Microsoft and Adobe released security updates this Patch
Tuesday which patched several critical vulnerabilities including zero-days that
were actively being exploited in the wild.
Microsoft issued 14 bulletins covering, including six
vulnerabilities that were rated as “Critical” and eight that were rated as
“Important.” The patch included a zero day that was actively being exploited in
the wild. The zero-day is located in Window's Kernel-mode driver which was used
in conjunction with a recently patched Adobe flaw to launch a low volume spear
phishing campaign which sought to take control of an infected system, Microsoft
reported.
Three of the bulletins contained public disclosures and the
vulnerabilities that affect Microsoft Windows, Microsoft Office Setup, Microsoft
Office Services and Web Apps, Microsoft SQL Server, Internet Explorer, and even
Adobe Flash Player.
Microsoft users are encouraged to download the latest
versions of their software and ensure all of their applications are up to date.
The Adobe Security update patched nine critical
vulnerabilities in its Flash Player which affect the Windows, Macintosh, Linux
and Chrome OS platforms, and one vulnerability in the and a low level
vulnerability in the Adobe Connect which affects the Windows platform.
The updates resolve type confusion vulnerabilities and
resolve use-after-free vulnerabilities that could each lead to code execution.
Users are encouraged to upgrade to Flash Player 23.0.0.207 for Windows and Mac
and to Flash Player 11.2.202.644 for Linux, Adobe reported.
The Microsoft vulnerability which was exploited in the wild
was spotted by Google which typically gives vendors 60 days to patch any
vulnerability that is discovered privately however; because the flaw was
actively being exploited the timeline was reduced to seven days.
"While Adobe
issued a patch almost immediately, Microsoft was not able to before Google
disclosed the vulnerability publicly,” Trust wave Researcher Karl Sigler said
in a Nov. 8 blog post. “The fact that these vulnerabilities were being actively
exploited in the wild changed Google's typical disclosure policy.”
Deploying fixes for browsers, graphics components and Office
will be a top priority for most administrators, Tripwire Security Researcher
Craig Young told SC Media.
“All of these components are affected by one or more code
execution vulnerabilities Microsoft has classified as highly exploitable,”
Young said. “These are of the highest priority due to the fact that the
vulnerabilities can potentially be triggered through normal web browsing
activities giving an external attacker a way into networks.”
No comments:
Post a Comment