Microsoft patches 19 bugs in sweeping security update

Fixes software affected by its own development code bug, plugs holes already exploited

Microsoft today delivered nine security updates that patched 19 vulnerabilities in several crucial components of Windows, as well as in Windows Media Player, Outlook Express, IIS (Internet Information Server), Office and several other products.

Security researchers pegged Tuesday's batch as "all over the map" and a "smorgasbord" of updates.

Included in today's patches were five that plugged holes that Microsoft's own software inherited from a buggy code "library," dubbed ATL (Active Template Library), that the company and others rely on to create their programs.

"This is certainly a hodgepodge," said Andrew Storms, director of security operations at nCircle Network Security. "There's no real pattern this month. I'd call it a smorgasbord."

"It's a big pile of messy stuff," said Eric Schultze, chief technical officer at Shavlik Technologies. "Everything is impacted except for Internet Explorer."

Josh Abraham, a security researcher at Rapid7, agreed. "There are a ton of things all over the map here."

Five of the updates were pegged as "critical," the most serious ranking in Microsoft's four-step scoring system, while four were marked "important," the next rating down.

The big story today, agreed security experts, was MS09-037, the update that fixed five vulnerabilities in several Microsoft-made Windows components caused by bugs in ATL.

"This one is just awful," said Abraham, referring to the ATL update.

Schultze, who called the ATL fixes a "whole handful," also ranked MS09-037 at the top of today's list. "There are five individual patches for five individual controls, each used in different [Microsoft] software. It's good that Microsoft's patched this, but it's going to be really difficult for people to patch."

Storms, however, was surprised by the small number of ATL-related patches. "We expected a slew of ATL patches," he said, "although we only got five. But I expect that we'll see more and more ATL bugs from Microsoft in the next couple of months."

Schultze, who once worked at Microsoft, said he had been told by sources inside the company that with the exception of one still-open investigation, today's fixes patch all ATL-related vulnerabilities in software that ships as part of Windows. "They might have it licked," he said, but warned that Microsoft has yet to dig into other ActiveX controls it's crafted that don't ship "in the box," or come on the operating system's installation CD.

The ATL vulnerabilities were introduced when a Microsoft programmer added an extra "&" character to the widely-used library.

Two weeks ago, Microsoft rushed a pair of emergency updates to users that plugged multiple holes in IE and Visual Studio. Those vulnerabilities were traced to ATL.

1 2 Page
FREE Computerworld Insider Guide: IT Certification Study Tips
Join the discussion
Be the first to comment on this article. Our Commenting Policies