Microsoft patches critical bugs in Windows, Office

Outlook vulnerability could be big, say researchers, but Google engineer's bug should be patched first

Microsoft today patched five vulnerabilities in Windows and Office, including a bug hackers have been exploiting for almost a month.

As expected, today's patch slate was short: Just four security updates that included fixes for five separate flaws. Of the four updates, three were rated "critical," the highest threat ranking in Microsoft's four-step scoring system. All five of the specific vulnerabilities patched today were also rated critical.

Two of the bulletins affected Windows, while the remaining pair impacted Office. Four of the five vulnerabilities in the bulletin quartet were pegged by Microsoft with an exploitability index score of "1," meaning that the company expects attacks to materialize in the next 30 days.

But there were few surprises. Last week Microsoft revealed that the two Windows updates would address already-acknowledged bugs in Windows XP and Windows 7 .

The most prominent of the pair was MS10-042 , the update that addressed the vulnerability in Windows XP's Help and Support Center, a feature that lets users access and download Microsoft help files from the Web and can be used by support technicians to launch remote support tools on a local PC.

In early June, Tavis Ormandy, a security engineer who works for Google , published attack code for the bug -- which also affected Windows Server 2003 -- and immediately unleashed a heated debate. While some security researchers criticized Ormandy for taking the bug public, others rose to his defense, blasting both Microsoft and the press -- including Computerworld -- for linking Ormandy to his employer.

Ormandy disclosed the vulnerability five days after reporting it to Microsoft after he said the company wouldn't commit to a patching deadline. Microsoft has disputed that, claiming that it only told Ormandy it would need the rest of the week to decide.

Users and IT administrators should apply the MS10-042 patch as soon as possible, agreed several researchers. "This is actively being exploited to target XP desktop systems," said Jason Miller, the data and security team manager for Shavlik Technologies. Miller also noted that Windows XP remains the most-popular version of Windows on both consumer and business PCs, a fact that Microsoft itself stressed yesterday when a company executive said that XP was on 74% of all corporate machines.

"I'm impressed that Microsoft was able to do a turn-around on this as quickly as they did," said Miller. "Some bugs linger for months out there."

Microsoft was first told of the Help and Support Center flaw on June 5, and confirmed that by June 15, attacks were exploiting the bug.

The other Windows update, MS10-043 , patches a single bug in the 64-bit version of Windows 7 and Windows Server 2008 R2. Microsoft confirmed the vulnerability in May with a security advisory, noting then that the flaw was in Windows' Canonical Display Driver, which blends the operating system's primary graphics interface, dubbed Graphics Device Interface (GDI), and DirectX to compose the desktop.

At the time, Microsoft told users to disable the Aero interface, which is the default on all but the least-expensive editions of Windows 7. Aero is an optional install on Windows Server 2008 R2.

According to Oliver Lavery, the director of security and research and development for nCircle, the Windows 7 vulnerability was due to a programming error on Microsoft's part when it ported the relevant code from the 32-bit version of Windows to the 64-bit version of Windows 7.

The other pair of updates fixed flaws in Access, the database included with some versions of Office, and Outlook, Microsoft's business e-mail client.

Of the two, the most interesting to Richie Lai, director of vulnerability research at Qualys. was MS10-045 . "The vulnerability undermines the security model of Outlook, because attackers can make any file type look like any other file type," Lai said. "That's scary, because it makes all attachments dangerous to open, not just those file types people are cautious about."

Hackers could disguise attack code as, say, a .txt, .pdf or .jpg file type, Lai continued, to more easily dupe users into opening and launching the malware. "Those kinds of files most people will click on without thinking twice," said Lai. "And it bypasses all the prompting that normally displays," he added, referring to the warnings that Outlook normally shows when potentially-dangerous file types are clicked.

Others, including Miller from Shavlik and nCircle's Lavery, echoed Lai's take on the Outlook bug. "This one is interesting because it bypasses the security warnings," said Lavery. "Attackers would have to host their malicious code on their own server, so this isn't a direct attack, but it's certainly a flaw in [Outlook's] warning mechanism."

According to Microsoft, all currently-supported versions of Outlook, with the exception of Outlook 2010, contain the vulnerability and must be patched.

The fourth update, MS10-044 , addressed two bugs -- one rated critical the other ranked "important," the next threat step down -- in ActiveX controls used by Access.

"It's a bit shocking, really," said nCircle's Lavery. "ActiveX is practically a dead technology, but people are still finding vulnerabilities in it. I've been doing this for 10 years, and even now, Microsoft hasn't managed to kill off all the bugs. It's just silly."

Because Microsoft now ships alternating large and small batches of fixes, with the larger updates landing in even-numbered months, researchers expect that the patch count will be considerably larger next month. Microsoft will deliver its next slate of fixes Aug. 10.

This month's security update can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through Windows Server Update Services.

Join the PC World newsletter!

Error: Please check your email address.

Tags GooglesecurityMicrosoftWindowssoftwareoperating systemsMalware and Vulnerabilities

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?