Feeds

One, two, three, four MS patches at our door

Monthly fix number two

  • alert
  • submit to reddit

Protecting against web application threats using SSL

Microsoft yesterday released a set of four security patches in its second stab at releasing security fixes once a month.

A cumulative patch for Internet Explorer, a fix for a buffer overflow vulnerability in components of Microsoft's FrontPage Server and a patch for a flaw with Workstation Service that could crackers to inject code on vulnerable systems are all deemed critical by Redmond. A fix for a flaw in Microsoft Word and that could allow arbitrary Code to run is given the lower category of "important".

A buffer overflow vulnerability in the Microsoft Workstation service represents the most serious risk. Workstation service is responsible for handling remote connections between computers and network resources such as fileservers or networked printers and is enabled by default on vulnerable platforms (windows 2000 - SP2 and later - and XP).

Security tools vendor ISS warns that "vulnerability is a standard stack overflow, and therefore it may be relatively easy to exploit".

"Exploits written to take advantage of standard stack overflows are generally very robust, and are good candidates for use in the creation of Internet worms," it warns.

According to Network Associates, the vulns covered by the four patches "range in scope from allowing arbitrary code to be run on a users machine (all of them)... to a buffer overrun vulnerability in FrontPage Server Extension and another vulnerability in the SmartHTML Interpreter could lead to denial of service on the server running FrontPage Extension."

All the more reason then to apply Microsoft's security fixes, a summary of which can be found here and here. ®

Related Stories

MS shores up five critical security holes
Ballmer's new MS security fix - same patches, but 'nicer'
Beefed-up firewall, new version of Update for XP SP2
Microsoft shoots the Windows Messenger

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.