Microsoft delivers monster patch batch
Clock ticking as hackers race to exploit bugs in Windows, IE and Office, says researcher
Computerworld - Microsoft today issued a record 14 security updates to patch a record-tying 34 vulnerabilities in Windows, Internet Explorer (IE), Office and Silverlight.
"Don't get mired in the details," recommended Andrew Storms, director of security operations for nCircle Security, as he acknowledged that the sheer number of updates and patches could easily overwhelm users.
"There are so many patches here that you could go in all kinds of different directions," agreed Jason Miller, data and security team manager for patch-management vendor Shavlik Technologies. "It could come down to what people think are the biggest attack vectors."
No one was questioning the size of today's Patch Tuesday. The August update was the biggest ever by number of security bulletins, and equaled the single-month record for individual patches, which was first set last October and repeated in June 2010. This month's collection also tied the October 2009 record for the most critical bulletins.
Of the 34 flaws, Microsoft rated 14 as "critical," the highest threat ranking in the firm's four-step scoring system. Seventeen were pegged as "important," and three were labeled as "moderate."
With Microsoft throwing nearly three-dozen patches at customers, it's not a surprise that researchers disagreed on which updates people should apply first.
"I'd have to put MS10-056 at the top," said Storms, referring to a three-patch update for Office that included a pair of critical vulnerabilities in Office 2007. "All one needs to do is have the preview pane open [in Outlook 2007] and just look at a malformed RTF file," Storms added.
Unlike most exploits delivered via e-mail, these wouldn't require the recipient to open an attachment, a practice people know is risky. But as Storms pointed out, most users preview e-mail messages without a second thought. "I'd put this in the same category as a drive-by," Storms said. "I can imagine someone sticking an RTF file in a spam engine and just going crazy."
While other researchers agreed with Storms that MS10-056 was dangerous, they nominated different updates -- or combinations of updates -- for their top pick of the month.
Those updates, both judged critical, address a pair of bugs in two codecs - software that compresses and decompresses video data -- included with Windows.
To Miller, video vulnerabilities are a juicy target for criminals. "They want to find the biggest market [for their attacks], and media, and social media are so huge today," he said. "Everybody is watching stuff, they're not reading stuff."
Miller said he expected attackers to leverage the codec flaws in the coming month, a bet Microsoft also made: Its Exploitability Index rated both vulnerabilities as a "1," meaning it anticipates active exploits in the next 30 days.
Wolfgang Kandek, CTO at Qualys, seconded Miller, but lumped in other bulletins, including the six-patch IE update, MS10-053, with the codec updates.
"With so many [updates] today, prioritization is important," said Kandek. "And since most attacks today happen through the browser, we've put several updates into a group that should be applied first."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts