Skip the navigation

Microsoft fixes 14 flaws in biggest patch day since February

'Repeat offenders' -- once-patched pieces patched again -- abound, says researcher

August 14, 2007 12:00 PM ET

Computerworld - In its biggest one-day security update since February, Microsoft Corp. today issued nine bulletins that patched 14 vulnerabilities in Office, Internet Explorer and every edition of Windows. Eight of the fixes were pegged as critical, the company's highest risk rating.

Faced with an overload of vulnerabilities -- including some in components that Microsoft has patched in the past -- researchers squabbled over which should get priority.

"I think six of these are equally important," said Andrew Storms, director of security operations at nCircle Network Security Inc.

"The GDI vulnerability is the most critical," said Amol Sarwate, the manager of Qualys Inc.'s vulnerability research lab.

"MS07-042 affects everything," said Don Leatham, the director of solutions and strategies at PatchLink Corp.

The only update that all three agreed should be moved to the top of the list was the one that patched a bug in Windows Graphics Rendering Engine (GDI). According to Microsoft's MS07-046 advisory, the GDI bug affects Windows 2000, XP and 2003 Server and a successful attack could give the hacker complete control of the PC.

"This affects a core Windows subsystem, and all versions except for Windows Vista," said Sarwate. "Unlike most other vulnerabilities, this one doesn't need an application, like Internet Explorer; all that's needed is a [malformed] image file. The only good news here is that this does not affect Vista."

PatchLink's Leatham cited the GDI bug as one of two he said should be patched immediately, and he rang the alarm even louder than Sarwate. "This has the potential to be as dangerous as the WMF vulnerability [from late 2005]," he said. "Microsoft makes it sound as if the typical exploit would come as some sort of e-mail attachment, but the GDI is used by about every single Microsoft application out there.

"Hackers will look at this like Nirvana, something this low level that they can use to target about every workstation in an enterprise," warned Leatham.

The WMF (Windows Metafile) vulnerability, a zero-day bug that hackers began widely exploiting at the end of 2005, was patched in early 2006 by one of the rare out-of-cycle fixes that Microsoft has issued. Even today, the WMF exploit impact on Windows users remains among the largest ever.

Eight other bulletins, however, will vie for administrators' attention. Some, said Storms, Sarwate and Leatham, should get that attention before the others. Here are some of the fixes each one of them singled out:

  • Storms: "The idea of virtualization is a really big thing in IT today, and everyone who does it in the enterprise has the same concern: Can the guest OS [in a virtual machine] affect the host OS?" For that reason, he put the spotlight on MS07-049, even though the update was rated "important," not "critical." The No. 1 concern of those running virtualization software in a corporate enterprise, he said, is "How much can we trust the guest OS?" The bug patched today could let users with administrative privileges on the guest operating system run code on the host operating system, or even on another virtual machine's guest operating system, according to Microsoft.
  • Sarwate: "MS07-045 affects all versions of Internet Explorer. This vulnerability is in the [Cascading] Style Sheets [CSS], which are the building blocks of any site." According to Microsoft's advisory, IE's parsing of certain strings in CSS is flawed; attackers could exploit it by enticing users to a malicious Web page, resulting in a full PC hijack.
  • Leatham: "MS07-042 affects everything." The vulnerability, which exists in multiple versions of XML Core Services -- the component that provides interoperability between several scripting languages, including JScript, Visual Studio and XML applications -- affects every supported version of Windows, including Vista. Microsoft rated the bug as critical across the board. "There's so much going on with XML in enterprises," said Leatham. "That's why this is so dangerous."


Our Commenting Policies