Microsoft preps seven fixes, two critical, for Patch Tuesday release

Share this article:
Microsoft preps seven fixes, two critical, for Patch Tuesday release
Expected to be addressed is a zero-day flaw in Internet Explorer 8.

In its monthly security update, Microsoft plans to release seven patches, including two “critical” fixes, for vulnerabilities in several of its products.

On Thursday, the tech firm published an advance notification for its Patch Tuesday lineup.

Getting top priority were Microsoft's two critical patches, which plug remote code execution (RCE) bugs in Windows, IE, Office and Microsoft Lync. The remaining bulletins, or fixes, addressed software flaws ranked “important” by the tech giant – RCE issues affecting Office, information disclosure bugs impacting Windows and Lync Server, and an issue in Windows allowing denial of service.

Of note, one of the “important” bulletins remediates a tampering problem impacting users.

In prepared email comments to SCMagazine.com, Ross Barrett, senior manager of security engineering at Rapid7, mentioned the rarity with which vulnerabilities that allow “tampering” appear in Microsoft's Patch Tuesday release.

“There are seven [patches], two critical, five important – one of which is the seldom seen ‘tampering' type,” Ross wrote on Thursday.

“The tampering label on the seventh bulletin may suggest it allows a message to be altered in transit,” he later explained. “Probably a limited scenario for exploitation."

Overall, the security issue most likely to grab administrators' attention this month, is a zero-day vulnerability (CVE-2014-1770) affecting IE 8, which was made public in late May by HP's Zero Day Initiative (ZDI) team.

The remote code execution flaw, which is expected to be addressed with one of Microsoft's two critical patches this month, was first disclosed to Microsoft in October, keeping with ZDI's 180-day deadline for publicly reporting vulnerabilities.

"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer," an advisory on ZDI's website said. "User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.