Risk
8/12/2013
01:42 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Microsoft Plans Critical Patches For Internet Explorer, Exchange

Microsoft's security patches Tuesday will fix three critical vulnerabilities, including one that affects all current versions of Internet Explorer.

10 Hidden Benefits of Windows 8.1
10 Hidden Benefits of Windows 8.1
(click image for larger view)
Microsoft will issue eight security updates Tuesday, three of which are designated as "critical," the company's most urgent category. Two of them stand out because of the crucial software they involve: Internet Explorer and Exchange Server.

As usual, Microsoft previewed this month's Patch Tuesday releases in an advance notice. The precise nature of each vulnerability has yet to be detailed, but the critical update involving Internet Explorer will be an obvious priority for IT administrators.

The bundle will fix a remote execution exploit that spans all currently-supported versions of Internet Explorer, from IE 6, which is only supported on Windows XP, all the way to IE 10, which runs on Windows 7, Windows 8 and Windows RT. According to figures released this week by Microsoft, Internet Explorer accounts for more than half of worldwide desktop traffic. Given that browsers are already one of malware authors' primary targets, such a widespread bug requires prompt attention.

[ How reliable are Microsoft cloud services? Read Microsoft Office 365 Reveals Uptime Figures. ]

Excluding the newest edition, Microsoft has issued seven Internet Explorer updates so far this year, including an unusual out-of-band fix in January.

The bug afflicting Exchange Server has drawn attention as well. In a blog post, Wolfgang Kandek, CTO of security vendor Qualys, said it will be interesting to see if the release is related to a recent Oracle update involving the company's Outside In product. Exchange uses Outside In to display an attached document without launching that document's native application.

Outside In has necessitated numerous security patches in the last year. Oracle released patches last month for Outside In, but because they arrived after Microsoft had already deployed July's security updates, Kandek and other security professionals have inferred that August's Patch Tuesday is implementing the fix.

One thing's for certain: Given the amount of sensitive content that moves over email each day, a critical Exchange Server update is always important, whatever the bug.

The third critical fix involves Windows XP and Windows Server 2003. Both products will lose official support soon, with XP retiring in April and Windows Server to follow in July 2015. As such, these patches won't impact as many customers as the aforementioned ones. They'll still keep plenty of Microsoft customers busy, though; over 37% of the world's computers still run Windows XP, including over 70% in China.

The other five updates were each categorized as "important," Microsoft's second-highest designation. They fix bugs in various Windows versions that could allow attackers to launch denial-of-service attacks, execute malicious programs or otherwise gain illicit control of a machine. Four of the five updates require that machines be restarted.

Paul Henry, an analyst with security vendor Lumension, said in a blog post that Microsoft has patched bugs more quickly in 2013 than it has in the past.

Security experts expected more security updates in 2013, he wrote, "given Microsoft's commitment to cleaning up the low hanging fruit out there." Including the eight bulletins Microsoft is releasing this week, Microsoft has released 65 security bulletins so far this year, or seven more than it had released through the same point in 2013, Henry noted.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.