IE, Windows Media Player, Visual Studio flaws fixed

Microsoft Corp. has rolled out its monthly security updates for December, patching critical flaws in Internet Explorer, Windows Media Format and the Visual Studio 2005 development software.

The seven security patches address 11 bugs, including two in the Windows Media Player software. However, no fixes were provided for two Microsoft Word flaws that have been used in a small number of attacks over the past week.

Microsoft had said it would release only six patches on Tuesday, but the company added the Windows Media Format update at the last minute, after reports of attacks based on this vulnerability began surfacing. The Windows Media Format is used by Microsoft’s Windows Media Player software.

In late November, security vendors warned that a buffer overflow error could occur when the Windows Media Player processed “.asx” (Advanced Stream Redirector) media files, meaning that users would first need to be tricked into opening a malicious media file for the attack to work.

In its update Tuesday, Microsoft also patched a similar bug in the way the media player processes “.asf” (Advanced Systems Format) files.

The Internet Explorer patch fixes four bugs. It is also rated critical, and is noteworthy because some of these bugs will probably begin to be exploited by hackers by week’s end, said Gunter Ollmann, director of IBM Corp.’s Internet Security System’s X-Force threat analysis service.

Enterprise administrators should also pay close attention to an SNMP (Simple Network Monitoring Protocol) patch issued Tuesday, Ollmann said.

Microsoft has rated this patch as “important,” rather than critical because SNMP is normally blocked at the firewall and turned off by default on Windows systems. However, it is widely deployed as part of the network monitoring infrastructure in the enterprise, and is often used on critical servers, Ollmann said.

Ollmann believes this SNMP patch is the “most important” update for enterprise customers.

“Since the service is widely deployed in the enterprise and since it’s commonly deployed on servers, we think this would be an important attack vector for enterprises,” he said.

The remaining updates include a “critical” fix for Visual Studio 2005, and “important” updates for Windows and Outlook Express, Microsoft said.

Microsoft defines “critical” flaws as bugs that could allow the propagation of an Internet worm without any action on the part of the victim.

The company’s next set of security updates are due Jan. 9.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now