Feeds

MS roll out exploit prediction with Patch Tuesday

Here is the attack forecast

Boost IT visibility and business value

Microsoft plans to debut impact predictions related to vulnerabilities with the next edition of its Patch Tuesday update cycle.

The 11 bulletins due to arrive later on Tuesday (14 October) will contain "weather predictions" detailing factors such as whether exploit code is likely to appear, alongside the established rating system on the severity of vulnerabilities. Microsoft hopes its Exploitability Index will help organisations to prioritise patching.

Microsoft, unlike Cisco and organisations like US Cert, won't be rating vulnerabilities under Common Vulnerability Scoring System. This is because it reckons (with some justification) that descriptions such as 'critical' or 'moderate' are more meaningful to the majority of people than ratings of between one and ten covered by CVSS.

Information on whether or not an exploit is available and assessments on the severity of threats are already available through the SANS Institute's well regarded monthly summary of Microsoft's bulletin. The Exploitability Index, announced two months ago, adds a predictive (crystal ball gazing) element to the mix.

Microsoft is also due to begin rolling out a program to give security vendors advance details on upcoming patches. The Microsoft Active Protections Program (MAPP), also announced at the Black Hat conference back in August, will operate under non-disclosure agreements to give anti-virus suppliers and the like the chance to prepare for patches and the attacks against unpatched Windows PCs that sometimes follow. Previously, the likes of Symantec and Sophos had no more idea what was due to arrive on Patch Tuesday than the great unwashed.

Tuesday's updates are due to cover flaws involving various components of Windows and Office, as well as an update from Microsoft Host Integration Server software. Four of these updates earn the dreaded rating of critical. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Brit celebs' homes VANISH from Google's Street View
Tony Blair's digs now a Tone-y Blur
German government orders local CIA station chief to pack his bags
Sour Krauts arrest second local in domestic spy ring probe
Snowden leaks latest: NSA, FBI g-men spied on Muslim-American chiefs
US Navy veteran? Lawmaker? Academic? You're all POTENTIAL TERRORISTS
LibreSSL crypto library leaps from OpenBSD to Linux, OS X, more
First cross-platform version of cleaned-up OpenSSL fork
UK's emergency data slurp: IT giants panicked over 'legal uncertainty'
PM says rushed-through DRIP law will 'plug holes' in existing legislation
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
Teensy card skimmers found in gullets of ATMs
Hi-tech fraudsters treading more softly, but gas still yielding bang for buck
Weaponised Flash flaw can pinch just about anything from anywhere
This is a 'patch now or regret it sooner-rather-than-later' mess for you and webmasters
Victim of Tor-hidden revenge smut site sues Tor Project developers
But EFF lawyer says deep-web team 'no more liable' than web server makers
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximizing your infrastructure through virtualization
Virtualization continues to be one of the most effective ways to consolidate, reduce cost, and make data centers more efficient.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.