Microsoft's April Patch Tuesday brings no Pwn2Own fix
In a relatively light month for Patch Tuesday, Microsoft issued nine bulletins covering 14 vulnerabilities for April
IDG News Service - System administrators and IT security pros can take bit of a breather: Microsoft issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes.
"It's a boring Patch Tuesday this month, and that's an excellent thing for IT security teams because there won't be a mad dog rush to get this month's patches deployed," wrote Andrew Storms, director of security operations for security firm nCircle, in an email statement.
Perhaps the most surprising aspect of this month's issuance of patches was a high profile vulnerability that did not get covered. Many expected Microsoft to fix the Pwn2Own Internet Explorer bug unearthed earlier this year during a hacker contest, but such a fix was not included in this round. "This puts them quite a bit behind other browsers that already patched their Pwn2Own bugs," Storms noted.
Two of the bulletins in this month's collection were designated as critical, and the remaining seven were labelled as important. Windows desktop and server editions, Internet Explorer, Microsoft Office, Microsoft SharePoint and Windows Defender all need to be updated.
Security firms did advise updating Internet Explorer with the critical patches Microsoft released this month for the browser, both within the MS13-028 bulletin, affecting all supported versions of Internet Explorer, versions 6 through 10. "Attackers will be looking into how to exploit these two vulnerabilities, since attackers can target multiple versions of Internet Explorer through the use of only a couple vulnerabilities. So it is important to deploy this patch as soon as possible," wrote Marc Maiffret, chief technology officer for security firm BeyondTrust in his own analysis.
The other critical bulletin covered the Microsoft Remote Desktop client, MS13-029. This vulnerability exists in the client's ActiveX control, and could give attackers the ability to execute arbitrary code on the user's machine. Fortunately, this vulnerability is not in the latest version of Microsoft Remote Desktop client, which reduces to a considerable extent the affected number of machines, according to nCircle.
Microsoft is hosting a webcast to address customer questions about this round of patches on April 10.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts