Vulnerabilities / Threats
05:25 PM
Connect Directly

Microsoft Fixes Four Flaws

This month's patch cycle may leave IT admins with some extra time on their hands.

Microsoft's March patch cycle should be relatively painless: The company has released just three security bulletins addressing four different vulnerabilities.

The lull should be welcomed following several months last year when Microsoft's security bulletins set records.

One reason for the light patch cycle is that fixes for some known problems are missing. Kaspersky security researcher Roel Schouwenberg notes that two well-known vulnerabilities were not addressed this month, an XSS vulnerability (CVE-2011-0096) and a Windows Browser protocol vulnerability.

Andrew Storms, director of security for nCircle, expects there will be more patches next month as a result of the CanSecWest Pwn2Own hacking competition, which starts on Wednesday.

Microsoft's March patches address flaws in Microsoft Windows and Office. Only one of three bulletins is rated critical, MS11-015.

It resolves a vulnerability in DirectShow and a vulnerability in Windows Media Player and Windows Media Center.

Symantec says that the more serious of the two flaws could allow remote code execution if a user can be convinced to open a malicious Microsoft Digital Video Recording (.DVR-MS) file.

"To exploit this issue a user has to open a malicious file, so some social engineering would need to be employed," said Symantec security researcher Joshua Talbot in an e-mailed statement. "However, because DVR-MS files are media files used by common Windows applications, it's not hard to imagine a scenario where an attacker spreads a malicious file purporting to be a video clip related to some popular current event."

Qualys CTO Wolfgang Kandek suggests that if IT administrators find themselves with more time than usual this month due to the light patch cycle, they may wish to consider identifying whether there's any further need for Internet Explorer 6. Microsoft is now urging companies to upgrade from IE 6. Kandek says that security scans conducted by his company show 26% of machines still have IE6 installed, considerably higher than the 12% reported by Microsoft.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.