Microsoft has issued seven security bulletins for Patch Tuesday, with three rated critical, and the other four are rated important.
The seven combined address 23 separate vulnerabilities impacting Microsoft Windows, Office, Silverlight, and the Net Framework. Customers should plan to install all of these updates as soon as possible.
Among the most critical is MS12-034 -- which affects Microsoft Office, Windows, Net Framework, and Silverlight, involves exploits that can be conducted via browser, email, file sharing or similar attack -- and can result in remote code execution, elevation of privilege, or denial of service.
“MS12-034 is the largest security bulletin I've seen Microsoft put out,” Jason Miller, R&D manager at VMware, told CRN.
"The sheer size of this thing is immense because they are covering a lot of products and a lot of operating systems. There are about 120 types of product/service packs combinations where this patch would be applicable and there are 39 different patches associated with this one bulletin. So this is going to be all over the network. Pretty much all of your machines are going to be involved.”
Interestingly, these vulnerabilities stem from an earlier issue resolved by Microsoft last year.
The remote code-execution vulnerability used against Microsoft Office, Windows and Net Framework tie back to the TTF vulnerability used by Duqu,” said Joseph Chen, engineering director for security technology and response at Symantec, in a statement.
"We recently found a new Duqu sample showing that the threat is still active. Microsoft has provided some further patching, in addition to the already issued patch for the vulnerability at the end of 2011.”
MS12-029 rated critical
Another major criticality, MS12-029, which addresses potential security problems in Microsoft Word that could allow hackers to seize control of an infected machine, is also rated critical.
"In this case, the attack vector leverages the Outlook preview pane," Andrew Storms, director of security operations at nCircle, told CRN.
"You can receive an e-mail and have the attack triggered just through the preview pane without even opening the message," he said. "But the vulnerability only occurs if you have Word set up as the editor in Outlook, which is not the default setting."
The attack for MS12-029 is also based on remote code execution.
"We also see a much larger patch of vulnerabilities affecting Microsoft Excel," added Symantec's Chen. "The patches are rated important rather than critical because you still get a prompt to download or open the malicious content rather than it infecting automatically, but it could still be used as a targeted attack.”
“The Net [Framework] vulnerabilities are also prominent in this month’s patches,” Chen concluded. “Exploits for this vulnerability are likely to be hosted as drive-by downloads on maliciously created or otherwise compromised websites. So, as always we strongly advise avoiding sites of unknown or questionable integrity, to protect from attacks seeking to use these security holes.”
This article originally appeared at crn.com
Issue: 315 | May 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.