but it never finishes. What could be the problem? Thanks
All Windows versions compromised due to critical Zero-day vulnerabilities
Hello folks, Two critical zero-day vulnerabilities have been discovered in Windows Adobe Type Manager Library. Both these vulnerabilities are unpatched and allows attackers to take remote control of the systems affected (Remote Code Execution vulnerability). As of now, the attacks are not widespread and only limited targeted systems are hit. Versions affected All versions of the Windows Operating system is susceptible to attacks including Windows version 10, 8.1, 7, and Server 2008, 2012, 2016,
Email Notification not Enabled for Vulnerability Update
I see the below message on Desktop Central --> Patch Mgmt--> Dashboard Anyhow I am not able to click on the Configure Now. It seems a link is not in place.
Windows 10 Pro x64 1909 Feature Pack update issue
I have followed the instructions at the link below to setup the following Win10 1909 feature pack updates... Win10 Pro x86 Win10 Pro x64 Win10 Enterprise x86 Win10 Enterprise x64 https://www.manageengine.com/patch-management/how-to/windows-10-feature-pack-deployment-1909.html I named the four ISO files as per the instructions in the link for the English files. Three of the four are working fine... Win10 Pro x86 1909 (107613-Win10_1909_enx32.iso) Win10 Enterprise x86 1909 (107615-Win10_1909_en_enterprisex32.iso)
How to create a daily patch management report with trend graph charts on Desktop Central?
Hello, I want to create a report of patch management with details as follows: It should show a daily trend with a graph chart This kind of chart needs to show the missing critical patches/vulnerabilities. Is there any way to make such report? Thank you.
Chrome fixes critical vulnerabilities in the latest stable channel update
Hello everyone, Google Chrome stable channel has been updated to 81.0.4044.129 for Windows, Mac, and Linux. This update comes with security fixes for two critical vulnerabilities. The details of the vulnerabilities are as follows: CVE-ID Vulnerability Severity CVE-2020-6461 Use after free in storage High CVE-2020-6462 Use after free in task scheduling High To patch these vulnerabilities, initiate a sync between the Desktop Central server and the Central Patch repository. Search for the following
Windows Server 2019 update to 1909
Hye, I cannot see any feature update for Windows server 2019 to version 1903 or 1909. Can this be rolled out by using Desktop Central? If so is there instrucions on how to somewhere please?
Chrome releases stable channel update to address critical vulnerabilities
Hello everyone, Google has updated its Chrome stable channel to 81.0.4044.122 for Windows, Mac, and Linux. This update comes with fixes for three critical vulnerabilities CVE ID Vulnerability Severity CVE-2020-6458 Out of bounds read and write in PDFium High CVE-2020-6459 Use after free in payments High CVE-2020-6460 Insufficient data validation in URL formatting High To patch these vulnerabilities using Desktop Central, initiate a sync between the Desktop Central server and the Central Patch
Patch Tuesday April 2020 - updates breakdown
Hello guys, Here is a quick breakdown of the April Patch Tuesday updates New Security Bulletins : 2020-04 Servicing Stack Update for Windows Server 2019 and Windows 10 Version 1809 (KB4549947) 2020-04 Servicing Stack Update for Windows 10 Version 1607 and Windows Server 2016 (KB4550994) 2020-04 Servicing Stack Update for Windows 10 Version 1903 and Windows Server, version 1903 (KB4552152) 2020-04 Servicing Stack Update for Windows 10 Version 1909 and Windows Server, version 1909 (KB4552152) 2020-04
Google chrome patches critical vulnerability - CVE-2020-6457
Hello folks, Chrome has updated its stable channel to 81.0.4044.113 for Windows, Mac, and Linux systems. This update includes the security fix for the critical vulnerability CVE-2020-6457. This is a use-after free vulnerability in Speech recognizer component in Google Chrome. A remote attacker who exploits this vulnerability can create a specially crafted web page and trick victims into clicking it, triggering the use-after-free error to execute arbitrary codes on the target systems. Initiate
Office 365 updates never gets installed
We are using Desktop Central and updates for Office 365 never gets installed. We have created APD tasks but of no use. We always gets the below error while patching it. "Patch update delayed since application is used by another process" Is there any way Desktop Central can patch Office Applications?
Several Test Group for Patch Deployment
Hi! How can i make testing of patches for several groups? The idea is to test patches in the test environment, then patches goes to the test group of a few real computers, and after installing patches on this computers they will be approved and automaticaly installed on all computers in my network. So, can i implement testing patches before approving in two steps?
Patching Open Applications
Some apps, such as Zoom or Office 365, won't update while the user has them open. You get the following message: "Patch update delayed since application is used by another process." Is there any way to force these apps to close as part of the normal patching process? Or do I have to create a configuration/scheduled task to reboot or forcefully close everything?
Firefox 75 and Firefox ESR 68.7 fix high severity vulnerabilities
Firefox rolled out the latest stable version Firefox 75.0 and its corresponding ESR version Firefox ESR 68.7 to fix a number of vulnerabilities found in their earlier versions. Here's a list of CVEs fixed and their details: CVE ID Severity Vulnerability Description Fixed in CVE-2020-6828 High Preference overwrite via crafted Intent from malicious Android application Firefox ESR 68.7 CVE-2020-6827 High Custom Tabs in Firefox for Android could have the URI spoofed Firefox ESR 68.7 CVE-2020-6821
Next Page