Risk
8/12/2013
01:42 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Microsoft Plans Critical Patches For Internet Explorer, Exchange

Microsoft's security patches Tuesday will fix three critical vulnerabilities, including one that affects all current versions of Internet Explorer.

10 Hidden Benefits of Windows 8.1
10 Hidden Benefits of Windows 8.1
(click image for larger view)
Microsoft will issue eight security updates Tuesday, three of which are designated as "critical," the company's most urgent category. Two of them stand out because of the crucial software they involve: Internet Explorer and Exchange Server.

As usual, Microsoft previewed this month's Patch Tuesday releases in an advance notice. The precise nature of each vulnerability has yet to be detailed, but the critical update involving Internet Explorer will be an obvious priority for IT administrators.

The bundle will fix a remote execution exploit that spans all currently-supported versions of Internet Explorer, from IE 6, which is only supported on Windows XP, all the way to IE 10, which runs on Windows 7, Windows 8 and Windows RT. According to figures released this week by Microsoft, Internet Explorer accounts for more than half of worldwide desktop traffic. Given that browsers are already one of malware authors' primary targets, such a widespread bug requires prompt attention.

[ How reliable are Microsoft cloud services? Read Microsoft Office 365 Reveals Uptime Figures. ]

Excluding the newest edition, Microsoft has issued seven Internet Explorer updates so far this year, including an unusual out-of-band fix in January.

The bug afflicting Exchange Server has drawn attention as well. In a blog post, Wolfgang Kandek, CTO of security vendor Qualys, said it will be interesting to see if the release is related to a recent Oracle update involving the company's Outside In product. Exchange uses Outside In to display an attached document without launching that document's native application.

Outside In has necessitated numerous security patches in the last year. Oracle released patches last month for Outside In, but because they arrived after Microsoft had already deployed July's security updates, Kandek and other security professionals have inferred that August's Patch Tuesday is implementing the fix.

One thing's for certain: Given the amount of sensitive content that moves over email each day, a critical Exchange Server update is always important, whatever the bug.

The third critical fix involves Windows XP and Windows Server 2003. Both products will lose official support soon, with XP retiring in April and Windows Server to follow in July 2015. As such, these patches won't impact as many customers as the aforementioned ones. They'll still keep plenty of Microsoft customers busy, though; over 37% of the world's computers still run Windows XP, including over 70% in China.

The other five updates were each categorized as "important," Microsoft's second-highest designation. They fix bugs in various Windows versions that could allow attackers to launch denial-of-service attacks, execute malicious programs or otherwise gain illicit control of a machine. Four of the five updates require that machines be restarted.

Paul Henry, an analyst with security vendor Lumension, said in a blog post that Microsoft has patched bugs more quickly in 2013 than it has in the past.

Security experts expected more security updates in 2013, he wrote, "given Microsoft's commitment to cleaning up the low hanging fruit out there." Including the eight bulletins Microsoft is releasing this week, Microsoft has released 65 security bulletins so far this year, or seven more than it had released through the same point in 2013, Henry noted.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Listen Now Incident Response War Gaming: Practicing the Post-Breach Panicking
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?