Home > windows 7 > Windows 7 critical holes fixed in Microsoft’s biggest Patch Tuesday

Windows 7 critical holes fixed in Microsoft’s biggest Patch Tuesday


Microsoft released a record number of 13 bulletins for 34 vulnerabilities on Patch Tuesday and the first critical update for Windows 7, as well as fixes for zero-day flaws involving Server Message Block (SMB) and Internet Information Services (IIS).

The most severe of the three SMB flaws, which were first reported on last month, could allow an attacker to take control of a computer remotely by sending a specially crafted SMB packet to a computer running the Server service. Exploit code for one of the SMB holes has been posted to the Web, Microsoft said.

Windows 7 is affected by two critical patches that fix vulnerabilities that could allow remote code execution if a malicious Web page were viewed, one part of a cumulative security update for Internet Explorer and the other in .NET Framework and Silverlight.

Windows 7 was finalized in July and is due to go on sale Oct. 22.

Other critical patches fix in the security bulletin for October a vulnerability in Windows Media Runtime that could be exploited if a user opened a malicious media file or received malicious streaming content from a Web site or application, and if a specially crafted ASF (Advanced Systems Format) file is played using Windows Media Player 6.4.

Among the critical updates was a cumulative security update of ActiveX Kill Bits that is being exploited that affects ActiveX controls compiled using Active Template Library (ATL) and another patch resolving several vulnerabilities in ATL ActiveX Controls that could allow remote code execution if a user loaded a malicious component or control. ActiveX and ATLs were the subject of an emergency patch Microsoft released in July.

The final critical bulletin fixes a hole in Windows GDI+ (Graphics Device Interface) that could allow an attacker to take control of a computer if user viewed a malicious image file using affected software or browed a malicious Web page.

“Microsoft has repeatedly had to fix problems related to the Graphics Device Interface in Windows and vulnerabilities in the component have been exploited broadly in the past. We can expect that security researchers will be looking to reverse engineer today’s patches, which may very well lead to exploits being created,” said Dave Marcus, director of security research and communications at McAfee Labs.

Nine of the vulnerabilities were previously disclosed, which meant that attackers had time to come up with so-called “zero-day” exploits before the patches were available, Marcus noted.

The most alarming vulnerability in the mix is the SMB flaw, which according to the person who discovered it was introduced by the patch for a different vulnerability, according to Josh Phillips, virus researcher at Kaspersky Lab.

Andrew Storms, director of security operations at nCircle, said the but that is likely to have teh biggest impact will be the critical one affecting Windows Media Runtime and which involves a speech codec bug that has limited exploits in the wild. “This is a typical file parsing issue and similar to vulnerabilities have allowed attackers to create drive-by attacks that infect unsuspecting video viewers,” he said.

Meanwhile, the critical SMB vulnerability is relatively difficult to exploit given default firewall conditions, but the IIS bugs are easy to exploit, Storms added.

Also released were five bulletins rated “important” to fix vulnerabilities in IIS, for which exploit code has been publicly released and there have been limited attacks, Windows CryptoAPI, Windows Indexing Service, Windows Kernel and Local Security Authority Subsystem Service.

The update for Windows CryptoAPI relates to flaws in the way domain names are verified on the Internet that could allow attackers to impersonate a site and steal information from unsuspecting Web surfers. The holes were revealed by researchers Dan Kaminsky and Moxie Marlinspike at Defcon in August.

Affected software is Windows 7, Windows 2000, XP, Vista, Server 2003 and 2008, Office XP, Office 2003 and 2007Microsoft Office System, SQL Server 2000 and 2005, Silverlight, Visual Studio .NET 2003, Visual Studio 2005 and 2008, Visual FoxPro 8.0 and 9.0, Microsoft Report Viewer 2005 and 2008, Forefront Client Security 1.0, and Office software including Visio, Project, Word Viewer and Works.

The installation also removes the Win/FakeScanti Trojan that claim to scan a system for malware and claim to find it in order to get money from computer users.

Categories: windows 7 Tags: , ,
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: