Critical Security Fixes on Tap for Windows, Outlook

By Lisa Vaas  |  Posted 2007-10-04 Print this article Print

Patch Tuesday, with four critical bulletins, also will bring fixes to Windows Mail, Internet Explorer and Word.

Microsoft will be putting out seven security advisories on Patch Tuesday, Oct. 9, with four critical bulletins out for Windows, Outlook Express, Windows Mail, Internet Explorer and Word.

Three bulletins are also on tap that target "important" flaws in Windows, SharePoint Services and Office SharePoint Server, according to a bulletin sent out on Symantecs DeepSite Alert Services
That about does it for details released in the advance notification from Microsoft, of Redmond, Wash.
eEye Digital Securitys Zero-Day Tracker gives some further hints as to what might be in store, however. One medium-risk vulnerability in Windows XP that the security firm is currently tracking can lead to an Internet connection-sharing DoS (denial-of-service) situation and remote shutdown of Windows Firewall from a LAN. That flaw has seen 341 days of exposure. It allows a LAN-side attacker to send a maliciously rigged DNS request to a vulnerable host to shut down the ICS service, which also includes the Windows firewall service. This problem wont lead to remote code execution, but it could lead to further exploitation after the firewall is kicked offline, notes eEye, of Aliso Viejo, Calif. The security firm Retina Network Security Scanner detected the vulnerability. But apart from that, mitigation amounts to disabling the ICS service or blocking udp/53 on the host running ICS, eEye said. Proof-of-concept code has been published on the Milw0rm exploit list for the vulnerability, which is identified as CVE-2006-5614. The only other open Microsoft vulnerability eEye is now tracking is a low-risk Windows flaw that can lead to RPC (remote procedure call) memory exhaustion. The RPC flaw has been floating around since Nov. 2005—a total of 687 days. Three proof-of-concept code sets have been published on the vulnerability, which can allow an attacker to supply the size of an output buffer. If that occurs, RPC allocates the buffer and initializes it to zeroes, causing the entire memory range to become committed. "For huge output buffers, the target service [which is given all the virtual memory it wants, due to its privileges] will cause virtual memory exhaustion, in the worst cases resulting in page file thrashing, a low virtual memory message and general system unresponsiveness," eEye said. Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.
Lisa Vaas is News Editor/Operations for and also serves as editor of the Database topic center. Since 1995, she has also been a Webcast news show anchorperson and a reporter covering the IT industry. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on, and in the startup IT magazine PC Connection. Prior to becoming a journalist, Vaas experienced an array of eye-opening careers, including driving a cab in Boston, photographing cranky babies in shopping malls, selling cameras, typography and computer training. She stopped a hair short of finishing an M.A. in English at the University of Massachusetts in Boston. She earned a B.S. in Communications from Emerson College. She runs two open-mic reading series in Boston and currently keeps bees in her home in Mashpee, Mass.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel