Microsoft preps seven fixes, two critical, for Patch Tuesday release

Share this article:
Microsoft preps seven fixes, two critical, for Patch Tuesday release
Expected to be addressed is a zero-day flaw in Internet Explorer 8.

In its monthly security update, Microsoft plans to release seven patches, including two “critical” fixes, for vulnerabilities in several of its products.

On Thursday, the tech firm published an advance notification for its Patch Tuesday lineup.

Getting top priority were Microsoft's two critical patches, which plug remote code execution (RCE) bugs in Windows, IE, Office and Microsoft Lync. The remaining bulletins, or fixes, addressed software flaws ranked “important” by the tech giant – RCE issues affecting Office, information disclosure bugs impacting Windows and Lync Server, and an issue in Windows allowing denial of service.

Of note, one of the “important” bulletins remediates a tampering problem impacting users.

In prepared email comments to SCMagazine.com, Ross Barrett, senior manager of security engineering at Rapid7, mentioned the rarity with which vulnerabilities that allow “tampering” appear in Microsoft's Patch Tuesday release.

“There are seven [patches], two critical, five important – one of which is the seldom seen ‘tampering' type,” Ross wrote on Thursday.

“The tampering label on the seventh bulletin may suggest it allows a message to be altered in transit,” he later explained. “Probably a limited scenario for exploitation."

Overall, the security issue most likely to grab administrators' attention this month, is a zero-day vulnerability (CVE-2014-1770) affecting IE 8, which was made public in late May by HP's Zero Day Initiative (ZDI) team.

The remote code execution flaw, which is expected to be addressed with one of Microsoft's two critical patches this month, was first disclosed to Microsoft in October, keeping with ZDI's 180-day deadline for publicly reporting vulnerabilities.

"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer," an advisory on ZDI's website said. "User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

CryptoWall surpasses CryptoLocker in infection rates

CryptoWall surpasses CryptoLocker in infection rates

A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.

Professor says Google search, not hacking, yielded medical info

Professor says Google search, not hacking, yielded medical ...

A professor of ethical hacking at City College San Francisco came forward to clarify that he did not demonstrate hacking a medical center's server in a class.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm ...

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.