Microsoft ends year by patching 11 bugs
- — 13 December, 2007 08:40
Microsoft released seven security bulletins this week that patch 11 vulnerabilities in Windows, Internet Explorer, Windows Media Player and other parts of the operating system. Two of the bugs are currently being exploited by attackers, Microsoft confirmed.
Of the seven updates, three are rated critical -- the highest ranking Microsoft uses -- while the other four are labeled important, the second-highest category in the company's four-step scoring system.
The three critical bulletins, which fix seven different flaws in DirectX, the Windows Media Format runtime used in Windows Media Player and Internet Explorer, should be patched pronto, a pair of security experts said Tuesday. "These are the worst kind of client-side vulnerabilities that one could wish for," said Andrew Storms, director of security operations at nCircle Inc. "All three of them deal with rich multimedia content.
"Obviously, attackers have moved away from sending malware and toward drive-by attacks," Storms added.
Amol Sarwate, the manager of Qualys Inc.'s vulnerability lab, echoed Storms in both his choice of patches to administer first and his reasoning. "The three bulletins marked critical [include vulnerabilities that] are of the type we've seen attackers use to target common desktop users, rather than trying to attack servers."
Sarwate got a bit more specific, however, in pinpointing the single-most dangerous bug patched Tuesday: MS07-069, the bulletin that addresses four vulnerabilities in IE6 and IE7, should be deployed first, he advised, because one of those flaws is already being exploited in the wild. "The DHTML zero-day is extremely important to patch," said Sarwate.
The three critical updates -- MS07-064, MS07-068 and MS07-069 -- plug holes in DirectX, Windows Media Format runtime and IE6 and IE7, respectively. Six of the seven vulnerabilities covered by those updates were pegged as critical for Windows Vista, which Microsoft has touted as it most secure ever.
MS07-064 quashes a pair of bugs in the DirectX handles several streaming video file formats; hackers could exploit the vulnerabilities by duping users into viewing rigged streaming media, said Microsoft.
"This is significant, because many applications -- and Windows itself -- use DirectX to deliver rich content," said Storms, noting that ".wav files, .avi files, and SAMI [Synchronized Accessible Media Interchange] files are all very popular and are used by tons and tons of Web sites." Users are accustomed to opening such formats, he added, making it even likelier that an attack file would pass muster.
MS07-068, Storms said, is "an almost exact duplicate," since it also involves a file format parsing bug, he said. Windows Media Format runtime, part of Windows Media Player and a component used by other parts of Windows to display content, doesn't properly deal with Advanced Systems Format (.asf) files, Microsoft's proprietary streaming media file format.
The IE6/IE7 update, MS07-069, fixes four flaws, all critical for Windows 2000, XP and Vista but pegged as moderate for Windows Server 2003. Three of the quartet are memory corruption bugs in the browsers, while the fourth is in IE's rendering of pages that include Dynamic HTML code. According to Microsoft, exploits leveraging the DHTML bug have been spotted, making the vulnerability a "zero-day."