Tenth Anniversary Patch Tuesday brings crucial Microsoft Explorer fix
- 09 October, 2013 08:38
As anticipated, the latest round of Microsoft's Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers.
The critical IE bulletin covers one publicly disclosed vulnerability and nine vulnerabilities not yet known by the public. The other three critical bulletins address flaws in the Windows OS. Three of the bulletins marked as important address issues with Microsoft Office, and the fourth remedies a problem in Silverlight.
Administrators should apply the patch for the IE vulnerabilities first, advised Wolfgang Kandek, chief technology officer of IT security firm Qualys.
This month's collection also marks the 10th anniversary of Microsoft's Patch Tuesday, which the company started in October 2003 in order to bundle security patches into monthly release cycles, which would allow system administrators to apply them all at the same time, rather than deal with each patch individually.
Although holding on to crucial patches for up to 30 days can be potentially problematic in terms of security -- at least for those patches that address publicly known vulnerabilities -- the monthly release cycle has been beneficial for the industry, in that it brings order to an otherwise unruly process of staying ahead of those who exploit vulnerabilities for nefarious purposes, Kandek said.
"Our perspective has certainly evolved from 10 years ago when Patch Tuesday was started. Back then vulnerabilities were clear cut and straightforward to understand. Today the amount of complexity that goes into the detection and remediation process is truly impressive," Kandek later added in an e-mail statement.
The IE public vulnerability, works by exploiting how IE accesses computer memory, allowing a maliciously designed Web page to gain user privileges on a computer. "Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights," a Microsoft advisory warned.
When the vulnerability was made public last month, malicious hackers quickly put it to use. An exploit based on the vulnerability was added to the popular penetration testing framework Metasploit, where it could be used on its own, or as one in a chain of vulnerabilities designed to gain illicit access to computers. Most of the attacks targeted versions 8 and 9 of IE, though all currently supported versions of the browser could be affected.
The IE vulnerability might have been severe enough to warrant Microsoft issuing an out-of-band patch before this month's Patch Tuesday. Instead, the company issued instructions on how to temporarily fix the problem and scheduled the correction for this month's Patch Tuesday. The move was a wise one, Kandek said. "Every time you go out of band, it makes the work of the IT administrators harder, because they have to react to it and push out patches that they were not prepared for," he said.
Although Microsoft deemed the Office patches only as "important," Kandek advised administrators to apply these as soon as possible as well. Computers with either Microsoft Excel or Microsoft Word could be compromised by a maliciously crafted file that harnesses these vulnerabilities to gain control of the user's computer.
"You need to open a file in order to be infected," Kandek said. Qualys sees these vulnerabilities as critical because "opening a Word file or an Excel file is not much of an obstacle," Kandek said
These exploits could also prove to be dangerous in that Office tends not to be patched by administrators or users with the same frequency as IE, Kandek said.
In addition to issuing the patches this Tuesday, Microsoft also awarded a US$100,000 bounty to security researcher James Forshaw for developing a mitigation bypass technique to compromise Microsoft Windows computers by exploiting a series of bugs. Microsoft can use this technique to better understand, and defend against, entire classes of attacks, the company stated.
Adobe also issued critical patches on Tuesday for Adobe Reader and Adobe Acrobat. Kandek recommends patching this software as soon as possible as well.