Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/8/2010
01:40 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Preps Record Security Patch Tuesday

To lighten the patch burden over the holiday season, Microsoft plans to release an unprecedented number of fixes in October.

Just in time for Cybersecurity Awareness Month, Microsoft next week plans to release its largest security patch to date.

It was only two months ago, in August, that Microsoft broke its previous October, 2009, record, with the release of 14 bulletins to address 34 vulnerabilities.

Microsoft Internet Explorer 9 Beta Revealed
Microsoft Internet Explorer 9 Beta Revealed
(click image for larger view and for full photo gallery)

Come October 12, 2010, IT administrators should be prepared for 16 bulletins covering 49 vulnerabilities.

Four of the bulletins are designated "critical," ten are rated "important," and two are "moderate." As is typical, Microsoft is not providing any details about vulnerabilities because that information could be used to create exploits prior to the release of its patch.

"The theory behind the larger October patch is that many industries go into 'lock-down' mode with their critical infrastructure as the end of year approaches," said Andrew Storms, director of security operations for nCircle, in an e-mailed statement. "Finance and retail sectors in particular are extremely careful with changes in the latter part of the year given the heavy volume of online shopping."

Storms notes that the known DLL load hijacking vulnerability is not specifically mentioned in Microsoft's notice about its upcoming patch, making it unclear how or whether the company will address the issue.

In late August, Microsoft published a security advisory warning that insecure DLL loading could be exploited. The issue was not addressed in the company's September patch.

In a blog post, Wolfgang Kandek, CTO of Qualys, notes that one of the critical updates covers Internet Explorer, versions 6, 7, and 8, and that Microsoft Word 2010 makes its first appearance in a security advisory.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: STOP LOOKING IN HERE FOR YOUR PASSWORD!!!
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28488
PUBLISHED: 2021-01-22
This affects all versions of package jquery-ui; all versions of package org.fujion.webjars:jquery-ui. When the "dialog" is injected into an HTML tag more than once, the browser and the application may crash.
CVE-2021-22847
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1's API fail to filter POST request parameters. Remote attackers can inject SQL syntax and execute commands without privilege.
CVE-2021-22849
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1 backend editing function does not filter special characters. Users after log-in can inject JavaScript syntax to perform a stored XSS (Stored Cross-site scripting) attack.
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...