Vulnerabilities / Threats
05:25 PM
Connect Directly

Microsoft Fixes Four Flaws

This month's patch cycle may leave IT admins with some extra time on their hands.

Microsoft's March patch cycle should be relatively painless: The company has released just three security bulletins addressing four different vulnerabilities.

The lull should be welcomed following several months last year when Microsoft's security bulletins set records.

One reason for the light patch cycle is that fixes for some known problems are missing. Kaspersky security researcher Roel Schouwenberg notes that two well-known vulnerabilities were not addressed this month, an XSS vulnerability (CVE-2011-0096) and a Windows Browser protocol vulnerability.

Andrew Storms, director of security for nCircle, expects there will be more patches next month as a result of the CanSecWest Pwn2Own hacking competition, which starts on Wednesday.

Microsoft's March patches address flaws in Microsoft Windows and Office. Only one of three bulletins is rated critical, MS11-015.

It resolves a vulnerability in DirectShow and a vulnerability in Windows Media Player and Windows Media Center.

Symantec says that the more serious of the two flaws could allow remote code execution if a user can be convinced to open a malicious Microsoft Digital Video Recording (.DVR-MS) file.

"To exploit this issue a user has to open a malicious file, so some social engineering would need to be employed," said Symantec security researcher Joshua Talbot in an e-mailed statement. "However, because DVR-MS files are media files used by common Windows applications, it's not hard to imagine a scenario where an attacker spreads a malicious file purporting to be a video clip related to some popular current event."

Qualys CTO Wolfgang Kandek suggests that if IT administrators find themselves with more time than usual this month due to the light patch cycle, they may wish to consider identifying whether there's any further need for Internet Explorer 6. Microsoft is now urging companies to upgrade from IE 6. Kandek says that security scans conducted by his company show 26% of machines still have IE6 installed, considerably higher than the 12% reported by Microsoft.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.