Network Security, Patch/Configuration Management, Vulnerability Management

Emergency patches issued for IE and Visual Studio

Microsoft on Tuesday issued two out-of-band security patches -- one for the development tools suite Visual Studio and another for Internet Explorer.

According to Microsoft's security bulletin for Visual Studio, there are several vulnerabilities in the Active Template Library (ATL) that is shipped with Visual Studio. The vulnerabilities, which could allow an attacker to execute remote code, may cause controls or components developed using ATL, such as ActiveX controls, to be vulnerable as well.

"The Visual  Studio patch corrects the flawed template so that any controls built from this template going forward will be safe," Eric Schultze, CTO, Shavlik Technologies told SCMagazineUS.com in an email Tuesday.

Developers should immediately evaluate components or controls developed with ATL to determine if they are vulnerable, Microsoft said.

“It is important to note that not all controls built using the vulnerable versions of the ATL are vulnerable -- this will depend on decisions the developer made when building the control or component,” Chistopher Budd, a security program manager at Microsoft, said in a blog post Tuesday.

That same day, Microsoft launched a website that provides additional details to help developers identify whether their control or component is exploitable using the vulnerabilities in ATL.

In addition, Internet Explorer (IE) was updated Tuesday to address components and controls that were developed with vulnerable versions of ATL, Microsoft said. The IE patch will monitor all calls to ActiveX controls and prevent controls that were developed with the flawed template from executing, Schultze said.

“As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL,” Microsoft's security bulletin for IE states.

The IE update, labeled critical, also addresses three other vulnerabilities unrelated to those in ATL which could allow remote code execution, Microsoft said.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.