As expected, Microsoft has released their August patches. 13 patches covering at least 22 vulnerabilities, some with exploit code available and with attacks in the wild.
SANS as usual, has a pretty good summary up. Check out their analysis. http://isc.sans.edu/diary.html?storyid=11341
- MS11-057, which patches seven flaws in Internet Explorer, is the most important patch to apply in my opinion. It affects all supported versions of Internet Explorer, including IE9 and affects desktops primarily, because best practices that we all have implemented preclude surfing from the server farm, right? (Apply it to desktops and servers.)
- MS11-058 should also be applied as soon as possible. It patches two vulnerabilities in Microsoft’s DNS service used to translate URLs into IP addresses. Microsoft warns that attackers could
remotely exploit the vulnerability on Windows Server 2008 & 2008 R2 simply by sending it a malformed query. That could potentially allow an attacker to run arbitrary code.
As always, assess the risk, test like heck, and get those patches deployed ASAP.