Microsoft promises four patches next week
Pencils in fixes for Windows, SQL Server and Exchange Server
Computerworld - Microsoft Corp. on Thursday chalked in four security updates for next week that would fix vulnerabilities in Windows, SQL Server and Exchange Server.
All four were labeled "important," the company's second-highest ranking, even though one of the Windows updates will squash a bug that attackers could use to execute malicious code remotely. Microsoft has regularly rated that kind of vulnerability as "critical" in the past.
As is its practice for prepatch notifications, Microsoft disclosed few details today of next week's updates other than their severity ranking and the affected software.
"None of these were on my radar," acknowledged Andrew Storms, director of security operations at nCircle Network Security Inc. "I'm doing quite a bit of head scratching, given the variety and interesting details [in the bulletins]."
One of the two Windows bulletins will patch Windows 2000 and Windows XP -- including the recently released XP Service Pack 3 (SP3) -- but not Windows Vista, while the second update slated for the client operating system will patch Vista, including Vista SP1, but not the older operating systems.
The Vista bug caught Storms' eye because while Microsoft said it could result in remote code execution -- a description reserved for a serious vulnerability that could let hackers hijack a PC -- the company ranked it as important, not critical.
"I read that kind of bug as 'critical,'" said Storms. "Microsoft seems to have stepped it up a notch," he added, noting that it appears the company is taking a harder line in defining "critical" flaws as only those that don't require any user action to be exploited.
Microsoft described both the SQL Server bug and the Exchange vulnerability as elevation-of-privilege flaws and said it will provide patches for the former to Windows Server 2003, Server 2008, Windows 2000 and all still-supported versions of SQL Server. The Exchange update applies to both Exchange Server 2003 and the newer Exchange Server 2007.
The amount of detail Microsoft tucked into the prepatch notification for the SQL Server and Exchange Server vulnerabilities puzzled Storms, who pointed out that Microsoft specified that the SQL Server flaw affects both WMSDE, the SQL engine added to Windows clients, and WYukon, the engine within Windows server software. "I don't know whether this is a clue [about the vulnerability] or whether they're just being more promiscuous with information," Storms said.
It doesn't appear the Microsoft will be patching an Internet Explorer vulnerability first reported in 2006, but which returned to the limelight last month when security researcher Aviv Raff claimed that it could be combined with a bug in Apple Inc.'s Safari to pose a danger to users. At the end of May, Microsoft warned users of the blended threat and recommended that people stop using Safari.
Apple patched Safari for Windows to quash the browser's so-called carpet bomb bug two weeks ago.
But Storms said there was an outside chance that Microsoft would fix Internet Explorer, even though it didn't explicitly label any of the prospective patches as intended for IE. Last year, he said, Microsoft dealt with protocol-handler bugs that could be exploited in attacks against IE by fixing Windows, not the browser.
The four security updates will be posted Tuesday, July 8, around 1 p.m. EDT.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts