{"id":3364,"date":"2012-08-17T11:54:42","date_gmt":"2012-08-17T10:54:42","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3364"},"modified":"2015-09-09T19:36:57","modified_gmt":"2015-09-09T11:36:57","slug":"microsoft-patches-critical-security-vulnerabilities-in-windows-office-ie-exchange-sql-server","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2012\/08\/microsoft-patches-critical-security-vulnerabilities-in-windows-office-ie-exchange-sql-server\/","title":{"rendered":"Microsoft Patches Critical Security Vulnerabilities In Windows, Office, IE, Exchange & SQL Server"},"content":{"rendered":"

Another huge raft of critical fixes has been pushed out by Microsoft<\/a> across almost their entire range of products, including client and server side software and the Windows OS itself.<\/p>\n

It’s been a while since I’ve seen such a huge variety of security issues in one update including 5 critical vulnerabilities.<\/p>\n

If you are running a Microsoft oriented organization you better get your update testing rig on-line and get rolling ASAP.<\/p>\n

Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report.<\/p>\n

The security holes, described in five critical and four important bulletins, affect multiple products, including Windows, Internet Explorer, Exchange, SQL Server and Office. In the worst-case scenarios, exploits could give attackers control of affected systems.<\/p>\n

The first critical bulletin, labeled MS12-060, involves Windows Common Controls vulnerabilities, which affect Office, SQL Server, other server products and developer tools.<\/p>\n

There have been “limited, targeted attacks” to try to exploit this security hole, but no public proof-of-concept code has been made available to Microsoft’s knowledge, wrote Microsoft security official Yunsun Wee in a related blog post.<\/p>\n

If a user visits a website that contains “specially crafted content” designed to exploit the vulnerability, attackers could execute code remotely on the affected machine. However, users would have to be tricked into visiting such a website. The malicious code can also be sent as an email attachment, but users would need to open the attachment for the attack to work. <\/p><\/blockquote>\n

Most of them don’t seem to be out in the wild as such, as in they don’t have confirmed publicly available exploits. There have been cases of targeting attacks using these exploits, so they would be very much considered 0-day attacks and are probably being traded or sold in the underground.<\/p>\n

The Common Controls exploit would be mitigated against if you had trained your users well on the dangers of opening unknown attachments as it would come in the form of a malicious .rtf file – most likely via e-mail.<\/p>\n