Vulnerabilities / Threats
12/14/2010
04:32 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Again Sets Record With Massive Patch

The holiday season brings no respite from security maintenance duties.

For the third time this year, Microsoft has issued a record-setting security patch.

The company's December Bulletin Release includes 17 security bulletins addressing 40 vulnerabilities in Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange.

It was only in October that Microsoft set the record it just broke, with 16 security bulletins. There were however fewer individual vulnerabilities this month than in October (49). And it was two months earlier, in August, that the company had set its previous record, with 14 bulletins to address 34 vulnerabilities.

The huge October patch was supposed to front-load the task of patching so that IT administrators had a lighter schedule over the holidays. So much for that idea.

At least the December crop of bulletins brings only two "critical" ones. Fourteen are rated "important" and one is rated "moderate."

The two critical bulletins, MS10-090 and MS10-091, addressing vulnerabilities in Internet Explorer and Windows respectively, should be deployed first, according to Microsoft.

Microsoft says that has issued 106 bulletins in 2010. That's up substantially from 74 in 2009 and 78 in 2008. According to Symantec, Microsoft patched 261 vulnerabilities in 2010, far beyond its previous record of 170 in 2009. McAfee puts the count at 266.

Joshua Talbot, security intelligence manager for Symantec Security Response, said in an e-mailed statement that the most notable patch is the fix for the fourth zero-day vulnerability utilized by Stuxnet. He also said that the cumulative patch for Internet Explorer should be regarded as a high-priority fix.

Dave Marcus, director of security research and communications at McAfee Labs, said in an e-mailed statement that while the number of critical vulnerabilities is low, the larger number of vulnerabilities overall, from Microsoft and from vendors like Adobe and Oracle, indicate that the threat landscape is broadening, making its even more important for organizations to patch.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers