Microsoft patches critical drive-by IE9 bug, Windows zero-day
But what got Miller and Storm to pay attention wasn't so much the IE9 update but that it followed June's cumulative patch for Microsoft's browser.
Microsoft has long used an every-other-month tempo for IE update, shipping patches for its browser only on even-numbered months. Today, the company quit that habit.
"We have ... increased our Internet Explorer resources to the point where we will be able to release an update during any month instead of on our previous, bi-monthly cadence," said Yunsun Wee, a director in Microsoft's Trustworthy Computing group, in a post to the Microsoft Security Response Center (MSRC) blog.
Storms praised Microsoft decision to ditch the bi-monthly updates. "IE is the most-used application in Windows, so it ought to be updated as soon and as often as possible," he said.
Miller agreed. "Bi-monthly is just too long between updates," Miller said. "I'd rather have it patched sooner than later."
Other browsers, notably Google's Chrome and to a lesser extent, Mozilla's Firefox, have been patched much more frequently than every-other month: Chrome often receives several security updates each month, while Firefox is regularly patched every six weeks.
While some researchers assumed that Microsoft has added staff to streamline its testing of IE updates -- and thus be able to turn around patches faster -- Storms did not. Instead, he saw the shift to possible monthly IE patching as simply a mechanism for getting out fixes as they're completed, rather than waiting for the next bi-monthly cycle.
Also on the top-three list of Microsoft, Miller and Storms is MS12-045, a one-patch critical update for Microsoft Data Access Components (MDAC), code that lets Windows access databases such as Microsoft's own SQL Server.
MDAC was last updated by Microsoft in August 2011.
"All three of the critical updates patch vulnerabilities that can be effectively exploited through the browser, including MS12-045," said Storms. Because such attacks do not require any user interaction -- other than to be suckered into surfing to a malicious site -- they're dubbed "drive-by attacks," and as such are considered the most dangerous to users and the most likely to be leveraged by attackers.
Microsoft also patched SharePoint, its enterprise-grade collaboration platform; Office for Mac 2011, the newest edition of that suite; Visual Basic for Applications; and other parts of Windows, including kernel mode drivers and the Windows Shell.
July's nine security updates can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through WSUS.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts