Feeds

Office, IE, Flash fixes accompany Windows XP's final Patch Tuesday

Microsoft, Adobe move to fix more security flaws

Next gen security for virtualised datacentres

Microsoft has released patches for critical security vulnerabilities in Word and Internet Explorer on what is to be the final Patch Tuesday update for Windows XP systems.

The April edition of the monthly security update contains four bulletins that address a total of 11 vulnerabilities in various Microsoft products. Two of the bulletins have been rated by the company as critical fixes, while the other two are classified as important updates.

The critical fixes include a cumulative security update for Internet Explorer versions 6 to 11 on Windows XP through Windows 8.1 and RT. The update, which is considered a critical fix for all non-server versions of Windows, addresses six flaws that would allow for remote code execution on a targeted system.

Researchers from Palo Alto Networks, Trend Micro, Verisign iDefense Labs, and HP's Zero Day Initiative were credited in reporting the vulnerabilities to Microsoft.

The second of the critical patches will address a pair of remote code execution vulnerabilities in Microsoft Office. Users running Office 2003, 2007, 2010, 2013 (both x86 and RT), and Office for Mac should consider the update to be a critical security fix.

Microsoft credited researchers from CERT/CC, Google Security team and independent researcher Yuhong Bao for discovering the Office flaws.

Administrators of Windows Server systems can breathe a bit easier this month: the critical bulletins are not considered to be serious risks for Server systems as neither Office nor Internet Explorer is a commonly used application.

The two "important" bulletins address remote code execution flaws in Windows and Microsoft Publisher. Both are considered lower-risk flaws, since users would need to manually download and launch attack files on their local systems in order for an attack to take place.

Adobe, meanwhile, released a scheduled update for its Flash Player web media tool. The update addresses four remote code execution vulnerabilities in Flash Player for Windows, OS X, and Linux desktops.

Windows and OS X users are advised to update to Flash Player 13.0.0.182 in order to obtain the April security patch. Linux users should update their Flash Player to version 11.2.202.350. Adobe AIR users on Android devices are being advised to update that software to version 13.0.0.83. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.