Microsoft: 10 patches for Windows

 

Connecting state and local government leaders

Critical releases plug holes vulnerable to remote code execution exploits in Windows programs interacting with wireless protocol using voice and data for Bluetooth, Internet Explorer and Microsoft DirectX.

As expected, Microsoft has released seven patches for its June rollout of security
fixes. In total, the patches address about 10 separate
vulnerabilities.

All of the critical items plug holes vulnerable to remote code
execution (RCE) exploits in Windows programs interacting with
wireless protocol using voice and data for Bluetooth, Internet
Explorer and Microsoft DirectX, an application programming function
in Windows.


Meanwhile, the important fixes are designed to block elevation
of privilege and denial of service from would-be hackers in Windows
Internet Name Service, Active Directory and Pragmatic General
Multicast, a transport protocol in Windows programs used for file
transfer and streaming media.


The moderate patch applies to the kill bit function in Windows
programs, a method by which a user can shut off an ActiveX control
in IE.


But it's the Bluetooth vulnerability, experts say, that is most
important to patch because it exemplifies the relatively nascent
attack vector of wireless peripherals.


"[The Bluetooth vulnerability] is noteworthy because user
interaction is not required," said Ben Greenbaum, senior research
manager for Symantec. "All that is required is for the device to
have Bluetooth on and to be within range of the attacker. That's
something IT guys should look at first."


Second to that in importance, according to Greenbaum, is the
patch for Active Directory, a critical component to system setting
in a Windows processing environment. He added that the IE patch is
also "very mission-critical."


Critical fixes


Bluetooth technology and how it interoperates with Windows
components and applications is the theme of the first critical patch. According to
Redmond, it resolves "a privately reported vulnerability in the
Bluetooth stack in Windows" which could allow a hacker carte
blanche -- edit, delete, change and write capabilities -- over an
enterprise system. The affected systems are all versions of Windows
XP, Service Packs 2 and 3, and Vista SP1.


"The Bluetooth bulletin is the most interesting critical patch
that deserves keen attention," said Paul Zimski of Scottsdale,
Ariz.-based Lumension Security. "The impact of a remote code
execution in Windows Bluetooth could mean that it's possible to
attack a victim's computer just by being within close proximity and
not actually being on the network itself."


The second critical patch is a cumulative
security update for IE affecting every release from 5.01 through 7;
it also cuts a wide swath across operating systems. This patch,
which Microsoft said resolves one private and one publicly
disclosed vulnerability, will touch Windows 2000 SP4, XP SP2 and
SP3, Windows Server 2003 SP1 and SP2, Vista SP1, and all versions
of Windows Server 2008. The fix is designed to stave off hacker
incursions via specially crafted Web pages in IE.


For the third and final critical item, Redmond
is patching different versions of DirectX to stop hackers from
deploying RCE exploits using maliciously configured media files.
DirectX is an application programming interface mostly used for
developing games, streaming audio, interactive video and other
graphics features on Microsoft platforms. Experts say security
administrators would do well to patch this vulnerability unless
they want to find out a new meaning for "viral video."


Important bulletins


The first important patch pertains to
Windows Internet Name Service, a data cluster for holding host
names and network addresses that acts as a central mapping function
for the network. It affects all editions of Windows Server
2003.


Next is the patch for Active Directory in XP,
Windows Server 2003 and the 32- and 64-bit versions of Windows
Server 2008. The patch prevents a hack that would leave enterprise
users locked out of their system via a denial-of-service exploit.
Analysts say the "important" label for this patch may be
misleading.


"Even though the Active Directory bulletin is only marked as
important, this is something businesses will want to address
primarily because Active Directory is such a business-critical
system and an attack could potentially grind networks to a halt,"
Zimski said.


The file transfer and streaming media transmission protocol
called Pragmatic General Multicast is at the center of the third and last important patch of the
month. This fix, which resolves what Redmond called "two privately
reported vulnerabilities" in the program, would also prevent
denial-of-service exploits affecting XP, Vista, Windows Server 2003
and Windows Server 2008.


In 'moderation'


In recent months, Microsoft has mostly confined its patch
designations to either "critical" or "important." But this month,
one "moderate" item has been thrown into
the mix.


This patch is a cumulative security update of ActiveX kill bits,
fixing what Microsoft's executive summary described as a
"vulnerability [that] could allow remote code execution if a user
viewed a specially crafted Web page" with a speech-recognition
feature in Windows enabled. Additionally, this includes a kill bit
for software produced by independent software vendor BackWeb.


Microsoft noted that this vulnerability may not affect end users
that much, especially if they don't have administrative rights on a
system.


All seven patches this month will require a restart or reboot of
some kind. And, as in other Patch Tuesdays since late spring,
Microsoft referred IT pros to this Knowledge Base article for a
description of non-security and high-priority updates on Microsoft
Update, Windows Update and Windows Server Update Services. Some of
this month's items include updates for IE 7 dynamic installer and
updates for XP, Vista and Windows Server versions 2003 and
2008.


"Nothing particularly shocking this month -- except for me being
shocked that I actually tend to agree in the context of the
severity of patch designations. I think Microsoft got it right this
time," said Eric Schultze, chief technology officer of Shavlik
Technologies in St. Paul, Minn. "An important thing to note is that
four of the seven bulletins are server-side vulnerabilities,
meaning no user interaction is required for a system to be hacked.
Hackers have more fun with server-side issues."


This article was originally published May 8 at RedmondMag.com,
an affilate Web site of GCN.com. RedmondMag.com and GCN.com are
1105 Media Inc. properties.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.