Microsoft releases two security bulletins
Posted on 11 September 2012.
The Microsoft Security Bulletin Summary for September 2012 includes just two bulletins, both of which address vulnerabilities rated “important.” The first, MS12-061, addresses a cross site scripting vulnerability (CVE-2012-1892) that affects Microsoft Developer Tools.

The second bulletin, MS12-062, addresses a reflective cross site scripting vulnerability in System Center Configuration Manager (CVE-2012-2536). Both of these vulnerabilities would result in escalation of privileges should an attacker be able to successfully exploit them.

Both of these bulletins are pretty low risk to most organizations; however, employees should never be allowed to browse the Internet or check email from servers that this software could reside on. To be able to exploit these vulnerabilities, an attacker would craft a malicious link for a victim to click on, allowing them to compromise the victim’s system. It’s always a good idea to educate employees/ end-users on how to spot and avoid suspect links.

While there are only two bulletins, security professionals should focus on the fact that Microsoft will be issuing an update next month (October 2012) that will deprecate the use of certificates that are less than 1024 bit encrypted. Organizations should take advantage of this light patch month so they can focus on updating their legacy certificates.

Per Microsoft, some known issues that customers may encounter after applying this update may include:
  • Error messages when browsing to web sites that have SSL certificates with keys that are less than 1024 bits
  • Problems enrolling for certificates when a certificate request attempts to utilize a key that is less than 1024 bits
  • Difficulties creating or consuming email (S/MIME) messages that utilize less than 1024 bit keys for signatures or encryption
  • Difficulties installing Active X controls that were signed with less than 1024 bit signatures
  • Difficulties installing applications that were signed with less than 1024 bit signatures (unless they were signed prior to January 1, 2010, which will not be blocked by default).

Author: Marcus Carey, security researcher at Rapid7.





Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //