Vulnerabilities / Threats
12/14/2010
04:32 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Again Sets Record With Massive Patch

The holiday season brings no respite from security maintenance duties.

For the third time this year, Microsoft has issued a record-setting security patch.

The company's December Bulletin Release includes 17 security bulletins addressing 40 vulnerabilities in Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange.

It was only in October that Microsoft set the record it just broke, with 16 security bulletins. There were however fewer individual vulnerabilities this month than in October (49). And it was two months earlier, in August, that the company had set its previous record, with 14 bulletins to address 34 vulnerabilities.

The huge October patch was supposed to front-load the task of patching so that IT administrators had a lighter schedule over the holidays. So much for that idea.

At least the December crop of bulletins brings only two "critical" ones. Fourteen are rated "important" and one is rated "moderate."

The two critical bulletins, MS10-090 and MS10-091, addressing vulnerabilities in Internet Explorer and Windows respectively, should be deployed first, according to Microsoft.

Microsoft says that has issued 106 bulletins in 2010. That's up substantially from 74 in 2009 and 78 in 2008. According to Symantec, Microsoft patched 261 vulnerabilities in 2010, far beyond its previous record of 170 in 2009. McAfee puts the count at 266.

Joshua Talbot, security intelligence manager for Symantec Security Response, said in an e-mailed statement that the most notable patch is the fix for the fourth zero-day vulnerability utilized by Stuxnet. He also said that the cumulative patch for Internet Explorer should be regarded as a high-priority fix.

Dave Marcus, director of security research and communications at McAfee Labs, said in an e-mailed statement that while the number of critical vulnerabilities is low, the larger number of vulnerabilities overall, from Microsoft and from vendors like Adobe and Oracle, indicate that the threat landscape is broadening, making its even more important for organizations to patch.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7441
Published: 2015-05-29
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

CVE-2014-9727
Published: 2015-05-29
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.

CVE-2015-0200
Published: 2015-05-29
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x before 7.0.0.8 IF2 allows local users to obtain sensitive database information via unspecified vectors.

CVE-2015-0751
Published: 2015-05-29
Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800.

CVE-2015-0752
Published: 2015-05-29
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?