Microsoft Patches At Least 34 Bugs Including Pwn2Own Vulnerability

Use Netsparker


What a massive mother-load of patches Microsoft has unleashed on this month patching more than 34 security vulnerabilities including the fairly high profile vulnerability exploited at the Pwn2Own contest earlier this year in April.

Good news as long as all the average Internet users actually use Windows Update and install the latest patches, which somehow I find extremely unlikely. It’s also good news for corporates stuck using Microsoft solutions as long as they have a good patch management solution for their network.

Microsoft on Tuesday patched at least 34 security holes in a wide range of software, including a bug in its Internet Explorer browser that fetched a researcher $10,000 at a hacker contest in April. In all, Microsoft released 10 bulletins, three of which were rated “critical” because they allowed attackers to remotely install malware on victim machines. Other affected products include Windows, Office, Internet Information Services, and SharePoint.

The IE update fixes a vulnerability that fetched Peter Vreugdenhil, a researcher with Netherlands-based Vreugdenhil Research, $10,000 during the Pwn2Own contest at the CanSecWest security conference in Vancouver. He was able to take full control of the Windows 7 machine despite protections known as DEP, or data execution prevention, and ASLR, or address space layout randomization.

It’s pretty rare there’s 3 critical vulnerabilities in one shot, but well we are talking about Microsoft aren’t we. They seem to getting their act together when it comes to patching, perhaps the pressure from Firefox fixing things so quickly is getting to them.

Even Safari is kicking their ass when it comes to fixing problems. But that’s the inherent problem with Microsoft, they have so many projects and platforms, so much spaghetti code and legacy issues it prevents them from releasing stable patches in a timely manner.

They are designed to mitigate the severity of software bugs by randomizing the memory locations of code and preventing code loaded into memory from being able to be executed. Vreugdenhil was able to bypass those protections by combining two separate vulnerabilities.

The Microsoft fixes came the day after Apple fixed almost 50 vulnerabilities in its Safari browser, including a decade-old history leak that still plagues all other browsers. Microsoft has a summary here.

Safari also unleashed a massive update this past Monday including fixing the history leak we wrote about recently.

There’s also a very details report from SANS here detailing each patch, the relevant KB article and CVE number.

June 2010 Microsoft Black Tuesday Summary

Source: The Register

Posted in: Exploits/Vulnerabilities, Windows Hacking

, , , , , , , , , ,


Latest Posts:


BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.
Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.
Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.


Comments are closed.