Happy Valentines Day everyone. Our vendors are bringing us the gifts of security vulnerability patches. Lots of them. Yes, it’s extra work for our IT teams, but removing these vulnerabilities could mean that we all get to keep our jobs, and remain in business. I was hearing on the news today that Nortel is now coming clean regarding the fact that hackers 0wn3d their network for roughly 10 years, with full and complete access to everything.
Wonder how they got that?
Where is Nortel today? Something to think about…
Microsoft released the expected batch of 9 patches:
- MS12-008: Critical Remote Code Execution Vulnerabilities in Windows Kernel-Mode Drivers
- MS12-009: Important Elevation of Privilege Vulnerabilities in Ancillary Function Driver
- MS12-010: Critical Cumulative Security Update for Internet Explorer
- MS12-011: Important Elevation of Privilege Vulnerabilities in Microsoft SharePoint
- MS12-012: Important Remote Code Execution Vulnerability in Color Control Panel
- MS12-013: Critical Remote Code Execution Vulnerability in C Run-Time Library
- MS12-014: Important Remote Code Execution Vulnerability in Indeo Codec
- MS12-015: Important Remote Code Execution Vulnerabilities in Microsoft Visio Viewer 2010
- MS12-016: Critical Remote Code Execution Vulnerabilities in .NET Framework and Silverlight (This one I would recommend holding off on, as Microsoft is expected to re-release after identifying a “metadata (logic) error”.)
Microsoft has also released Update Rollup 1 for Exchange Server 2010 SP2 http://www.microsoft.com/download/en/details.aspx?id=28809 to the Download Center.
Adobe released 2 Security Bulletins:
- APSB12-02: Critical Security update available for Adobe Shockwave Player. This update addresses critical vulnerabilities in Adobe Shockwave Player 184.108.40.2063 and earlier versions on the Windows and Macintosh operating systems. These vulnerabilities could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system.
- APSB12-04: Important Security update available for RoboHelp for Word. This update addresses an important vulnerability in RoboHelp 9 (or 8) for Word on Windows. A specially crafted URL could be used to create a cross-site scripting attack on Web-based output generated using RoboHelp for Word.
UPDATE: Oracle released also patches fixing 14 vulnerabilities in:
- JDK and JRE 7 Update 2 and earlier
- JDK and JRE 6 Update 30 and earlier
- JDK and JRE 5.0 Update 33 and earlier
- SDK and JRE 1.4.2_35 and earlier
- JavaFX 2.0.2 and earlier
Start planning, testing, and patching, folks.