Microsoft patched a whopping 57 vulnerabilities for this February 2013 Patch Tuesday, "coming close to the all-time Patch Tuesday tally of 64 flaws, all patched with fixes in April 2011." You probably recall the critical zero-day hole in Internet Explorer 6, 7 and 8, then the IE quick-fix that was easily broken, before Microsoft issued an out-of-band security bulletin for IE on January 14. The patches today will close the critical IE holes.
Since there are two separate IE bulletins, Andrew Storms, director of security operations at nCircle, said his "Spidey senses" are on alert. "I'm sure other IT security teams are wondering exactly what kind of IE Valentine we're going to get." Storms added, "This is the first time I've seen them do this. Unless there's been an 'out-of-band' update for IE, they've never released more than one update [for the browser] in a month. I certainly expect to see an interesting blog post next week with some long, convoluted explanation."
While there is not yet a "convoluted explanation," MSRC took a detour to discuss baseball this time.The post also suggests using the free Enhanced Mitigation Experience Toolkit (EMET) for additional protection. EMET preview was released at the 2012 Black Hat security conference in Las Vegas.
Of the 12 bulletins, five are critical and seven are classed as important, but Microsoft Security Response Center advised deploying MS13-009 for IE first; it fixes 13 bugs. Another top priority is MS13-010 which is also for IE; it fixes a vulnerability in the Vector Markup Language. Microsoft said no attacks have been detected, but "the vulnerability could allow remote code execution if a user viewed a specially crafted webpage using Internet Explorer."
The other top-rated patch to deploy is MS13-020 for Microsoft XP Windows Object Linking and Embedding (OLE) Automation. Although Microsoft said it also has not detected any attacks yet, "the vulnerability could allow remote code execution if a user opens a specially crafted file. An attacker who successfully exploited the vulnerability could gain the same rights as the current owner." As a reminder, end-of-life for XP is set for April 1, 2014 and that's no April Fool's prank.
This security update resolves thirteen issues in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same rights as the current owner. The issues were privately disclosed and we have not detected any attacks or customer impact.
Additionally, the Microsoft Security Advisory 2755801 states, "Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer 10 on all supported editions of Windows 8, Windows Server 2012, and Windows RT. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10."
Sophos' Graham Cluley said, "If you are responsible for the security of your computer - do try to install the patches promptly."
The worry will be, of course, that malicious hackers will examine the patches released by Microsoft and attempt to release exploit code to take advantage of vulnerable computers shortly afterwards .The longer you take to update the security patches on your computer, the greater potential risk you could find yourself in. Of course, the worry is even worse for corporations - many of whom are reluctant to automatically roll-out Microsoft security patches until they are confident that they don't cause conflicts that could increase calls to the internal support department.
Like this? Here's more posts:
- Interview with Microsoft's Director of Trustworthy Computing Jacqueline Beaucher
- Exploiting Universal Plug-n-Play protocol, insecure security cameras & network printers
- DARPA’s unblinking, all-seeing 1.8-gigapixel camera stare on PBS Rise of the Drones
- Microsoft's online safety assessment scores show failing grades globally
- Bugged guesthouse: Eric Schmidt's daughter reveals North Korea trip details
- Scroogled: Microsoft launched 'privacy' petition to stop Google from scanning emails
- Oracle releases emergency Java patch; experts warn flaws may take 2 years to fix
- Open letter to Microsoft calls for Skype transparency reports
- Flickr privacy bug changes some private photos to public, then public to private
- Chinese hackers use compromised USA university computers to attack us
- Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise
Follow me on Twitter @PrivacyFanatic
Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues. Smith has a diverse background in information technology, programming, web development, IT consulting, and information security. She focuses on the unique challenges of maintaining privacy and security, both for individuals and enterprises. She has worked as a journalist and has also penned many technical papers and guides covering various technologies. Smith is herself a self-described privacy and security freak.
Smith is an independent contractor and is not affiliated with any vendor that makes or sells information technology.
Policy on comments: Respectful discussion is welcomed! However comments that use inappropriate language, consist of name calling or personal attacks, or include accusations of wrongdoing are not appropriate. Those comments will be deleted or edited