Microsoft Prepares Critical Security Updates for Internet Explorer

Status
Not open for further replies.

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
48,602
8,380
USA
The Redmond giant announced on Thursday that there are nine security bulletins available for this month’s Patch Tuesday, the one for Internet Explorer receiving a critical severity rating and vulnerability impact.

Administrators at IT shops, big and small, have been notified that this month they should be prepared to apply a new set of fixes that address remote code execution (RCE) vulnerabilities in Microsoft’s Internet Explorer versions 6 through 11, running on different editions of Windows.
Internet Explorer is not the only product patched against remote code execution
The bulletin bundling all the patches for the web browser has been labeled as "critical" for the security of the product, the default recommendation in this case being to apply the changes as soon as they become available through Windows update mechanism.

The RCE type of security flaw allows an attacker to run arbitrary code on the affected machine without having direct access to it. This would enable malicious actors to execute malicious commands on the target system, benefiting from the same privileges as the user account under which the application is running.

Other products affected by RCE security glitches are .NET Framework and Windows operating system, from Server editions 2003, 2008 and 2012 to Vista, 7, 8 and 8.1. RT versions of Windows (RT and RT 8.1) are also included in a security bundle.

The bulletin for Microsoft Office and related services also warns of remote code execution possibilities, but it is marked as “important,” a lower severity level.
System administrators should be prepared to restart machines
The current notification is just a heads-up of what’s to come on Tuesday, October 14, when the actual updates will be pushed to clients all over the world.

It is intended for system administrators, to allow them to review the programs that are affected and make the necessary preparations in advance, for smoothly applying the modifications when they become available.

In some cases, a restart of the machine is required for the patch to be integrated and this is not always possible if the new code is received without previous notification.

Microsoft makes available a set of tools that could help administrators with applying the updates. As such, they can use Microsoft Baseline Security Analyzer (MBSA) to scan local and remote machines for security updates that have not been applies as well as for poor configurations that could compromise the integrity of the system.

Utilities are also provided for distributing the updates as well as for an easier verification process of the updates with the installed applications.
 
Microsoft to release nine bulletins
Microsoft is back in fine form this month with nine upcoming advisories affecting Internet Explorer, the entire Microsoft range of supported operating systems, plus Office, SharePoint Server and a very specific add on module to their development tools calls “ASP .NET MVC”.

Three of the advisories are rated Critical, Microsoft’s most severe designation based on the impact of exploitation and the likelihood of an exploit emerging, including the IE issue and two issues affecting virtually every supported Operating System. These will be the top patching priorities, probably with the IE issue being the most at risk for exploitation.

Behind the three critical, there are four issues marked as Important, enabling either remote code execution or elevation of privilege. Again, most Windows versions are affected, plus in one case, Office and SharePoint. These will be the second patching priority.

Rounding out the group is a Moderate elevation of privilege issue affecting Windows and Office, this issue seems to be related to the Office Japanese language input extensions and does not apply to Windows 8 or later. The issue in ASP .NET MVC is a security feature bypass and due to the relatively limited exposure of that feature should be addressed on an, if and when basis.
Full Article
 
Status
Not open for further replies.