Microsoft to release seven bulletins next week, but no fix for Internet Explorer

News by Dan Raywood

Microsoft is to release seven bulletins next week, but will not patch the zero-day vulnerability in Internet Explorer.

Microsoft is to release seven bulletins next week, but will not patch the zero-day vulnerability in Internet Explorer.

Of the seven bulletins, two are rated as critical and the remaining five as important. Software including RT, Office, SharePoint and System Center Operations Manager will also be patched.

Wolfgang Kandek, CTO of Qualys, said: “For IT administrators, the focus should be on the two critical bulletins. While the first one affects only Windows 7 and Windows 2008 R2, the second one lists all versions of Windows, plus a number of server software. It is likely that it is a vulnerability in one of the base libraries of Windows that is widely used, such as Windows XML Core Services, which had its last fix in July of 2012 under MS12-043.”

Ziv Mador, director of security research at Trustwave SpiderLabs, said: “Of the two critical bulletins one of them lists all currently supported versions of Windows from XP SP3 up to Server 2008 R2, as well as several versions of Office, SharePoint and Groove Server. This is most likely an issue in one of the base libraries meaning it will have a wide impact.

“The other critical bulletin only lists Windows 7 and Server 2008 as vulnerable but it still results in remote code execution so it shouldn't be taken as any less serious.

“The five remaining ‘important' bulletins result mostly in elevation of privilege, with one security feature bypass and one denial of service. Six of them impact different versions of Windows and Windows Server, with one elevation of privilege hitting Microsoft System Center Operations Manager.”

However the zero-day that caused problems for Microsoft over the Christmas period will not be fixed next week. The vulnerability could allow remote code execution of Internet Explorer 6, 7 and 8 and Microsoft has released a workaround Fix It and encouraged users to use the Microsoft Enhanced Mitigation Experience Toolkit (EMET) to help prevent exploitation of this vulnerability.

Paul Henry, security and forensic analyst at Lumension, said: “While we applaud Microsoft for responding with a Fix It over the weekend for the issues with Explorer, it's interesting to note that nothing in these bulletins seem to directly affect IE. The Fix It Microsoft issued is a workaround so we still need a formal patch for this issue.

“However, Microsoft often fixes one thing to address another, so it's possible that they are correcting the issue with IE at the operating system level with one of the patches. If the browser is just a path to an underlying vulnerability in the operating system, then this issue will likely be fixed by one of the patches. If the vulnerability is exclusive to the browser, on the other hand, then this is still something to watch out for.”

Adobe has also announced that it will release security updates next Tuesday for Reader and Acrobat XI (11.0.0), earlier versions for Windows and Macintosh, and Adobe Reader 9.5.1 and earlier 9.x versions for Linux. Also, Oracle will publish its quarterly Critical Patch Update later this month.

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Video and interviews