Risk
8/12/2013
01:42 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Microsoft Plans Critical Patches For Internet Explorer, Exchange

Microsoft's security patches Tuesday will fix three critical vulnerabilities, including one that affects all current versions of Internet Explorer.

10 Hidden Benefits of Windows 8.1
10 Hidden Benefits of Windows 8.1
(click image for larger view)
Microsoft will issue eight security updates Tuesday, three of which are designated as "critical," the company's most urgent category. Two of them stand out because of the crucial software they involve: Internet Explorer and Exchange Server.

As usual, Microsoft previewed this month's Patch Tuesday releases in an advance notice. The precise nature of each vulnerability has yet to be detailed, but the critical update involving Internet Explorer will be an obvious priority for IT administrators.

The bundle will fix a remote execution exploit that spans all currently-supported versions of Internet Explorer, from IE 6, which is only supported on Windows XP, all the way to IE 10, which runs on Windows 7, Windows 8 and Windows RT. According to figures released this week by Microsoft, Internet Explorer accounts for more than half of worldwide desktop traffic. Given that browsers are already one of malware authors' primary targets, such a widespread bug requires prompt attention.

[ How reliable are Microsoft cloud services? Read Microsoft Office 365 Reveals Uptime Figures. ]

Excluding the newest edition, Microsoft has issued seven Internet Explorer updates so far this year, including an unusual out-of-band fix in January.

The bug afflicting Exchange Server has drawn attention as well. In a blog post, Wolfgang Kandek, CTO of security vendor Qualys, said it will be interesting to see if the release is related to a recent Oracle update involving the company's Outside In product. Exchange uses Outside In to display an attached document without launching that document's native application.

Outside In has necessitated numerous security patches in the last year. Oracle released patches last month for Outside In, but because they arrived after Microsoft had already deployed July's security updates, Kandek and other security professionals have inferred that August's Patch Tuesday is implementing the fix.

One thing's for certain: Given the amount of sensitive content that moves over email each day, a critical Exchange Server update is always important, whatever the bug.

The third critical fix involves Windows XP and Windows Server 2003. Both products will lose official support soon, with XP retiring in April and Windows Server to follow in July 2015. As such, these patches won't impact as many customers as the aforementioned ones. They'll still keep plenty of Microsoft customers busy, though; over 37% of the world's computers still run Windows XP, including over 70% in China.

The other five updates were each categorized as "important," Microsoft's second-highest designation. They fix bugs in various Windows versions that could allow attackers to launch denial-of-service attacks, execute malicious programs or otherwise gain illicit control of a machine. Four of the five updates require that machines be restarted.

Paul Henry, an analyst with security vendor Lumension, said in a blog post that Microsoft has patched bugs more quickly in 2013 than it has in the past.

Security experts expected more security updates in 2013, he wrote, "given Microsoft's commitment to cleaning up the low hanging fruit out there." Including the eight bulletins Microsoft is releasing this week, Microsoft has released 65 security bulletins so far this year, or seven more than it had released through the same point in 2013, Henry noted.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4632
Published: 2015-01-31
VMware vSphere Data Protection (VDP) 5.1, 5.5 before 5.5.9, and 5.8 before 5.8.1 does not properly verify X.509 certificates from vCenter Server SSL servers, which allows man-in-the-middle attackers to spoof servers, and bypass intended backup and restore access restrictions, via a crafted certifica...

CVE-2014-7287
Published: 2015-01-31
The key-management component in Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allows remote attackers to trigger unintended content in outbound e-mail messages via a crafted key UID value in an inbound e-mail message, as demonstrated by the outbound Subject header.

CVE-2014-7288
Published: 2015-01-31
Symantec PGP Universal Server and Encryption Management Server before 3.3.2 MP7 allow remote authenticated administrators to execute arbitrary shell commands via a crafted command line in a database-backup restore action.

CVE-2014-8266
Published: 2015-01-31
Multiple cross-site scripting (XSS) vulnerabilities in the note-creation page in QPR Portal 2014.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) body field.

CVE-2014-8267
Published: 2015-01-31
Cross-site scripting (XSS) vulnerability in QPR Portal 2014.1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the RID parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.