Microsoft slates seven patches next week
Five of the seven hit Vista; Macrovision bug fix likely in the batch
Windows Vista, the one-year-old operating system that Microsoft pledged was its most secure ever, will be affected by five of the seven updates. "That's no small percentage," noted Andrew Storms, director of security operations at nCircle Network Security Inc. "This perpetuates the fact that even though Microsoft said it was secure, it still needs plenty of patches."
Of the seven bulletins Microsoft expects to release Dec. 11, three will be rated "critical" -- Microsoft's most dire ranking -- while the remaining four will be labeled "important," the next-lower rating. As usual, the company disclosed a limited amount of information about next week's updates in a prepatch notification posted to its Web site this morning.
Only one of the seven is a sure bet, Storms said, pointing to a Windows update pegged as important that will affect Windows XP and Windows Server 2003. "The Macrovision patch is the most likely candidate for what they're calling Bulletin 5," said Storms.
Early last month, Microsoft confirmed that attackers were actively exploiting a bug in third-party antipiracy software bundled with Windows. The software, which Microsoft licenses from Macrovision Inc., had been updated for Vista, which was why that operating system was not at risk. Although Macrovision quickly issued a replacement driver for Windows XP and Server 2003, Microsoft said it needed time to prepare and test the update, which meant it missed the November patch deadline.
"The rest of these are a complete surprise to me," admitted Storms. With one exception, he also hesitated at guessing the contents of the remaining half-dozen updates. His one prediction: "Bulletin 7 might be the fix for the WPAD vulnerability."
On Monday, the Microsoft Security Response Center advised users of a bug in the way Windows looks up other computers on the Internet that has resurfaced. The flaw could allow attackers to steer users to an untrustworthy Web Proxy Auto-Discovery server, where they would receive directions to, say, malicious Web sites rather than the legitimate destinations.
"That would be a very quick fix, and unlikely Microsoft behavior, but if the fix is as simple as some have said, it's possible," said Storms.
Microsoft patched the problem in 1999 for all users whose computers operated on domains included in the .com top-level domain. According to researchers at a recent security conference in New Zealand, however, the vulnerability remained for anyone who "lives" on a non-.com domain, including country-specific domains like .eu (European Union) and .nz (New Zealand) or general-purpose top-level domains such as .org and .net.
"I was hoping for a light month," mused Storms, "but it looks like I'd better stock up on coffee."
Microsoft will issue the seven updates next Tuesday around 1 p.m. EST, along with six high-priority, nonsecurity updates for other software in its stable.
Unless it yanks one or more from the list at the last minute, Microsoft will end the year having released 69 security bulletins in 2007, nine fewer than 2006's total, but 14 more than in 2005.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts