Microsoft Tuesday released seven security patches covering a wide array of the company’s products. Two of those patches fix holes that Microsoft deemed “critical” and warned could allow remote attackers to take control of vulnerable Windows systems.Microsoft Tuesday released seven security patches covering a wide array of the company’s products. Two of those patches fix holes that Microsoft deemed “critical” and warned could allow remote attackers to take control of vulnerable Windows systems.The software updates include fixes for previously unknown holes in Windows, including critical holes in the Windows Task Manager and HTML help features. The company also published a patch for a recent, publicly disclosed hole in the Windows Shell application programming interface (Shell API) and fixed a hole in older versions of the Internet Information Services (IIS) Web server that one expert said is well-suited for use in an Internet worm.The seven updates, named MS04-018 through MS04-024, were released in accordance with the company’s monthly patching schedule. At the top of the list were two patches, MS04-022 and MS04-023, that Microsoft said were “critical” and could allow remote attackers to run malicious code on affected Windows systems, according to the Microsoft Web page. MS04-022 fixes a hole in Windows Task Scheduler, a Windows component that lets users schedule commands, programs or computer scripts to run at a specific time. A buffer overrun vulnerability in the Task Scheduler could allow a malicious hacker to place and run attack code on the vulnerable system, Microsoft said.In buffer overrun attacks, malicious hackers purposely fill a buffer, or temporary data store, causing data, including malicious code written by the attacker, to spill over into other parts of the system’s memory. Buffer overrun attacks can be used to shut down vulnerable systems, corrupt data, alter the way applications run or give attackers control over the systems. Attackers could embed attacks on the Task Scheduler in a file on a Web page, then trick Windows users into visiting that page. Alternatively, a Task Scheduler file, called a JOB file, could be tailored to trigger the buffer overrun, Microsoft said.MS04-023 fixes two more newly discovered critical holes in the Windows HTML help feature. One hole, in a component called showHelp, fixes an error in the way that Windows processes a type of help file known as a CHM file. If left unfixed, the flaw could allow a remote attacker to use specially crafted URLs to run attack code on the vulnerable Windows system. Attackers would have to trick users into clicking on a malicious link, using a specially designed Web page, or a link embedded in an HTML format e-mail message, Microsoft said.A second flaw in the way Windows checks data in help files also was patched by MS04-023. That vulnerability could allow an anonymous user to set up a Web site containing code designed to trigger the vulnerability. Attackers could also embed attack code in an HTML format e-mail message, Microsoft said.In addition to those two critical fixes, Microsoft patched four holes rated “important,” which indicates that exploitation could result in the compromising of data, but not the creation of an Internet worm. One of those patches is related to a widespread Web attack in late June in which hackers modified the configuration of Microsoft IIS Web servers, allowing malicious code to be appended to every HTML document served by the Web serverOn July 2 Microsoft released a software update that disabled a Windows component called ADODB.Stream, which online criminals were using in the attacks to copy malicious code, known as “Download.Ject” or “Scob,” onto Windows users’ machines.In MS04-024, Microsoft patched a hole in the Windows Shell API that could have allowed a remote attacker to take control of fully patched Windows systems using a slightly modified version of the Download.Ject attacks. The Shell API hole was discovered by Dutch security expert Jelmer Kuperus, who published the code on the Web earlier this month. In MS04-021, Microsoft also issued a patch for customers using IIS Version 4.0 and Windows NT 4.0. A buffer overrun flaw fixed by that patch could allow a remote attacker to take control of a vulnerable system by sending a specially crafted message to the vulnerable IIS sever, causing it to run the attacker’s code, Microsoft said.Despite being rated “important,” rather than critical, by Microsoft, the MS04-021 hole is of particular concern to security experts at McAfee, according to Vincent Gullotto, vice president of the Anti-Virus Emergency Response Team at McAfee.Like the vulnerabilities that led to the Blaster and Sasser Internet worms, the IIS 4.0 hole gives malicious hackers total control over vulnerable servers without requiring them to trick users into clicking on a link or visiting a Web page, he said.The fact that the vulnerability only affects organizations using Windows NT and IIS 4.0 limits its reach somewhat, but many companies still use those products and could fall victim to an attack, Gullotto said. McAfee experts are also concerned about both the showHelp hole plugged by MS04-023 and the Shell API hole fixed by MS04-024. In both cases, proof of concept code has been released on the Internet that could make it easier for less-sophisticated hackers to launch attacks targeting the security holes, he said.“(Proof of concept code) simply increases the risk that it will attract attention from a virus writer, who could create something quicker. It just ups the ante for a zero-day attack,” he said. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe