Feeds

Microsoft, Adobe throw fire blanket over blaze of security flaws

Patch Tuesday - just in time for Exploit Friday

Choosing a cloud hosting partner with confidence

Microsoft has fixed 26 security flaws, at least five of which are critical, in its software. At least one of the holes is being actively exploited by hackers to compromise Windows computers.

The latest Patch Tuesday update from the company addresses these vulnerabilities, which are present in workstations and servers running Redmond operating systems.

Most pressing of the critical batch is MS12-060, which is a fault in Windows Common Control that is being exploited in the wild. Victims merely have to open booby-trapped RTF files and Office documents, or visit a maliciously constructed web page, to fall foul of an attack. The files could be sent as email attachments.

Other critical flaws exist in the Remote Administration Protocol (RAP) of Windows Networking; Internet Explorer versions 6 to 9; the Remote Desktop Protocol (RDP) server in Windows XP; and a module in the Outlook Web Access (OWA) component of Microsoft Exchange Server.

Microsoft's latest security bulletin can be found here. As usual, an easy-to-understand overview from the Internet Storm Centre can be found here.

In other patching news, Adobe also released two new versions of its Adobe Acrobat and Adobe Reader products. A patch for Adobe Flash Player addresses a zero-day vulnerability that has been used in targeted attacks. These assaults have involved tricking victims into opening Word documents with an embedded ActiveX Flash object.

More details on all these patches can be found on Adobe's website here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
State Dept shuts off unclassified email after hack. Classified mail? That's CLASSIFIED
Classified systems 'not affected' - but, is this reconnaissance?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.