Microsoft Patch Tuesday Plugs XML Flaw

Microsoft has issued its security updates for July that patches 16 security vulnerabilities, including a bug affecting Microsoft XML Core Services that is being exploited in the wild.

The patches are spread out across nine bulletins, three of which are rated “critical.” Among those critical vulnerabilities is a remote-code-execution issue impacting XML Core Services 3.0, 4.0 and 6.0 on all supported versions of Windows that could be exploited via drive-by attacks.

Exploit Toolkits

“The most important patch this month is undoubtedly the XML core services bug,” said Andrew Storms, director of security operations at nCircle. “Microsoft issued an advisory for this bug in early June and we’ve already seen the exploit in a number of exploit toolkits and attacks have been reported in the wild.”

“If you are paying close attention, you’ll notice that the XML version 5 patch for the bug isn’t shipping today,” he added. “The fix for this version is probably not ready yet, so Microsoft decided to deliver the other patches. So far, all the attacks in the wild utilise XML version 3, so this release, even though not totally complete, seems like a no-brainer.”

The update also included a critical patch for Internet Explorer 9, the latest version of Microsoft’s popular browser. The IE9 bulletin, MS12-044, swats two security bugs that can be exploited to remotely execute code. Neither issue is known to be getting targeted in the wild, Microsoft said.

“The vulnerabilities could allow remote-code execution if a user views a specially crafted Web page using Internet Explorer,” according to Microsoft’s advisory. “An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.”

“Apply this patch as quickly as possible if you run IE9. The exploitability index is 1, meaning that Microsoft believes that it is easy for attackers to reverse-engineer the patch and develop an exploit,” blogged Wolfgang Kandek, chief technology officer of Qualys. “What makes MS12-044 more interesting is that it’s the product of an accelerated update cycle that Microsoft has been working on. In the past, Internet Explorer was updated only every two months – that was how long it took to get through all the compatibility testing required for a stable release. Now, Microsoft has streamlined this process to reduce the time needed by 50 percent.”

The final critical bulletin, MS12-045, addresses a vulnerability in Microsoft Windows that, like the other critical bugs, can be exploited to remotely execute code. According to Microsoft, the vulnerability exists in the way that Microsoft Data Access Components accesses an object in memory that has been improperly initialised.

Bug Fixes

The remaining bulletins for this month impact Microsoft Office, Windows, Microsoft Server Software and Microsoft Developer Tools. Microsoft classified each of those six bulletins as “important.”

In addition to the patches, Microsoft released Security Advisory 2719662, which allows system administrators to disable the Windows Sidebar and Gadgets on supported versions of Windows Vista and Windows 7 with one Fix-it click.

“As many of you are aware, Windows 8 will deprecate the Sidebar and Gadgets, and Gadget developers are already shifting their efforts to the online Windows Store,” blogged Yunsun Wee of Microsoft’s Trustworthy Computing group. “Meanwhile, we’ve discovered that some Vista and Win7 gadgets don’t adhere to secure-coding practices and should be regarded as causing risk to the systems on which they’re run.”

The company also issued Security Advisory 2728973, which places certain digital certificates in the Untrusted Certificate Store.

“Though we have no indication that those had been compromised or misused in any fashion, as a precautionary measure we’ve revoked them,” Wee blogged. “A subset of those was in addition found to have code signing permissions, which has earned them a place in the Untrusted Certificate Store.”

Are you a security expert? Try our quiz!

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

6 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

8 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

10 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

11 hours ago