Microsoft distributes six patches for nine vulnerabilities

As part of a security update that resolves two zero-day exploits, Microsoft on Tuesday delivered six patches to address nine vulnerabilities.

Three of the six fixes carry the grade of "critical," Microsoft's highest severity rating.

One of the three resolves vulnerabilities in DirectShow, which were being actively leveraged to launch attacks if users opened specially crafted QuickTime files.

Another of the critical bulletins handles a zero-day flaw in a Microsoft Video ActiveX control disclosed last week. The patch is actually a formalized version of the workaround already recommended by Microsoft, which involves applying the kill bits to the affected control.

"The flaw was already being exploited in Asia," said Ben Greenbaum, senior research manager at Symantec Security Response, in a statement. "There was potential for this to become a bigger problem for users if left unaddressed by Microsoft."

The final critical patch remediates flaws in the Embedded OpenType Font Engines that could be exploited just by getting a user to visit a malicious website, open an email or view an Office document.

"This impacts all operating systems," Eric Schultze, CTO of patch management firm Shavlik Technologies, told SCMagazineUS.com on Tuesday. "It probably involves a chunk of code that has been there for a long time and probably hasn't been reviewed. If the attacker builds some evil embedded fonts into their web page or Office document, and the browser or operating system tries to parse the fonts, malicious code could be executed."

Schultze added that although this was the first time he could recall such a vulnerability, he doubts it is something that will linger.

"Microsoft did a pretty good job of containing it," he said. "They got it all with this one patch. We're probably not going to see it again."

The update included three other bulletins, labeled "important." One addresses a vulnerability in Virtual PC and Virtual Server and another involves a bug in the Internet Security and Acceleration Server -- both of which could enable privilege escalation.

The third important patch fixes a flaw in Microsoft Publisher 2007 Service Pack (SP) 1 and could enable remote code execution. Other versions of Publisher, including SP2 for 2007, are not affected.

Not included in Tuesday's security update, as expected, was a plug for another zero-day ActiveX control bug, announced Monday. Microsoft, though, has recommended a workaround for it, and Schultze said he expects users will see a patch next month.


More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.