The Channel logo

News

By | Dan Goodin 12th April 2011 23:27

Updates galore in Microsoft's biggest ever Patch Tuesday

Relief for critical 0day bugs

Microsoft has patched a record 64 vulnerabilities in Windows, Office and five other software packages, many of which allowed attackers to remotely install malware on end user machines.

The most important fixes addressed a vulnerability in the Internet Explorer browser that was exploited in last month's Pwn2Own contest. Although details were kept confidential, hackers have begun exploiting the critical flaw in real-world attacks, Microsoft warned. The use-after-free vulnerability affects versions 8 and earlier of the Microsoft browser.

The other top priority should be updates that patch critical vulnerabilities in the way Windows handles networking requests using the SMB, or Server Message Block, protocol. By sending malformed packets, attackers can remotely install malware on vulnerable machines with no user interaction required.

Researchers have warned that the flaw could be exploited to install self-replicating worms in much the way a similar vulnerability from 2008 did. Even after Microsoft issued an emergency patch for the flaw, it still opened the door to the Conficker Worm, which commandeered millions of machines.

The monster patch batch also included relief for another flaw in all supported versions of Windows that Google has said was being exploited by "politically motivated" attackers against activists. The MS11-026 update fixes the way Windows parses webpages containing MIME-formatted content.

Microsoft also introduced two tools that are designed to thwart malware attacks. One extends a protection known as Office File Validation to older versions of Office. The feature, which was previously available only to users of Office 2010, helps users to identify malicious Office files by scanning and validating them before they are opened.

The second tool is an update to the winload.exe component that helps flag device drivers that have been booby-trapped to install malware.

The patches were released in 17 bulletins, nine of which carried a rating of “critical,” a designation typically reserved for vulnerabilities that can be remotely exploited to install malware or expose sensitive user data. The remaining eight bulletins were rated “important.”

Microsoft offers a quick overview of this month's Patch Tuesday here and a bulletin-by-bulletin risk assessment here. As always, SANS has a helpful summary here. ®

comment icon Read 22 comments on this article alert Send corrections

Opinion

Tim Worstall

Or why the reversal of globalisation ain't gonna 'appen
The full Spanglish breakfast: mealy pudding, bacon, black pudding, sausages, fried egg, toast
Blood image

Trevor Pott

Can the storage giant overcome a lack of necessary leadership?

Chris Mellor

Why overlapping kit from a merger equals a disaster in waiting

Features

No, silly... he was the fall guy for years of Finnish folly
Fraud image
Frodo and the Ring
Microsoft's strategy is to make Store apps popular. Good luck with that