Risk
8/12/2013
01:42 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Microsoft Plans Critical Patches For Internet Explorer, Exchange

Microsoft's security patches Tuesday will fix three critical vulnerabilities, including one that affects all current versions of Internet Explorer.

10 Hidden Benefits of Windows 8.1
10 Hidden Benefits of Windows 8.1
(click image for larger view)
Microsoft will issue eight security updates Tuesday, three of which are designated as "critical," the company's most urgent category. Two of them stand out because of the crucial software they involve: Internet Explorer and Exchange Server.

As usual, Microsoft previewed this month's Patch Tuesday releases in an advance notice. The precise nature of each vulnerability has yet to be detailed, but the critical update involving Internet Explorer will be an obvious priority for IT administrators.

The bundle will fix a remote execution exploit that spans all currently-supported versions of Internet Explorer, from IE 6, which is only supported on Windows XP, all the way to IE 10, which runs on Windows 7, Windows 8 and Windows RT. According to figures released this week by Microsoft, Internet Explorer accounts for more than half of worldwide desktop traffic. Given that browsers are already one of malware authors' primary targets, such a widespread bug requires prompt attention.

[ How reliable are Microsoft cloud services? Read Microsoft Office 365 Reveals Uptime Figures. ]

Excluding the newest edition, Microsoft has issued seven Internet Explorer updates so far this year, including an unusual out-of-band fix in January.

The bug afflicting Exchange Server has drawn attention as well. In a blog post, Wolfgang Kandek, CTO of security vendor Qualys, said it will be interesting to see if the release is related to a recent Oracle update involving the company's Outside In product. Exchange uses Outside In to display an attached document without launching that document's native application.

Outside In has necessitated numerous security patches in the last year. Oracle released patches last month for Outside In, but because they arrived after Microsoft had already deployed July's security updates, Kandek and other security professionals have inferred that August's Patch Tuesday is implementing the fix.

One thing's for certain: Given the amount of sensitive content that moves over email each day, a critical Exchange Server update is always important, whatever the bug.

The third critical fix involves Windows XP and Windows Server 2003. Both products will lose official support soon, with XP retiring in April and Windows Server to follow in July 2015. As such, these patches won't impact as many customers as the aforementioned ones. They'll still keep plenty of Microsoft customers busy, though; over 37% of the world's computers still run Windows XP, including over 70% in China.

The other five updates were each categorized as "important," Microsoft's second-highest designation. They fix bugs in various Windows versions that could allow attackers to launch denial-of-service attacks, execute malicious programs or otherwise gain illicit control of a machine. Four of the five updates require that machines be restarted.

Paul Henry, an analyst with security vendor Lumension, said in a blog post that Microsoft has patched bugs more quickly in 2013 than it has in the past.

Security experts expected more security updates in 2013, he wrote, "given Microsoft's commitment to cleaning up the low hanging fruit out there." Including the eight bulletins Microsoft is releasing this week, Microsoft has released 65 security bulletins so far this year, or seven more than it had released through the same point in 2013, Henry noted.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?