Microsoft Patch Tuesday brings critical Explorer, Outlook fixes

Eight of the 13 bulletins issued this month provide fixes for dangerous remote code execution vulnerabilities

By , IDG News Service |  Security

Microsoft has shipped fixes for critical vulnerabilities in Internet Explorer and Outlook as part of September's round of vulnerability fixes.

Overall this month, Microsoft issued 13 bulletins -- 4 for them critical -- that cover 47 vulnerabilities found across Internet Explorer, Outlook, SharePoint, Office and the Windows kernel. It is an exceptionally large number of patches for any one month, said Wolfgang Kandek, chief technology officer of IT security firm Qualys.

Of this round of patches, enterprise security professionals should take a look first at MS13-068, which details a vulnerability allowing for remote code execution in Microsoft Outlook, Kandek said.

This remote code execution vulnerability is particularly dangerous because it does not require user interaction to launch.

The flaw lies in how Outlook handles incoming user certificates, which identify the sender of an email. Outlook's certificate parser can recognize only 256 certificates in any one email.

"The programmer [probably] said 'Well, no one would nest more than 256 certificates,' and no one in their right mind would," Kandek said. "But an attacker would. They always go after this sort of thing."

A hacker could nest more than 256 certificates in an email, which would cause a buffer overflow that could place malicious data in the computer's memory. Microsoft failed to add a mechanism that would check to ensure no more than 256 certificates have been submitted to the parser by any single email.

An exploit for this vulnerability would not require the user to click on anything. Code could automatically be triggered simply by displaying the contents of the email message in a preview window.

MS13-069 for Internet Explorer, a collection of 10 patches, should be dealt with as soon as possible as well, Kandek advised. With these vulnerabilities, an attacker could plant malicious code on a Web page that, when visited by an unpatched browser, could take control of the user's machine, said Amol Sarwate, director of Qualys' Vulnerability Labs .

While Microsoft rated bulletins for Microsoft Office Word, MS13-072, and Excel, MS13-073, as important -- rather than critical -- they still could be harmful to the enterprise if not applied, Kandek said.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question