Risk

7/12/2010
10:24 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Patch Tuesday: XP SP 2, Windows Help Center Patches Coming

Tuesday Microsoft said it will patch the critical Windows Help and Support Center vulnerability that has been widely attacked. This month's Patch Tuesday will also the last day of support for Windows 2000 and Windows XP Service Pack 2.

Tuesday Microsoft said it will patch the critical Windows Help and Support Center vulnerability that has been widely attacked. This month's Patch Tuesday will also the last day of support for Windows 2000 and Windows XP Service Pack 2.According to Microsoft's advanced bulletin notification, the company will patch a critical vulnerability in Windows Help and Support Center. The flaw has been under attack for about a month. It's be a good idea to test this patch and get in into place as soon as possible. This was Microsoft's assessment of the situation from last month:

We've been monitoring for active attacks on the Windows Help and Support Center vulnerability (CVE-2010-1885) since the advisory was released on June 10th. At first, we only saw legitimate researchers testing innocuous proof-of-concepts. Then, early on June 15th, the first real public exploits emerged. Those initial exploits were targeted and fairly limited. In the past week, however, attacks have picked up and are no longer limited to specific geographies or targets, and we would like to ensure that customers are aware of this broader distribution.

Chances are that the attacks have only grown progressively worse since. On Tuesday Microsoft will also release three other patches: one for Windows XP and Server 2003, and two for its Office productivity software.

This update will also be the last update for Windows 2000 and Windows XP Service Pack 2. If you plan on using XP SP 2, you'd better hope that no more vulnerabilities are discovered going forward. Chances of that, however, are slim. So at the very least it's time to upgrade to SP3, or Windows 7.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11487
PUBLISHED: 2018-05-26
PHPMyWind 5.5 has XSS via the cid parameter to newsshow.php, or the query string to news.php or about.php.
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.