Microsoft plans just two patches next week
They may include a fix for URI protocol handler vulnerability, or the Macrovision DRM bug, says researcher
Computerworld - Microsoft Corp. today scheduled just two security updates for Tuesday to fix flaws in Windows 2000, XP and Server 2003. One of the two is a leftover from October that was bumped at the last minute.
Only one of the bulletins will be rated "critical," Microsoft's highest ranking, while the other will be labeled "important," the next-lower rating. As usual, Microsoft disclosed a limited amount of information about the upcoming updates in a prepatch notification posted to the company's Web site today.
The critical update affects Windows XP and Windows Server 2003, said Microsoft, which classified the vulnerability as a remote code execution bug. What the bulletin will fix, however, is up for speculation.
"It could be the Macrovision vulnerability," said Andrew Storms, director of security operations at nCircle Inc., referring to the digital rights management software bundled with Windows that has already been targeted by in-the-wild attacks. "Macrovision has already got a fix, so Microsoft wouldn't have had to do any coding."
Storms noted, however, that Microsoft would have to stretch its usual definition of "remote code execution" to make the Macrovision vulnerability fit the update, since both companies have been calling it a privilege elevation flaw, and thus less serious. "Microsoft sometimes seems to go back and forth about privilege elevation," Storms said. "They might just say, 'sure it's an elevation, but it could also lead to remote code execution.' Or we may just see a reversal here of the bug's severity."
On the other hand, the critical bulletin may be aiming at something completely different. "It could be the URI protocol handler bug," Storms said.
Less than two weeks ago, Microsoft accepted responsibility for fixing a widespread flaw in how Windows deals with the Uniform Resource Identifier (URI) protocol handlers, which let browsers run other programs via commands in a URL. At the time, Bill Sisk, a member of Microsoft's security response team, said that the group was "working around the clock" on a patch. The company would not commit to a release date, however, or say whether it would make the next update rollout, now just days away.
The debate over who was responsible for patching the problem with the URI protocol handler raged over the summer, when Microsoft denied that its software was at fault, and third-party application vendors, including Mozilla Corp. and Adobe Systems Inc., pointed fingers at the company even as they patched their own products.
Tuesday's second update, which targets Windows 2000 and Windows Server 2003 but not XP, appears to be the one that was yanked before October's bulletins hit the Internet. The only hint Microsoft gave of its composition was the "Spoofing" label, which in the past has usually been used to describe vulnerabilities in Internet Explorer that phishers and identity thieves exploit to deceive users.
"I have no idea what this one is about," Storms said.
He was, however, sure of one thing: the light patching load users and administrators faced this month. "It's a 'where's the beef?' kind of month," he said. "Maybe we can all catch up a bit."
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!