Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
On Your Mark, Get Set... Patch
Microsoft may be readying seven new patches for tomorrow, but few IT managers think it's a lucky number
Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
July 10, 2006
3 Min Read
Microsoft will issue seven security bulletins on its monthly Patch Tuesday tomorrow, at least two of which will be labeled as "critical," Microsoft's highest ranking. There will be four patches for Windows and three for Office.
Fresh patches certainly don't mean the software giant will be resting any time soon. The French Security Incident Response Team (FrSIRT) yesterday found a new Office security hole it labeled as "critical" that lets attackers launch a denial-of-service attack or even take complete control of the system if a user opens an infected Word file. It's unclear whether tomorrow's patches will cover this vulnerability.
The latest patches follow various reports of Excel and Word holes since then, as well as the software giant's dozen last month. (See Microsoft Prepares to Patch Things Up, Unpatched Excel Flaw Surfaces, Attacks Mad, and Windows Flaw, Word Trojan Found.) "We're over our average number of patches just for these two months," says Eric Schultze, chief security architect for Shavlik Technologies. "But this doesn't mean Microsoft is getting worse or setting new records…it's just a timing issue. Microsoft just happened to have all of these things ready to go at the same time."
Although Microsoft gave users a heads up on tomorrow's patches with an advanced notification, the company doesn't provide details, so no one knows for sure what's in store. But it's likely the patches will cover known vulnerabilities that leave Excel and Internet Explorer open to zero-day attacks. And although Microsoft won't likely address the new vulnerability found by FrSIRT directly, the patches could take care of it, says Shavlik's Schultze, who doesn't consider the new hole to be a major problem since it requires a user opening a file for the attack to execute.
"Sometimes Microsoft is fixing one thing that is known, and it causes it to fix other things that are related but not yet published," he says. "So there's a good chance it [the latest vulnerability] could be patched tomorrow."
The latest Office vulnerability lies in a memory access error in the "mso.dll" library, according to the FrSIRT. "If this does what FrSIRT says it does, it could be mighty nasty," says Joe Hernick, director of IT at the Loomis Chaffee School. "Here's a big chance for Microsoft to shine and address this while the iron is hot. But my expectation is there will be yet another patch" later for it.
Jim Czyzewski, senior information systems specialist for MidMichigan Medical Center Midland, a PatchLink customer, says his top priorities tomorrow will be Windows patches. He and his team will meet and evaluate the patches when they arrive and then prioritize them. "We'll stage them based on how we rate them," he says.
Microsoft's latest round of patches won't be earth-shattering, but Microsoft says some will require reboots, a corporate IT manager's worst nightmare, according to Hernick. "And if I was in a corporate environment, these patches would be a pain in the butt because I would have to put them on a Windows server to test them with all the custom macros and application ties first," he says. "But it's not that big of a deal for a small organization. I'm just going to throw them on our server."
But can Microsoft continue playing catch-up with its software vulnerabilities? Richard Stiennon, president of IT-Harvest, says it's time Microsoft revamped IE, without its buggy legacy code. "They just can't chase this continuously," he says. "Ideally, I'd like to see them encapsulate Explorer in a virtual machine or other sandbox that's impervious to these types of attacks."
— Kelly Jackson Higgins, Senior Editor, Dark Reading
About the Author(s)
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.
You May Also Like
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Unbiased Testing. Unbeatable ResultsFeb 22, 2024
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024