Microsoft Patch Tuesday gives attackers a roadmap to XP vulnerabilities

Microsoft has issued eight bulletins that fix 13 vulnerabilities in Windows, Internet Explorer and Office

For the latest round of Microsoft's monthly collection of software patches, the company has fixed critical issues in Internet Explorer (IE) and Windows that have already been used by malicious attackers to compromised systems.

It is the software that Microsoft has not patched this month that is probably of greatest interest to attackers.

Overall, Microsoft has issued eight bulletins this month, fixing 13 vulnerabilities in Windows, Internet Explorer and Office.

None of these fixes are for Windows XP or Office 2003, both of which Microsoft stopped supporting in April (except for those customers with extended support contracts). Many of the patches in this month's collection do fix code vulnerabilities that probably originated in Windows XP or Office 2003, if not in earlier versions.

Studying what is being fixed with each month's round of patches could give attackers an easy entry point into these older, now unsupported, systems, because these older systems probably have the same vulnerabilities, said Wolfgang Kandek, chief technology officer for IT security firm Qualys. Qualys estimated that eight of the 10 patches this month could apply to XP or Office 2003.

The good news is that the installed base of Windows XP continues to shrink. According to Qualys data, about 8 percent of its customers use XP, down from 10 percent in April.

Three of the bulletins Microsoft lists as critical, and should be fixed as quickly as possible. The rest are marked as important.

Administrators should first take a look at Bulletin MS14-029, Kandek advised.

This patch addresses two vulnerabilities in IE that could be used to remotely execute malicious code. Google researchers have already found malicious programs on the Web that exploit this vulnerability.

"You want to patch this one very quickly. The attack is already out there. It may not be widely publicized yet but typically these attacks spread very quickly," Kandek said.

MS14-029 also includes MS14-021, an out-of-band patch Microsoft issued on May 1 to thwart attackers who have already started using this vulnerability IE to gain control of user machines.

Installing the patches for MS14-029 will install the MS14-021 as well, though you need to first install the cumulative update for IE that Microsoft issued last month, Kandek advised.

Although it was marked as important rather than critical, MS14-027 for Windows should be reviewed closely by administrators, Kandek advised. A fault in the Windows shell interface could allow a user at the computer's terminal gain administrative privileges with the right set of code. Like the two IE vulnerabilities, this one has already been exploited by malware, Kandek said.

Also of concern for Windows users is MS14-025, due to how it could be easily exploited, Kandek said. This flaw stores credentials in Windows group policies preferences, where they can be easily accessed.

SharePoint users should review the third critical vulnerability, MS14-022, which would allow an attacker to update a file with malicious code to a SharePoint site.

In addition to the Microsoft patches, administrators should also look at the patches Adobe issued Tuesday for the Adobe Reader, Flash and Illustrator products, Kandek said. The Flash and Reader vulnerabilities, in particular, should be addressed as soon as possible. Like Microsoft, Adobe no longer issues patches for versions of its software that run on Windows XP.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is

Join the CSO newsletter!

Error: Please check your email address.

Tags Microsoftsecuritypatch management

More about Adobe SystemsGoogleIDGMicrosoftQualys

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Joab Jackson

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place