That’s a good thing because it’s had some horribly effective vulnerabilities revealed lately. It managed to package up a massive bundle of patches for 64 vulnerabilities in Windows, Office and a few other software packages.
So if you’re running any Windows installations anywhere, make sure you get your Windows Update on ASAP and get those patches downloaded.
Microsoft has patched a record 64 vulnerabilities in Windows, Office and five other software packages, many of which allowed attackers to remotely install malware on end user machines.
The most important fixes addressed a vulnerability in the Internet Explorer browser that was exploited in last month’s Pwn2Own contest. Although details were kept confidential, hackers have begun exploiting the critical flaw in real-world attacks, Microsoft warned. The use-after-free vulnerability affects versions 8 and earlier of the Microsoft browser.
The other top priority should be updates that patch critical vulnerabilities in the way Windows handles networking requests using the SMB, or Server Message Block, protocol. By sending malformed packets, attackers can remotely install malware on vulnerable machines with no user interaction required.
Researchers have warned that the flaw could be exploited to install self-replicating worms in much the way a similar vulnerability from 2008 did. Even after Microsoft issued an emergency patch for the flaw, it still opened the door to the Conficker Worm, which commandeered millions of machines.
If you remember back in March we reported on Day One At Pwn2Own Takes Out Microsoft Internet Explorer and Apple Safari, they’ve fixed that flaw – which has been exploited in the wild.
I think Pwn2Own does play an important role in the security industry and really helps get some nasty bugs patched up. Of course I don’t think any of us are using Internet Explorer anyway…but still – a lot of people are.
Even on this site 18.3% of visitors are still using some version of IE (with the majority using 8, then 7 then 9 with 6 thankfully in 4th place).
The monster patch batch also included relief for another flaw in all supported versions of Windows that Google has said was being exploited by “politically motivated” attackers against activists. The MS11-026 update fixes the way Windows parses webpages containing MIME-formatted content.
Microsoft also introduced two tools that are designed to thwart malware attacks. One extends a protection known as Office File Validation to older versions of Office. The feature, which was previously available only to users of Office 2010, helps users to identify malicious Office files by scanning and validating them before they are opened.
The second tool is an update to the winload.exe component that helps flag device drivers that have been booby-trapped to install malware.
The patches were released in 17 bulletins, nine of which carried a rating of “critical,” a designation typically reserved for vulnerabilities that can be remotely exploited to install malware or expose sensitive user data. The remaining eight bulletins were rated “important.”
If you just wanna get down to the details of the patches and what was released, you can read the summary from Microsoft here:
Also check this out:
And of course SANS always has a useful recap:
Source: The Register
- Tiger – Unix Security Audit & Intrusion Detection Tool
- Egress-Assess – Test Network Egress Data Detection
- Just-Metadata – Gathers & Analyse IP Address Metadata
- Microsoft Rushes Out Critical RPC Bug Fix
- No BEAST Fix From Microsoft In December Patch Tuesday – But They Fixed Duqu Bug
- Microsoft Preps Windows Security Fix for Patch Tuesday
Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 119,683 views
- Password Hasher Firefox Extension - 117,430 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,630 views