Microsoft sends security patches, urges fix-it for XML Core Services vulnerability

Jun 14, 2012 by Nancy Owano report

(Phys.org) -- Confirm, warn, patch. Microsoft has had a busy week, this being the week of Patch Tuesday, an event held on the second Tuesday of the month, when Microsoft releases security patches. On this latest Patch event, Microsoft issued seven security bulletins, three of which were termed as critical, warning users of twenty-six vulnerabilities in Microsoft products, a number of them involving Internet Explorer. The patches affect supported Windows versions, the .NET Framework, Remote Desktop, Lync and Dynamics AX. A patch that had been announced for Visual Basic for Applications has yet to be released.

MS12-037, especially, is being discussed as a critical bulletin that addresses 13 vulnerabilities in 6, 7, 8 and 9 that could allow for remote-code execution. Security managers have seen this bulletin as pertinent, as IE is so widely used in homes, businesses and public organizations.

In its IE security update, Microsoft said the most severe vulnerabilities could allow remote code execution if a person uses IE to visit a booby-trapped webpage. The attacker could gain control of the computer with the same user rights as the browser victim. Those especially vulnerable to the exploit are users operating with administrative rights; less so for users whose accounts are configured to have fewer rights.

The security update is rated Critical for IE 6, 7, 8, and 9 on Windows clients. As most customers have enabled automatic updating, the security update will be installed automatically. Customers who have not enabled automatic updating need to install this update manually.

Another advisory in the Patch lineup addresses in Microsoft XML Core Services, again opening the user up to remote code execution. Microsoft said it was still investigating this and plans to issue a solution through its monthly release process or if necessary an out of cycle security update. Meanwhile, Microsoft has issued a “Fix it” solution intended to block the attack vector. Microsoft encourages customers running an affected configuration to apply the Fix it solution as soon as possible. The vulnerability affects all supported versions of Windows and editions of Microsoft Office 2003 and Microsoft Office 2007.

The Microsoft update MS12-036, labeled as Critical, concerns denial of service and remote code execution vulnerabilities in the Remote Desktop features that are built into supported versions of Windows. Microsoft warns that in Remote Desktop allows remote code execution. This is when the attacker sends a sequence of crafted RDP packets to an affected system. Those who do not have the RDP enabled on Windows are not at risk. The update will be installed automatically for users whose systems have automatic updating.

Explore further: The new Candy Crush? Chinese language apps make learning a game

More information:
technet.microsoft.com/en-us/se… ty/bulletin/ms12-037
technet.microsoft.com/en-us/se… ity/advisory/2719615
technet.microsoft.com/en-us/se… ty/bulletin/MS12-036
technet.microsoft.com/en-us/se… ty/bulletin/ms12-jun

Related Stories

Microsoft patches 'critical' crack in Windows

Aug 03, 2010

Microsoft released an emergency patch for a "critical" crack in Windows operating system software that could let hackers take control of computers over the Internet.

Microsoft to patch 17-year-old bug

Feb 08, 2010

(PhysOrg.com) -- Microsoft's February security update will include a patch for a bug that dates back to Windows NT 3.1, which was released in July 1993. The vulnerability has been present but undetected in ...

Microsoft fixes browser flaw used in Google breach

Jan 21, 2010

(AP) -- Microsoft Corp. took the unsual step of issuing an unscheduled fix Thursday for security holes in its Internet Explorer browser that played a role in the recent computer attacks that led Google to threaten to leave ...

Recommended for you

New app first to use gesture for language learning

Jan 29, 2015

While you might think a person shaking her phone or tablet from side to side is having issues with the device, she might actually be playing a game that has her mimicking a steering wheel motion as part of ...

Linux distrib vendors make patches available for GHOST

Jan 29, 2015

Qualys said on Tuesday that there was a serious weakness in the Linux glibc library. During a code audit, Qualys researchers discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.