For this month's "Patch Tuesday" round of bug fixes, Microsoft has focused on correcting multiple vulnerabilities in Internet Explorer (IE), including one that is already being used in targeted attacks.
Overall, Microsoft issued five bulletins, covering 23 vulnerabilities. Two of the bulletins, covering IE and Windows, are marked critical, which means administrators should test and apply them as soon as possible. The remaining bulletins, marked important, cover Windows and the Silverlight multimedia plug-in.
[ InfoWorld's expert contributors show you how to secure your Web browsers in a free PDF guide. Download it today! | Learn how to protect your systems with Roger Grimes' Security Adviser blog and Security Central newsletter, both from InfoWorld. ]
The public vulnerability first surfaced during last month's Patch Tuesday, noted Wolfgang Kandek, CTO of IT security firm Qualys.
The public exploit that used this vulnerability worked in conjunction with a flaw in Adobe Flash. "Most of the time a single vulnerability will not get you that far," Kandek said, of today's approaches to compromising systems by chaining together multiple vulnerabilities. A browser vulnerability can get you into a computer, but you'd need another object to give you a specific memory location -- in this case Flash.
The patches in MS-1402 cover all versions of IE, though the zero-day vulnerability affected versions 9 and 10, and the known attacks using this vulnerability appeared only for IE 10.
Another interesting aspect of this zero-day exploitation is that it first appeared on the website for the Veterans of Foreign Wars (VFW), leading some to suspect it was part of an attack from another nation, rather than just from profit-minded cybercriminals who tend to target sites with more traffic.
"In the past, this was called a waterhole attack. You infect a website that you think your targets will go to," Kandek said. Since most of the users of the Veterans Affairs site are military or ex-military personnel, security experts suspect this group was targeted deliberately.
Microsoft is also urging administrators to take a close look at the other critical bulletin, MS-1403. Applying these patches can have "a long-term impact in improving your systems' security," advised Dustin Childs, Microsoft Trustworthy Computing group manager, in a statement.
Microsoft stated that while this vulnerability is just as severe as the ones for IE, it would take a malicious user more time to understand it and write code that would exploit its weakness. "Nevertheless, you should fix it, though the urgency would be lower than the browser fix," Kandek advised.