Feeds

Three critical patches star in MS update

No word on Word fixes, yet

Using blade systems to cut costs and sharpen efficiencies

Microsoft issued seven patches on Tuesday - one more than expected - as part of its monthly Patch Tuesday update cycle. Three of the updates earn the dreaded rating of critical.

As expected, Redmond is yet to address two critical bugs in its Word office application that have become the subject of Trojan attacks over the last week or so.

The most pressing of the critical flaws MS has addressed this month is a cumulative update to Internet Explorer, which fixes a number of flaws including a script handling bug, which security vendor Symantec warns might lend itself to attacks that could result in a "complete system compromise". The bug might be exploited via so-called drive-by downloads providing users can be tricked into visiting websites containing malicious code. IE 5 and 6 users need to upgrade in order to defend themselves against the bug.

Another critical flaw involves a vulnerability in Windows Media Player. The flaw stems from an unchecked buffer in Windows Media Player code involved in handling Advanced Streaming Format (ASF) files. The vulnerability might be exploited by malicious Web-based Windows Media Player content or if an infected file is opened through affected Windows Media Player versions. The flaw affects all versions of Windows Media Player 6.4, 7.1, 9 and 10.

The third critical flaw for December involves a Vulnerability in Visual Studio 2005 which, once again, lends itself to remote code execution. Developers are urged to apply patches to defend their systems from attack.

Microsoft's four other bulletins this month address flaws rated as "important" involving Outlook Express, the SNMP network management protocol, a privilege elevation flaw in Windows and a bug in remote installation services. A full run down of Microsoft's updates this month - critical or otherwise can be found here. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.