Feeds

Windows kernel bug-squish, IE update star in July Patch Tuesday

Plus: Dodgy app unpatched for 180 days? We'll kick it out of Marketplace

Internet Security Threat Report 2014

Microsoft's Patch Tuesday for July landed overnight with a bumper crop of seven bulletins, six of which cover critical flaws that carry remote code execution risks.

And the Windows 8 giant today revealed that one of these, CVE-2013-3163, is currently under active attack online.

Every supported operating system, every version of MS Office, Lync, Silverlight, Visual Studio and .NET will need patching - creating plenty of work for sysadmins worldwide.

The patch batch grapples with a total of 34 vulnerabilities, with the emphasis very firmly on workstation (PC) rather than server software.

Altogether three of the bulletins patched flaws roughly matching the profile of the Windows kernel security issue that Google’s Tavis Ormandy disclosed back in May (CVE-2013-3660).

The top two patching priorities are a Windows kernel issue (MS13-053) and the Internet Explorer patch bundle (MS13-055), which addresses 17 vulnerabilities in Microsoft's browser software.

Microsoft revised the latter, bulletin 55, just after publication to announce that it is "aware of targeted attacks attempting to exploit the vulnerability described in CVE-2013-3163 through Internet Explorer 8". Redmond said that the application of the update would protect customers from any exploits of the vuln.

Also, for the first time ever, Microsoft is addressing a single vulnerability (CVE-2013-3129) in three different advisories (MS13-052, MS13-053, and MS13-054).

"This issue relates to TrueType Font processing and legitimately affects different components," explained Ross Barrett, senior manager of security engineering at Rapid7.

"By splitting this out, Microsoft is directly addressing a complaint about previous 'rolled up' advisories where it was difficult to properly prioritise the multiple patches required to remediate the problem, and component patches were frequently missed."

A visual overview of the patching menu for July can be found in a blog post by the SANS Institute's Internet Storm Centre here.

Crap apps and Flash patch dash

Microsoft also announced a policy change related to the Windows marketplace. In future, any "app" that is affected by a security issue will be removed from the store if it is not patched within 180 days of confirmation of a potential problem. Security watchers will be interested to see in Google or Apple adopt a similar policy.

In other patching news, Adobe released security updates for Adobe Shockwave (APSB13-18), Coldfusion (APSB13-19) and Adobe Flash player (APSB13-17).

"Users of Internet Explorer 10 and Google Chrome already have [Flash] updates integrated and do not need to worry about installing the new version themselves," notes Wolfgang Kandek, CTO of cloud security firm Qualys.

"Everybody else, including Mac OS X users, should apply this critical update as quickly as possible."

Those at the security coalface will have little time to kick back after installing these updates. Oracle will be releasing their quarterly update for all of their software (except Java) next week on Tuesday, 19 July. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.