December 13, 2011, 4:25 PM — Microsoft today issued 13 security updates, one less than expected, that patched 19 vulnerabilities in Windows, Internet Explorer (IE), Office, and Windows Media Player.
The company punted on one bulletin it had planned to deliver today after SAP told it that the patch broke some of its software.
"The bulletin scheduled to address Security Advisory 2588513 was postponed due to a third-party application compatibility issue that will be addressed by the vendor, with whom we're working directly," Jerry Bryant, group manager in Microsoft's Trustworthy Computing team, said in a statement.
The scrubbed security update was to fix the SSL (secure socket layer) 3.0 and TLS (transport layer security) 1.0 bug demonstrated in September 2011 by researchers who crafted a hacking tool dubbed BEAST, for "Browser Exploit Against SSL/TLS."
SAP, the German developer that creates enterprise business operations and management software, was the third-party vendor who reported compatibility problems. Microsoft added that it would rather pull a bulletin than "ship something that might inconvenience customers."
Microsoft did patch the vulnerability exploited by the Duqu intelligence-gathering Trojan, however; that flaw had been the subject of an advisory the company issued in early November after news broke of what some called a possible precursor to the next Stuxnet , the ultra-sophisticated worm that sabotaged Iran's nuclear program in 2010.
That update -- Microsoft calls them "bulletins" -- was one of three rated "critical," the company's top threat ranking. The remaining 10 were labeled "important," the next-lowest rating.
Microsoft called out the Duqu update, MS11-087, and another, MS11-092, as the ones customers should apply first. The latter affects Windows Media Player, Microsoft's audio-video-rich content utility.
Several security experts agreed with Microsoft's assessment of MS11-087 .
"Duqu had to be at the top of the list, even though it was a very targeted attack," said Andrew Storms, director of security operations at nCircle Security.
"Now that they've patched the vulnerability, we'll have lots of people reverse engineering the patch to weaponize a drive-by exploit," said Wolfgang Kandek, chief technology officer at Qualys.