Vulnerabilities / Threats
05:25 PM
Connect Directly

Microsoft Fixes Four Flaws

This month's patch cycle may leave IT admins with some extra time on their hands.

Microsoft's March patch cycle should be relatively painless: The company has released just three security bulletins addressing four different vulnerabilities.

The lull should be welcomed following several months last year when Microsoft's security bulletins set records.

One reason for the light patch cycle is that fixes for some known problems are missing. Kaspersky security researcher Roel Schouwenberg notes that two well-known vulnerabilities were not addressed this month, an XSS vulnerability (CVE-2011-0096) and a Windows Browser protocol vulnerability.

Andrew Storms, director of security for nCircle, expects there will be more patches next month as a result of the CanSecWest Pwn2Own hacking competition, which starts on Wednesday.

Microsoft's March patches address flaws in Microsoft Windows and Office. Only one of three bulletins is rated critical, MS11-015.

It resolves a vulnerability in DirectShow and a vulnerability in Windows Media Player and Windows Media Center.

Symantec says that the more serious of the two flaws could allow remote code execution if a user can be convinced to open a malicious Microsoft Digital Video Recording (.DVR-MS) file.

"To exploit this issue a user has to open a malicious file, so some social engineering would need to be employed," said Symantec security researcher Joshua Talbot in an e-mailed statement. "However, because DVR-MS files are media files used by common Windows applications, it's not hard to imagine a scenario where an attacker spreads a malicious file purporting to be a video clip related to some popular current event."

Qualys CTO Wolfgang Kandek suggests that if IT administrators find themselves with more time than usual this month due to the light patch cycle, they may wish to consider identifying whether there's any further need for Internet Explorer 6. Microsoft is now urging companies to upgrade from IE 6. Kandek says that security scans conducted by his company show 26% of machines still have IE6 installed, considerably higher than the 12% reported by Microsoft.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server,,,, and allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

Published: 2014-11-22
IBM Security Network Protection 5.1 before FP13, 5.1.1 before FP8, 5.1.2 before FP9, before FP5, 5.2 before FP5, and 5.3 before FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?