Feeds

Critical Outlook and Excel bugs star in March Patch Tuesday

Black Tuesday updates focus on MS Office

Remote control for virtualized desktops

Microsoft released four updates on Tuesday as part of its regular Patch Tuesday update cycle.

The quartet of updates - all critical - concentrates on Microsoft Office and addresses 12 distinct vulnerabilities. The most pressing of these (MS08-014) covers patches for Excel against vulnerabilities that have become the focus of recent hacker attacks. Updates to all supported versions of Outlook also merit close attention.

The other two advisories cover vulnerabilities in Microsoft Office and Microsoft Office Web Components.

"Because all four of the patches affect Microsoft Office, these patches cannot be ignored or delayed. The broad install base of Microsoft Office makes Office vulnerabilities an enticing target for hackers and cyber criminals," said Alan Bentley, VP in EMEA of patching specialist Lumension.

Bentley added that updating vulnerable Outlook installations ought to be a priority for sys admins. The update to Outlook covers a vulnerability in parsing of "mailto:" URIs that allows malware to be injected onto targeted systems.

"Microsoft Outlook is the dominant email client in use today, and email is also one of the most common attack vehicles used by hackers against organisations. This makes MS08-015 a critical, remote-code-execution vulnerability which affects virtually all versions of Outlook, the biggest priority for IT administrators this Patch Tuesday," he added.

Microsoft's summary of its March patch batch can be found here.

As usual, the SANS Institute's Internet Storm Centre (ISC) has published an easy to understand graphical overview here. ISC notes that only the Excel bugs have become the target of hacking attack, making them the highest patching priority.

Symantec, by contrast, reckons the advisory to Microsoft Office Web Components is potentially the worst of the bunch.

Given this divergence of opinion, the safest option would be to apply all four critical updates sooner rather than later. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.