News Stay informed about the latest enterprise technology news and product updates.

Microsoft to address 12 vulnerabilities, IE display zero-day

A bulletin on Patch Tuesday is expected to address an Internet Explorer display error that could be targeted by attackers using a publicly available proof-of-concept exploit.

SearchSecurity.com:
To get security news and tips delivered to your inbox, click here to sign up for our free newsletter.

Microsoft is expected to release six security bulletins next week, three critical, repairing a dozen vulnerabilities throughout its product line including a critical Internet Explorer zero-day flaw.

In its advance notification, the software giant said the patches affect Windows, Internet Explorer and Microsoft Office. All supported versions of Windows and IE are affected by the updates as well as Microsoft Office Project, Word and Works 8.5, said Jerry Bryant Microsoft security program manager for the Security Response Center. All of the updates for Windows will require a restart so please plan accordingly.

Microsoft security updates:
Nov. - Microsoft patches serious Windows kernel flaws: Vulnerabilities in several Windows kernel drivers could be remotely exploited to gain complete access to a system.

Oct. - Microsoft addresses critical SMBv2 flaw, fixes record number of flaws: Microsoft addressed three critical vulnerabilities in Windows Server Message Block. Thirteen bulletins addressed a record 34 flaws. 

Bryant said taking high priority in Microsoft's Patch Tuesday release is an update addressing a display zero-day flaw affecting IE 6 and 7 that could lead to remote code execution. An advisory was issued late last month warning of publicly available proof-of-concept exploit code targeting the IE error. But Microsoft said it was not aware of any active attacks seeking to use the vulnerability.

The IE zero-day vulnerability affects the way the browser handles cascading style sheet (CSS) information used to lay out webpages. If successfully exploited by an attacker, the vulnerability could enable them to conduct drive-by attacks to spread malware.

In November, Microsoft issued six bulletins, addressing several serious vulnerabilities affecting Windows kernel drivers that could be remotely exploited to gain complete control of a system. Proof-of-concept code was readily available for one of the kernel vulnerabilities, an error in the way Windows handled OpenType (EOT) font.

Dig Deeper on Microsoft Windows security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close