Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/3/2008
10:26 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Microsoft Ready To Patch Eight Security Flaws Next Week

The software maker's monthly batch even includes important fixes for Microsoft Vista Service Patch (I mean Pack) 1.

The software maker's monthly batch even includes important fixes for Microsoft Vista Service Patch (I mean Pack) 1.As part of its routine, Microsoft today pre-announced the patches it plans to roll out during "Patch Tuesday," which is the second Tuesday of each calendar month.

In total, Microsoft is prepping five vulnerabilities it's ranked as "critical" (which is the most severe ranking) and three it's deemed as "important."

This month's round of patches seem to touch each one of its operating systems: Windows Vista, Windows XP, and Windows 2000, as well as Windows Server 2003 and Windows Server 2008. And, of course, Internet Explorer gets some love tossed its way as well.

While vulnerabilities Microsoft rates as "important" can leave enterprises open to attack, it's those it has ranked as critical that can be remotely attacked. Remotely exploitable vulnerabilities are the kind of holes malware writers can use to target worms, crash system availability through denial-of-service attacks, or simply install nearly whatever software they wish and commandeer control over the un-patch system. Not to let Microsoft steal all of the vulnerability thunder this week, our friends at 1 Infinite Loop released fixes for no less than 11 security vulnerabilities for its Apple QuickTime media player for both Mac and Windows systems.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16123
PUBLISHED: 2020-12-04
An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by...
CVE-2018-21270
PUBLISHED: 2020-12-03
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
CVE-2020-26248
PUBLISHED: 2020-12-03
In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module.
CVE-2020-29529
PUBLISHED: 2020-12-03
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.
CVE-2020-29534
PUBLISHED: 2020-12-03
An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.