Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/8/2010
01:40 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Preps Record Security Patch Tuesday

To lighten the patch burden over the holiday season, Microsoft plans to release an unprecedented number of fixes in October.

Just in time for Cybersecurity Awareness Month, Microsoft next week plans to release its largest security patch to date.

It was only two months ago, in August, that Microsoft broke its previous October, 2009, record, with the release of 14 bulletins to address 34 vulnerabilities.

Microsoft Internet Explorer 9 Beta Revealed
Microsoft Internet Explorer 9 Beta Revealed
(click image for larger view and for full photo gallery)

Come October 12, 2010, IT administrators should be prepared for 16 bulletins covering 49 vulnerabilities.

Four of the bulletins are designated "critical," ten are rated "important," and two are "moderate." As is typical, Microsoft is not providing any details about vulnerabilities because that information could be used to create exploits prior to the release of its patch.

"The theory behind the larger October patch is that many industries go into 'lock-down' mode with their critical infrastructure as the end of year approaches," said Andrew Storms, director of security operations for nCircle, in an e-mailed statement. "Finance and retail sectors in particular are extremely careful with changes in the latter part of the year given the heavy volume of online shopping."

Storms notes that the known DLL load hijacking vulnerability is not specifically mentioned in Microsoft's notice about its upcoming patch, making it unclear how or whether the company will address the issue.

In late August, Microsoft published a security advisory warning that insecure DLL loading could be exploited. The issue was not addressed in the company's September patch.

In a blog post, Wolfgang Kandek, CTO of Qualys, notes that one of the critical updates covers Internet Explorer, versions 6, 7, and 8, and that Microsoft Word 2010 makes its first appearance in a security advisory.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17672
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
CVE-2019-17673
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
CVE-2019-17674
PUBLISHED: 2019-10-17
WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.
CVE-2019-17675
PUBLISHED: 2019-10-17
WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.
CVE-2019-17676
PUBLISHED: 2019-10-17
app/system/admin/admin/index.class.php in MetInfo 7.0.0beta allows a CSRF attack to add a user account via a doSaveSetup action to admin/index.php, as demonstrated by an admin/?n=admin&c=index&a=doSaveSetup URI.