It was a busy day for IT administrators and information security professionals. Not only was yesterday Microsoft's Patch Tuesday for the month of April, it is also the day of Adobe's quarterly security updates. In total, they addressed 40 vulnerabilities -- many of them rated as critical and exposing systems to potential remote exploits.
Microsoft Patch Tuesday
A Microsoft spokesperson emailed the following "Today, as part of its routine monthly security update cycle, Microsoft is releasing 11 security bulletins to address 25 vulnerabilities: five rated Critical, five rated Important and one rated Moderate. This month's release affects Windows, Microsoft Office, and Microsoft Exchange. Additionally, the Malicious Software Removal Tool (MSRT) was updated to include Win32/Magania."
[ Windows 7 is making huge inroads into business IT. But with it comes new security threats and security methods. InfoWorld's expert contributors show you how to secure the new OS in the "Windows 7 Security Deep Dive" PDF guide. ]
Qualys CTO Wolfgang Kandek noted in his blog post "Microsoft's patch release for April contains 11 bulletins covering 25 vulnerabilities. The bulletins address a wide array of operating systems and software packages, IT administrators with a good inventory of their installed base will have an easier time to evaluating which machines need patches."
"The critical Microsoft WinVerifyTrust signature validation vulnerability can be used to really enhance social engineering efforts," said Joshua Talbot, security intelligence manager, Symantec Security Response in an emailed statement. "Targeted attacks are popular and since social engineering plays such a large role in them, plan on seeing exploits developed for this vulnerability."
Talbot continued "It allows an attacker to fool Windows into thinking that a malicious program was created by a legitimate vendor. If a user begins to download an application and they see the Windows' notification telling them who created it, they might think twice before proceeding if it's from an unfamiliar source. This vulnerability allows an attacker to force Windows to report to the user that the application was created by any vendor the attacker chooses to impersonate."
Andrew Storms, director of security operations for nCircle offered this analysis "More movies and more malware: that's what we've got to look forward to on the Internet. Microsoft is patching critical bugs in Windows Media Player and Direct Show this month -- both of these bugs lend themselves to online video malware. If you put these fixes together with Apple's recent patch of Quicktime, it's pretty obvious that attackers are finding a lot of victims through video."
nCircle's Tyler Reguly points out that there is also a greater message to be learned from the patches. "As an avid Windows XP user, I'm leaning more and more towards making the jump to Windows 7; with the added security it just makes sense. Looking at the top two vulnerabilities (MS10-027 and MS10-026), my Windows XP systems are vulnerable to both, yet my Windows 7 laptop isn't affected by either of them. The newer operating system just makes sense."
Adobe quarterly update
As if 11 security bulletins fixing 25 different vulnerabilities wasn't enough, IT administrators must also address the critical updates released today from Adobe. nCircle's Storms points out that "Every one of the 15 bugs can be used for remote code execution. Given the increase in the number of attacks that use Adobe PDF files, all users are strongly urged to upgrade immediately."
Storms added "In stark contrast to Microsoft's patch process, Adobe's security bulletin information lacks details, especially critical information about potential workarounds. For enterprises that have a long test cycle, it can take weeks or even months to roll out updates. With no workaround information, Adobe leaves their enterprise customers vulnerable and security teams everywhere frustrated and annoyed."
Andrew Brandt, lead threat research analyst with Webroot, warns "What's more, they should be aware that Foxit Reader -- which also reads PDFs -- is actually more vulnerable."
It is also worth noting that Adobe has rolled out its new update system which it has been beta testing over the past couple of months. Users can now configure Adobe software to automatically install updates, enabling security patches to be applied without requiring any user intervention.
Don't forget Oracle
Wait, there's more! Not wanting to be left out of the patch day festivities, Oracle has also unleashed its own deluge of updates -- more than Microsoft and Adobe combined.
There is a little bit of good news, though. Very few organizations will actually be impacted by every single one of the disclosed vulnerabilities. Qualys' Kandek points out "This is a big release for Microsoft, addressing a wide selection of software. IT administrators probably will not have all of the included software packages and configurations installed in their environment and therefore will need to install only a subset of the 11 bulletins."
The same logic holds true for Oracle and, to a lesser extent Adobe -- although Adobe Reader is fairly ubiquitous. Have fun!
This story, "Microsoft, Adobe, Oracle patch nearly 100 vulnerabilities" was originally published by PCWorld.