Microsoft addresses critical IE vulnerabilities for Patch Tuesday
Administrators hoping to slack off a bit for this month’s Microsoft Patch Tuesday will have no opportunity to do so. At the last minute, Microsoft added a slew of Internet Explorer (IE) fixes to its monthly release of software patches, including one patch that fixes a publicly known vulnerability.
"If there were some people who were counting on a quiet Patch Tuesday, it turned out not to be the case,” said Wolfgang Kandek, chief technology officer of IT security firm Qualys. “We have to do quite a bit more work to get everything tested and in place.”
Originally, Microsoft announced last week that it would issue five bulletins this month, though, on Monday, it added two additional critical bulletins, covering IE and Windows.
Microsoft did not provide an explanation for the additional bulletins, beyond the fact that the company had finished testing them.
Last year, Microsoft had to recall at least 23 patches, due in part to incomplete testing. This month’s late inclusions may be a sign that Microsoft is being more conservative when deciding which patches to issue. Only when these patches were completed were they added to the monthly patch release.
"In the end, you want that update to install smoothly for everybody,” Kandek said. “You want to make sure you get as little breakage as possible.”
For this month, four of the seven bulletins are ranked as critical—the highest priority—and the remaining were deemed important. In total, this month’s release of patches covers 31 vulnerabilities.
The critical bulletin covering IE, MS14-010, addresses 24 previously reported vulnerabilities, including one that is already publicly known. The most severe of these vulnerabilities could allow for remote code execution that could be triggered by a user visiting a maliciously crafted Web page.
Two other critical bulletins address flaws in the Windows operating system. One critical vulnerability lies in the VBScript Scripting Engine, covered by MS14-011. The second is found in the Direct2D hardware acceleration software and is addressed by MS14-007. Both could lead to remote execution attacks as well.
The final critical bulletin for February, MS14-008, addresses a privately disclosed vulnerability in Microsoft Forefront Protection for Exchange. The vulnerability could be exploited by a maliciously crafted email message sent to a Microsoft Exchange server monitored by Forefront security software.
Microsoft discontinued Forefront in 2012, though it will continue supporting the software with bug fixes through 2015, according to security firm Lumension.
The remaining important vulnerabilities cover issues found in Microsoft .Net and Microsoft Windows.
Kandek also urged administrators to apply Adobe’s emergency patch for Flash, which was issued last week.