Microsoft plans 15 patches for Windows, Office next week
No emergency updates so far this year, notes researcher
Computerworld - Microsoft today said it will dispense five security updates next week to patch 15 vulnerabilities in Windows, Excel, SharePoint Server and Groove.
All five updates will be rated "important," the second-highest threat ranking in Microsoft's four-step system.
Microsoft usually ships a smaller number of updates in odd-number months, and kept to that plan today: September's volume is down from August's, when the company patched 22 vulnerabilities with 13 "bulletins," the word it uses to describe individual security updates.
"Not a lot there, but then we didn't expect much," said Andrew Storms, director of security operations at nCircle Security. "It is the light month, the down month."
The company laid out the bare bones of the upcoming patches in an advanced notice of next week's Patch Tuesday.
Two of the updates affect Windows, with one of the pair impacting only the server editions: Server 2003, Server 2008 and Server 2008 R2. The second bulletin patches one or more bugs in all supported versions of the operating system, including the decade-old XP and the much newer Windows 7.
"There are a number of server-only components that have been present through the whole lifecycle [of Windows Server]," said Storms, referring to the server-only update, which Microsoft tagged as "Bulletin 1" today. "SMB [server message block] is an example. And they patched SMB often in the last several months."
SMB is a Microsoft-designed network and file-sharing protocol, and has been patched multiple times this year, including an April update that plugged a critical hole some analysts said might be used by criminals to construct a dangerous worm.
Another two updates next week will fix problems in Excel -- including the newest Excel 2010 on Windows and Excel 2011 for the Mac -- and in Office generally. The fifth will patch a variety of server-side software, including SharePoint, Groove and Office Web Apps, the cloud-based version of Microsoft's suite.
Although Microsoft said that vulnerabilities to be patched in three of the upcoming bulletins could be used by attackers to execute remote code -- meaning that successful exploits would let hackers hijack a machine -- Microsoft's rankings offer a clue, said Storms.
"Because they rated them as only important, the attack scenarios probably will require user interaction," said Storms.
Microsoft usually ranks updates as important, not critical, when they patch remote code bugs that demand the user "help" the attacker by being tricked into visiting a malicious website.
Another security researcher urged Windows users not to get complacent next week just because there will be no critical updates.
"While 'important' vulnerabilities may not give attackers the full root privileges generally associated with 'critical' vulnerabilities, an attacker can use an important-rated vulnerability to achieve an initial compromise and then escalate privileges by other means," said Marcus Carey of Rapid7 in an email. "Attackers can still end up with the same result."
Storms also used the opportunity to note that Microsoft has not issued any emergency, or "out-of-band," updates this year. In 2010, Microsoft shipped four.
"If they close the year without any it would be a first," said Storms. "I think it's an indication of the mitigation efforts baked into their software. We know there are bugs in Microsoft software, but they've not been forced so far this year into going out of cycle to reduce risk."
The five updates will be released at approximately 1 p.m. ET on Sept. 13.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts