Microsoft releases nine comprehensive security bulletins
Posted on 14 August 2012.
Microsoft released nine comprehensive security bulletins as part of its regular update cycle.

At the top of the Microsoft list is another MSCOMCTL related bug. Last patched in April, the Windows Common Control bug patched with bulletin MS12-027 made everyone sit up and take notice because it affects a huge number of applications including some very serious back office core systems like SQL servers and commerce servers.

There is some good news this month - that the attack vector associated with the MSCOMCTL patch is an RTF file - and the victim has to explicitly open the file to allow the exploit. If you can’t get this patch rolled out or mitigation applied quickly, you should remind users about the dangers of opening attachments from unknown persons.

It’s the third month in a row with a new Internet Explorer patch, so Microsoft is really taking advantage of the new ability to release an IE patch more frequently. This probably means there are a lot more IE patches in our collective future since it’s a good bet Microsoft will be tackling their IE backlog post haste.

As expected, MS is patching the zero-day bug called ‘Oracle Outside in Exchange’ bug. This vulnerability really never went anywhere in the exploit community. We have so far seen very little uptake on actively exploiting the bug.

MS12-054 contains a sprint spooler bug with a potentially wormable condition. Keen-eyed attackers are going need to focus carefully on vulnerability to uncover all of its potential. This is something that predominately affects small business and campus locations where Windows computers are configured in workgroups. If this describes your business, deploy this patch as soon as you can.

Hidden lower in the MS deployment priority is MS12-053, an RDP bug only affecting XP, another bug with a potentially wormable condition. This one has the potential for serious impact because it is network aware and no authentication is required. If you have XP on your network, then get the mitigations for this one installed ASAP.


Author: Andrew Storms, director of security operations at nCircle.





Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //