Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Development
    • Networking

    Microsoft Fixed Eight Bugs in Seven Patches in January’s Patch Tuesday

    Written by

    Fahmida Y. Rashid
    Published January 10, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsoft fixed eight vulnerabilities in the Windows kernel, Windows Media Player and developer tools as part of January’s Patch Tuesday update.

      Of the seven bulletins, only one was rated “critical,” according to Microsoft’s security bulletin summary released Jan. 10. The remaining bulletins were rated “important.” There was a reduction in the number of patches rated critical in 2011, according to Paul Henry, security and forensic analyst at Lumension. Microsoft is expected to bolster its “defense-in-depth” efforts, and more patches will be rated important, Henry said.

      “Historically, January has a been a light month for Microsoft patches and, so far, this year is no different,” said Andrew Storms, director of security operations at nCircle.

      The critical bulletin addressing two vulnerabilities in Windows Media Player for Windows Vista and XP (MS12-004) should be the highest priority, according to Storms. One of the bugs was a critical remote code execution flaw that could be exploited via a drive-by attack, according to Storms.

      Both vulnerabilities are relatively easy to trigger with a specially crafted media input file, according to Wolfgang Kandek, CTO of Qualys. Attacks can be launched from an email attachment or from a file hosted on a Website, he said.

      Attackers will continue exploiting client applications, such as media players and browsers, according to Marcus Carey, a security researcher at Rapid7. Media players are frequently the target of non-stop fuzzing, or the “process of throwing the kitchen sink at an application to find where it breaks,” Carey said.

      The Windows Media Player flaws provide “yet another reason” to upgrade to Windows 7, since those users would not be affected by the drive-by exploit, according to Storms.

      As the media player vulnerability is a memory-corruption issue, it would be a bit difficult to exploit, according to Joshua Talbot, security intelligence manager of Symantec Security Response. Even though Microsoft rated it as “important,” Talbot said he considered the flaw with the .NET packager (MS12-005) as the “most severe issue.” To exploit the vulnerability, the attacker has to convince the user to open the maliciously crafted Office document, according to Microsoft.

      Email attachments will likely be the most common attack method in which this flaw is exploited, according to Talbot. Attackers would be able to run malware as soon as the user opens the compromised Word or PowerPoint file, he said.

      There was also a new security classification, “Security Feature Bypass,” in this month’s release. This classification covers vulnerabilities that are not directly accessible, but could be used to facilitate an attack using a different vulnerability, according to Henry. Examples include turning off user access control, data execution prevention or address space layout randomization before running another exploit.

      Older versions of Microsoft’s Visual C compiler (2003 RTM) implemented the SAFESEH security measure in such a way that Windows XP, 2003, Vista, Windows 7 and Windows Server 2008 could not read the information and defaulted to running the binary without the security protection, Matt Miller, a security engineer on the security science team within Microsoft’s Security Engineering Center, wrote on the Security Research and Defense blog. Binaries compiled with the later versions of Visual-C were generated correctly. This patch (MS12-001) updates all versions of the Windows operating system to be able to read the older files.

      “There is no direct vulnerability here, but an attacker would have to identify software compiled with the old version of Visual-C, find the vulnerability in it and code an exploit that would use the SEH exploit mechanism,” Kandek said.

      The fix against BEAST attacks (MS12-006) should be deployed on all Web servers, Kandek said. A cryptographic attack against the secure socket layer that allows attackers to decode and eavesdrop on HTTPS traffic, BEAST was demonstrated at the Ekoparty conference in Buenos Aires in September.

      If administrators have not yet deployed the out-of-band patch that was released in late December to fix an ASP.NET vulnerability that could enable a denial-of-service attack, they should do so soon. A user named HybrisDisaster has released a proof-of-concept exploit code for the vulnerability on the Full Disclosure mailing list. Available for download from code repository site GitHub, the proof of concept exploits the way ASP.NET handles certain HTTP post requests.

      First disclosed in late December at the Chaos Communications Congress in Germany, the problem affects a variety of languages and applications other than ASP.NET. Microsoft shipped the emergency patch on Dec. 29 and recommended that users install it as quickly as possible.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.