Microsoft has patched a record 64 vulnerabilities in Windows, Office, and five other software packages, many of which allowed attackers to remotely install malware on end user machines. The most important fixes addressed a vulnerability in the Internet Explorer browser that was exploited in last month's Pwn2Own contest. Although details were kept confidential, hackers have begun exploiting the critical flaw in real-world attacks, Microsoft warned. The use-after-free vulnerability affects versions 8 and earlier of the Microsoft browser.Rico says, given all that, is it any wonder he uses Apple machines?
The other top priority should be updates that patch critical vulnerabilities in the way Windows handles networking requests using the SMB, or Server Message Block, protocol. By sending malformed packets, attackers can remotely install malware on vulnerable machines with no user interaction required.
Researchers have warned that the flaw could be exploited to install self-replicating worms in much the way a similar vulnerability from 2008. Even after Microsoft issued an emergency patch for the flaw, it still opened the door to the Conficker Worm, which commandeered millions of machines.
The monster patch batch also included relief for another flaw in all supported versions of Windows that Google has said was being exploited by politically motivated attackers against activists. The MS11-026 update fixes the way Windows parses webpages containing MIME-formatted content.
Microsoft also introduced two tools that are designed to thwart malware attacks. One extends a protection known as Office File Validation to older versions of Office. The feature, which was previously available only to users of Office 2010, helps users to identify malicious Office files by scanning and validating them before they are opened.
The second tool is an update to the winload.exe component that helps flag device drivers that have been booby-trapped to install malware.
The patches were released in seventeen bulletins, nine of which carried a rating of “critical”, a designation typically reserved for vulnerabilities that can be remotely exploited to install malware or expose sensitive user data. The remaining eight bulletins were rated “important".
12 April 2011
Patch, patch, patch...
Dan Goodin has an article at TheRegister.com about Windows and the fixing thereof:
No comments:
Post a Comment
No more Anonymous comments, sorry.