Categories: PCSecurityWorkspace

Microsoft Patches Two Critical Security Flaws

Microsoft’s Patch Tuesday has patched two critical security flaws, which could leave users vulnerable if targeted by social engineering.

Visual Basic And Outlook Fixes

The release comes a month after the biggest Patch Tuesday of the year, which took aim at 25 bugs. Today’s update addresses two bugs; one a vulnerability in Microsoft Visual Basic for Applications, and the other a vulnerability impacting Outlook Express, Windows Mail and Windows Live Mail.

Both vulnerabilities are rated critical and can leave users open to remote code execution by attackers.

“I’ve put the Visual Basic for Applications (VBA) vulnerability first on my list,” said Joshua Talbot, security intelligence manager at Symantec Security Response. “Both vulnerabilities require social engineering to exploit, but the VBA vulnerability requires less action from a user. For instance, an attacker would simply have to convince a user to open a maliciously crafted file – likely an Office document – which supports VBA and the user’s machine would be compromised. I can see this being used in targeted attacks, which are on the rise.”

Microsoft VBA is used to develop client desktop packaged applications and integrate them with existing data and systems. According to Microsoft, the vulnerability is due to the way VBA searches for ActiveX controls in a VBA-supported document. As a result, it is possible for a host application to pass a specially crafted document with embedded ActiveX controls to the VBA runtime and create a condition where arbitrary could run.

The other vulnerability is caused when a common library used by Outlook Express and Windows Mail insufficiently validates network data before using that data to calculate the necessary size of a buffer.

“An attempt to exploit the vulnerability would not require authentication, allowing an attacker to exploit the vulnerability by sending a specially crafted response to a client initiating a connection to a server under his control using the common mail protocols POP3 and IMAP,” Microsoft warned.

No Scripting Fix

Missing from today’s patch lineup is a fix for a cross-site scripting flaw affecting Office SharePoint 2007 and Windows SharePoint Services 3.0 first reported April 28. The SharePoint vulnerability permits escalation of privileges within the SharePoint site. If successfully exploited, the bug allows an attacker to run commands against the SharePoint server with the privileges of the compromised user.

Microsoft recommends users concerned about the issue implement the workaround contained in the advisory issued 29 April.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Is the Digital Transformation of Businesses Complete?

Digital transformation is an ongoing journey, requiring continuous adaptation, strong leadership, and skilled talent to…

16 hours ago

Craig Wright Faces Contempt Claim Over Bitcoin Lawsuit

Australian computer scientist faces contempt-of-court claim after suing Jack Dorsey's Block and Bitcoin Core developers…

17 hours ago

OpenAI Adds ChatGPT Search Features

OpenAI's ChatGPT gets search features, putting it in direct competition with Microsoft and Google, amidst…

17 hours ago

Google Maps Steers Into Local Information With AI Chat

New Google Maps allows users to ask for detailed information on local spots, adds AI-summarised…

18 hours ago

Huawei Sees Sales Surge, But Profits Fall

US-sanctioned Huawei sees sales surge in first three quarters of 2024 on domestic smartphone popularity,…

18 hours ago

Apple Posts China Sales Decline, Ramping Pressure On AI Strategy

Apple posts slight decline in China sales for fourth quarter, as Tim Cook negotiates to…

19 hours ago