Microsoft drops IE, Windows fixes on Patch Tuesday

Share this article:

Microsoft on Tuesday sprung six patches to correct 19 vulnerabilities across its product line.

Most pressing, according to the software giant, are the two of the four "critical" patches, led by MS12-071, which addresses three previously unknown vulnerabilities in Internet Explorer 9. IE 10 is not affected. Similar to most browser vulnerabilities of this nature, users can be infected without taking any action and simply by visiting a compromised web page -- an attack tactic known as drive-by download.

The other critical fix of note is MS12-075, which involves three privately reported TrueType font file flaws in the Windows kernel.

"Microsoft has been dealing with font issues for a while," Paul Henry, security and forensic analyst at Lumension, a patch and vulnerability management company, said in prepared comments. "TrueType fonts can be embedded all over the place, and Windows kernel mode driver renders the font. If these fonts are embedded in a browser or a Word document, for example, it's rendered in the kernel mode driver and winds up becoming a kernel mode exploit."

In the past, this class of vulnerability has been used to spread sophisticated malware, such as the espionage trojan Duqu.

Tuesday's update from Microsoft also included two other critical patches -- one affecting two remote-code vulnerabilities in Windows Briefcase versions XP through 7, and the other addressing five bugs in the .NET Framework. 

Of the remaining bulletins, one is rated "important" and involves an Excel flaw, while the other is deemed "moderate" and corrects a single vulnerability in Internet Information Systems (IIS), which "could allow information disclosure if an attacker sends specially crafted FTP commands to the server," according to Microsoft.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.

EU conducts massive cyberattack simulation on critical networks

Conducted by the European Union Agency for Network and Information Security, the simulation launched 2,000 attacks on the networks of various critical infrastructure organizations.