Feeds

IE, Excel fixes star in bumper Patch Tuesday

More from the hamster wheel of patching pain

High performance access to file storage

Internet Explorer and Excel security updates are the most pressing patching priorities from the bumper crop of 16 bulletins issued as part of Microsoft's June Patch Tuesday updates.

Nine of the bulletins carry a maximum severity of "critical" while the remaining seven earn the lesser tag of "important".

Tuesday also brought critical fixes for Adobe Reader and Oracle for Java, placing an even heavier burden on sys admins.

Security services firm Qualys rates a patch which address 11 vulnerabilities in Internet Explorer (MS11-050) as the most severe security risk in the batch. All supported versions of IE (6-9) will need patching. The updates address a flaw in handling the VMLmarkup language, among other bugs.

Banking Trojan kits feed off browser vulnerabilities, hence the need to patch the IE flaws sooner rather than later before they are targeted by the bad guys behind ZeuS and SpyEye. The Java and Reader security bugs need plugging quickly for much the same reasons.

An update (MS11-045) that tackles eight vulnerabilities in all versions of Excel, including for Mac OS X, is next on the priority list. Redmond ranks the security update as "important" because the end user is required to open an attacker-provided file.

Qualys says that such trickery is all too easily accomplished, and the potential of the flaw to be used in targeted attacks against business users make plugging the flaw a priority.

Another item in the patch batch (MS11-046) tackles a local privilege escalation flaw in the "afd.sys" driver, the only bulletin of the 16 to tackle a vulnerability that's in the wild. The 16 bulletins collectively address 34 vulnerabilities.

Other high priority bulletins MS11-042 and MS11-043 tackle critical flaws in the SMB and DFS clients on Windows. All supported versions of Windows will need patching for one reason or another.

Microsoft's bulletin is here, and an easier-to-digest overview from the SANS Institute's Internet Storm Centre is here.

An analysis from Qualys on the updates is here. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.