Patch Tuesday: Time to use the Flame-retardant Windows Update client

When Patch Tuesday rolls around next week, Microsoft will address three critical security issues using an improved version of Windows Update that closes a loophole exploited by Flame malware.

That update to Windows Update has been distributed by Microsoft since the middle of last month but missed June's Patch Tuesday. The fix is important because it addresses the flaw that allowed Flame's authors to certify that malware they were sending to victim machines was authenticated by Microsoft, making the malware as trusted as an actual Windows security update.

MORE: Price tag for Microsoft piece of Flame malware $1M, researcher says

NEWS: Federal appeal court raps bank over shoddy online security

As for the July security bulletin being released next Tuesday, Microsoft says it is issuing nine security bulletins, three of them critical and designed to shore up vulnerabilities in Windows. One of them also affects Internet Explorer.

Each of the critical bulletins address flaws that if exploited could result in remote code execution on attacked machines. The browser vulnerability affects Internet Explorer 9, the latest version of the software.

Other platforms affected by the three critical updates are certain versions of Windows XP; Windows Server 2003, 2008 and 2008 R2; and Windows 7.

While Microsoft policy is not to reveal ahead of time what vulnerabilities are being addressed in its security bulletins, security experts have some idea what may be included.

"Bulletin 1, rated 'critical,' affects all versions of Windows, and we expect it to address the XML vulnerability disclosed by Microsoft in June's Patch Tuesday as KB2719615," says Wolfgang Kandek, CTO of Qualys Inc., in a blog. "This bulletin will be the highest priority for users, at least for those who did not apply Microsoft's FixIt supplied in the advisory."

KB2719615, a.k.a. CVE-2012-1889, has been used in the wild and is a vulnerability in Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0, Microsoft says. Marcus Carey, a security researcher at Rapid7, concurs that the bulletin may address this problem.

If victims access specially crafted Web pages using Internet Explorer, code on the page could execute malicious code remotely in the browser. Successful exploits could allow attackers to gain the same user rights as the logged-on user, Microsoft says.

Others are not so sure that KB2719615 will be addressed. Paul Henry, security and forensic analyst at Lumension, notes that it remains unclear if Microsoft will be issuing such a patch. "Microsoft normally includes details in their pre-release information if a Day Zero patch is included," Henry says. "However, in the July pre-release, no mention of the issue was included."

A second bulletin, also critical, is surprising, Kandek says, because it addresses an Internet Explorer issue out of phase with the usual bimonthly cycle. It affects Internet Explorer 9, so only machines with Vista or above operating systems might be affected, he says. The third critical bulletin is ranked such for XP, Vista and Windows 7 and is considered moderate for all other operating systems.

A third critical bulletin also represents the potential for exploits that fully compromise systems without user interaction. "These bulletins affect both business and consumer users of all modern versions of Microsoft Operating Systems," Carey says, "so they should be attention-grabbers."

While the remainder of the bulletins are ranked as important, Kandek calls attention to No. 4, which addresses a problem that can allow remote execution of code from any version of Office for Windows. Ratings drop from critical to important when the exploits involved require victims to open files in order for the attacks to be successful. But he says bulletins ranked important can fix problems that are just as dangerous to some users.

"We typically consider important bulletins for Office as almost the same severity level as critical," Kandek says. "After all, these document-based attack campaigns are usually quite successful in convincing at least a subset of end users to open the malicious document."

Tim Greene covers Microsoft for Network World and writes the Mostly Microsoft blog. Reach him at and follow him on Twitter @Tim_Greene.

Read more about software in Network World's Software section.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tim Greene

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place