“Patch Tuesday” Update – More Patches and Fixes

This last “Patch Tuesday” brought some important fixes for Microsoft users. Especially Word and Vista IPsec users, take note!

Eleven major soft spots addressed by latest Patch Tuesday

“The full effect of yesterday’s round of patches from Microsoft is just now being felt. This time, it’s not the worldwide DNS flaw that’s the big issue, but the typical stuff that afflicts Microsoft products, including and especially Office. One of the ‘critical’ vulnerabilities addressed yesterday affects older versions of Microsoft Word, and was acknowledged by the company last month. It involves intentionally malformed documents that, when parsed by Word, cause it to crash but also leave memory corrupted. Within that corrupt memory can lurk remnant code that could then be executed to give a remote, malicious user unauthorized privileges. You’d think that perhaps an Office 2003 Service Pack would be the answer to this problem, as systems with that service pack loaded were reportedly unaffected, as were systems with Office 2007 with or without SP1. But this week, Microsoft did elect to address the issue with a separate fix. Another of the 11 issues addressed with this round includes a bizarre problem, rated just ‘important’ rather than ‘critical,’ having to do with IPsec: In Windows Vista, IPsec is a component that enables a fully encrypted connection, but with other systems that can host it (for instance, Windows Server 2008). It enables businesses to avoid having to deploy sophisticated, and often entangled, VPNs to secure their connections and open up file system access to privileged users. In Vista, IPsec is closely tied with the group policy system, which is also part of its Advanced Firewall. These group policy objects determine how and whether certain security features are employed; and in the case of this particular security hole, the policy system can be fooled, and network traffic that’s supposed to be encrypted, won’t be. This fix affects both Vista and WS2K8, both 32- and 64-bit versions. In a clear indication that no Windows component is, by design, safe if it can communicate with other systems, it was discovered that an old-style heap-based buffer overflow could be triggered by, of all things, the Internal Color Management (ICM) system. This is the part of Windows that manages color profiles for displays and printers, translating hues from image files into true representations for the screen, and in turn into equally true representations in print.”

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.