Feeds

Microsoft to send users 4 critical patches on Valentine's Day

Sealed with an XSS

Beginner's guide to SSL certificates

Microsoft plans to publish nine updates next Tuesday – four of which are critical – as part of a Valentine's Day edition of its Patch Tuesday update cycle.

Highlights of the batch, which collectively address 21 vulnerabilities, include a critical update for Internet Explorer.

There are also two critical fixes for Windows itself, plus one for Microsoft's .NET framework. Three the five remaining "important" fixes grapple with remote code execution-type vulnerabilities, one of which involves Office. Flaws of this type are best addressed sooner rather than later because they might easily be exploited by malware slingers.

Patching IE ought to be be the highest priority, according to vulnerability scanning and web services firm Qualys.

"[W]e saw last month how quickly attackers are incorporating browser-based attacks into their toolkits; an exploit for MS12-004 was detected a mere 15 days after Patch Tuesday," notes Wolfgang Kandek, CTO of Qualys, in a blog post on the upcoming patch batch.

Andrew Storms, director of security operations at net security firm nCircle, said all supported versions of Windows will need patching. Oddly the most recent versions of Windows – which normally need the least patching – are the most affected by the February 2012 patch batch, he added.

"Microsoft is planning to deliver a big 'Valentine' next Tuesday. Their advance notification indicated they plan to release nine bulletins, and 21 CVEs next Tuesday. This is very consistent with last year's 'Valentine delivery' that included 12 bulletins and 22 CVEs."

"It's surprising that this month's patch affects almost every Windows operating system – each OS is affected by five of the eight applicable bulletins. That's kind of weird because newer OS versions are generally more secure."

"It's even more surprising that Windows Server 2008 R2 is affected by the greatest number of bulletins. Generally, we see fewer bugs on server side operating systems, and this is doubly true for Server 2008 since so many of its newer mitigations and default settings protect the OS even when bugs are found," he added.

Microsoft's own pre-alert notice can be found here. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.