Menu
Microsoft Edge browser gets its first critical patches

Microsoft Edge browser gets its first critical patches

Microsoft Edge gets 4 security fixes in its first patch Tuesday, while older sibling Internet Explorer got 17

Released a little over a month ago, Microsoft's new Edge browser has gotten its first set of critical security patches.

As part of its monthly round of security fixes, colloquially known as Patch Tuesday, Microsoft released a critical bulletin, MS15-05, with four patches covering vulnerabilities in the Windows 10-only Edge browser.

Overall this month, Microsoft issued 12 bulletins covering 56 vulnerabilities. Five bulletins were deemed as critical, meaning they should be addressed as soon as possible.

In addition to Edge, this month's patches cover issues in Internet Explorer, Windows, Office, Exchange, the .Net framework, the Hyper-V virtual machine, Active Directory, and Skype for Business.

Microsoft built Edge as the next generation browser for Windows, one designed to replace Internet Explorer over time.

All the Edge vulnerabilities Microsoft disclosed this month were also found in Internet Explorer, which was covered by MS15-094, pointed out Wolfgang Kandek, chief technology officer for IT security firm Qualys.

"Someone could attack you, whether you have either Internet Explorer or Edge, using a specially crafted Web page," Kandek said.

The duplicates show the code overlap between Edge and IE, indicating that the engineering team developing Edge used at least part of the code base for IE, Kandek said.

But the fact that Edge had fewer vulnerabilities this month than IE, which had 17, shows that Microsoft's engineering effort in building a more secure browser seems to be paying off, Kandek said.

It also shows how difficult it is to write software that is error-free and immune to attackers, he said.

Because Windows 10 hasn't been widely installed in the enterprise yet, reviewing the Edge bulletin may not be the top priority on administrators' to-do lists.

Instead, the bulletins that they should take a look at first are MS15-097 and MS15-099, which describes a number of critical vulnerabilities found in Office 2007 and 2010, advised Amol Sarwate, Qualys director of engineering.

"There are already attacks going on in the wild" that use these vulnerabilities, Sarwate said. Many are remote code execution vulnerabilities, meaning the user only needs to open a maliciously-crafted Excel or Word document, and the code within can execute actions without the user's knowledge.

Those shops running Microsoft Exchange and Active Directory should also take a close look at MS15-096 and MS15-103, covering Active Directory and Microsoft Exchange, respectively.

The Exchange vulnerability could allow a malicious attacker to gain entry to a user's files through the Outlook Web Access (OWA) client.

The Active Directory flaw makes the software vulnerable to a denial of service (DoS) attacks.

Active Directory is typically a critical application for businesses. It keeps track of all the user accounts, and it is not usually exposed to the Internet. But the administrator still should remain diligent in keeping it patched.

"If someone breaks into your network, Active Directory may be the first thing they will try to attack," Sarwate said.

Thus far this year, Microsoft has issued 105 bulletins, and Qualys estimates that number to hit 145 by the end of the year. This is up from years past. In 2014, Microsoft issued 106 bulletins and 100 in 2011. (Those issues that Microsoft finds internally are typically not publicized and instead are patched with routine updates before attackers find out about them.)

"I don't think software is becoming any more vulnerable," Kandek said. Rather a rising number of vulnerabilities stems from more third party researchers and attackers finding problems, coupled with the growing numbers of different products, versions and platforms that products run on.

"It's a good indicator for how important security is becoming," Kandek said.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Malwarebytes shoots the breeze with channel, prospects

Malwarebytes shoots the breeze with channel, prospects

A Kumeu, Auckland, winery was the venue for a Malwarebytes event for partner and prospect MSPs - with some straight shooting on the side. The half-day getaway, which featured an archery competition, lunch and wine-tasting aimed at bringing Malwarebytes' local New Zealand and top and prospective MSP partners together to celebrate recent local successes, and discuss the current state of malware in New Zealand. This was also a unique opportunity for local MSPs to learn about how they can get the most out of Malwarebytes' MSP program and offering, as more Kiwi businesses are targeted by malware.

Malwarebytes shoots the breeze with channel, prospects
EDGE 2019: Channel forges new partnerships during evening networking

EDGE 2019: Channel forges new partnerships during evening networking

Partners, vendors and distributors reconnected during a number of social gatherings during EDGE 2019. The first evening saw the channel congregate for a welcome party at the Hamilton Island yacht club, while the main poolside proved to be the perfect stop for a barbecue on the final night.

EDGE 2019: Channel forges new partnerships during evening networking
Show Comments