Microsoft Prepares Critical Security Updates for Internet Explorer

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
The Redmond giant announced on Thursday that there are nine security bulletins available for this month’s Patch Tuesday, the one for Internet Explorer receiving a critical severity rating and vulnerability impact.

Administrators at IT shops, big and small, have been notified that this month they should be prepared to apply a new set of fixes that address remote code execution (RCE) vulnerabilities in Microsoft’s Internet Explorer versions 6 through 11, running on different editions of Windows.
Internet Explorer is not the only product patched against remote code execution
The bulletin bundling all the patches for the web browser has been labeled as "critical" for the security of the product, the default recommendation in this case being to apply the changes as soon as they become available through Windows update mechanism.

The RCE type of security flaw allows an attacker to run arbitrary code on the affected machine without having direct access to it. This would enable malicious actors to execute malicious commands on the target system, benefiting from the same privileges as the user account under which the application is running.

Other products affected by RCE security glitches are .NET Framework and Windows operating system, from Server editions 2003, 2008 and 2012 to Vista, 7, 8 and 8.1. RT versions of Windows (RT and RT 8.1) are also included in a security bundle.

The bulletin for Microsoft Office and related services also warns of remote code execution possibilities, but it is marked as “important,” a lower severity level.
System administrators should be prepared to restart machines
The current notification is just a heads-up of what’s to come on Tuesday, October 14, when the actual updates will be pushed to clients all over the world.

It is intended for system administrators, to allow them to review the programs that are affected and make the necessary preparations in advance, for smoothly applying the modifications when they become available.

In some cases, a restart of the machine is required for the patch to be integrated and this is not always possible if the new code is received without previous notification.

Microsoft makes available a set of tools that could help administrators with applying the updates. As such, they can use Microsoft Baseline Security Analyzer (MBSA) to scan local and remote machines for security updates that have not been applies as well as for poor configurations that could compromise the integrity of the system.

Utilities are also provided for distributing the updates as well as for an easier verification process of the updates with the installed applications.
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
Microsoft to release nine bulletins
Microsoft is back in fine form this month with nine upcoming advisories affecting Internet Explorer, the entire Microsoft range of supported operating systems, plus Office, SharePoint Server and a very specific add on module to their development tools calls “ASP .NET MVC”.

Three of the advisories are rated Critical, Microsoft’s most severe designation based on the impact of exploitation and the likelihood of an exploit emerging, including the IE issue and two issues affecting virtually every supported Operating System. These will be the top patching priorities, probably with the IE issue being the most at risk for exploitation.

Behind the three critical, there are four issues marked as Important, enabling either remote code execution or elevation of privilege. Again, most Windows versions are affected, plus in one case, Office and SharePoint. These will be the second patching priority.

Rounding out the group is a Moderate elevation of privilege issue affecting Windows and Office, this issue seems to be related to the Office Japanese language input extensions and does not apply to Windows 8 or later. The issue in ASP .NET MVC is a security feature bypass and due to the relatively limited exposure of that feature should be addressed on an, if and when basis.
Full Article
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top