Internet Explorer pegged for critical fix on Tuesday
Microsoft's monthly patch release for July covers six remote-code execution vulnerabilities
IDG News Service - Microsoft's monthly patch release for July will cover seven security issues, six of which could be remotely exploited by an attacker.
The company publishes an advisory in advance of its patch date, which is the second Tuesday of the month, so administrators knows what products will be affected. It does not describe the vulnerabilities, however, until the security fixes are released.
The critical vulnerabilities are in the Windows OS, .NET Framework, Silverlight, Office, Visual Studio, Lync and Internet Explorer (IE). A seventh bulletin, ranked as "important," affects Microsoft's Windows Defender security software.
The most important bulletin addresses IE, wrote Wolfgang Kandek, CTO for Qualys. It affects IE versions six through 10 on Windows XP, Vista, 7, 8, Server 2003, Server 2008 and RT.
Microsoft will also fix a zero-day vulnerability revealed by security researcher Tavis Ormandy, Kandek wrote. The problem concerns a memory management problem that is essentially a zero-day vulnerability after an exploit was added to the Metasploit penetration testing tool, he wrote.
Kandek wrote that the patch day will be a bit of work for desktop and server administrators. "All in all, a normally sized Patch Tuesday, but with a large number of critical issues," he wrote.
The bulletins will be released at 10 a.m. Tuesday PDT.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts