123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Microsoft Mitigates 34 Security Flaws In Latest Patch Tuesday

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Microsoft has released 16 security bulletins in the latest Patch Tuesday, which address 34 vulnerabilities. While nine of the bulletins deal with critical vulnerabilities, seven relate to vulnerabilities rated important by the developer. Further, the company has provided an exploitability index, indicating possibility of an exploit for seven of the nine critical bulletins within 30 days. The vulnerabilities may cause remote code execution, denial of service, information disclosure or elevation of privileges. The company has mitigated twelve critical security flaws associated with Internet Explorer (IE). Eleven of those vulnerabilities may cause remote code execution, allowing attackers to gain same privileges on the affected system as that of the user. A user has to visit a specially crafted malicious web page through IE for the attack to be successful. One of the addressed flaws relates to Microsoft’s implementation of Vector Markup Language, and allows remote code execution on visit to a specially crafted malicious web page using IE. This vulnerability does not affect IE 9.

One of the critical vulnerabilities addressed ...
... in the latest security update by Microsoft may cause remote code execution, if attacker uses a client computer to make specific requests on a system, which uses TMG firewall client.

The security update resolves two security flaws in the Distributed File System (DFS), which allow attackers to execute arbitrary code, and gain complete control of a computer system by sending a specially crafted DFS response to a client initiated DFS request. Microsoft has resolved a flaw associated with SMB, which may result in remote code execution if attackers send a specially crafted malicious SMB response to SMB request by a client.


The update mitigates a security flaw in XML editor, which may cause information disclosure if users open a specially crafted web service directory. Attackers may use the disclosed information for launching more sophisticated attack on the target computer. The update resolves a denial of service vulnerability in Windows Server 2008 Hyper-V, and Windows Server 2008 R2 Hyper-V. The developer has also addressed a cross-site scripting vulnerability in Active Directory Certificate Services Web Enrolment. Successful exploitation of the vulnerability may allow attackers to execute arbitrary commands by gaining higher privileges. Microsoft has rated all the above three vulnerabilities as important.

Usually, Microsoft releases security update on second Tuesday of every month. Attackers exploit the time lag between the patch release and their implementation by users. As such, it is crucial to keep track of various security updates issued by developers. Professionals qualified in IT degree programs may allow organizations to identify, prioritize and implement security advisories before their exploitation by attackers. Employees must be aware of password construction, handling sensitive data, document download policy, social engineering threats and dealing with suspicious e-mails. Employees must be restricted from sharing passwords and computer systems. E-learning and online IT degree programs may help employees in understanding and implement safe computing practices.

Data breach incidents in the recent past have highlighted the reactive approach to security. Reactive policy may make organizations vulnerability to security incidents. As such, organizations must evolve proactive approach to deal with security threats. IT professionals must update their technical skills and know-how through participation in security conferences, undertaking online IT courses, and security certifications and enhance their capabilities to deal with various forms of malware, spear phishing, and botnet attacks.

Total Views: 158Word Count: 554See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: