on Tuesday issued six
bulletins to patch 11 vulnerabilities. Seven of the patches are rated critical.
"The most prominent vulnerabilities are in Internet Explorer, with 4 of the 5 patches marked as critical," John Harrison, group product manager for Symantec Security Response told us after the announcement. "Because the vulnerabilities could allow remote code execution, we recommend users patch as soon as possible."
Indeed, MS12-023 affects all versions of IE. Attacks can exploit the vulnerabilities by setting up a malicious Web page, according to Wolfgang Kandek, CTO of Qualys. We asked him to expound on the patch and how critical it really is.
"MS12-023 has an Exploitability Index of 1, meaning that Microsoft believes that an attack can be crafted within the next 30 days," Kandek said. "By the way, this update does not include the fix for the vulnerability found during last month's PWN2OWN contest at CanSecWest 2012, which will probably be fixed by another IE update next month."
Not all security researchers agree on which patches to deploy first. Andrew Storms, director of security operations at nCircle, said it must be a blue moon month because Microsoft is shipping an IE security bulletin but, for the first time in a long time, it won't be on the top of the deployment priority list. He sees another, more critical, issue.
"The 'deploy now' bulletin this month is MS12-027, a bulletin affecting the Windows Common Controls. This component is included in so many Microsoft programs it affects almost every Microsoft user on the planet," Storms said. "It gets worse: Microsoft has already seen exploits for this vulnerability in the wild in limited attacks."
Tyler Reguly, technical manager of security research and development at nCircle, said the work involved in patching every platform affected by MS12-027 may overwhelm smaller shops.
"This bulletin is a great example of why developers should use shared libraries wherever possible," Reguly said. "This should be a simple Windows patch but instead we're seeing every affected application patch the problem independently."
Other Vulnerability News
We also caught up with Paul Henry, a security and forensic analyst at Lumension, to get the broader view of patching during the week. Beyond Apple's Java nightmare last week, he pointed to issues with Adobe, Google and Mozilla worth noting.
"Another recent patch worth mentioning this Patch Tuesday comes from Adobe that fixes two critical vulnerabilities in Flash Player across Solaris, Linux, Mac OS X and Windows platforms," Henry said.
"Google released multiple patches for Chrome this Patch Tuesday period. The latest patch on April 9th addressed 12 security issues and followed the previous patch released just eight days earlier. Mozilla added vulnerable Java Plug-ins to its black list in efforts to protect users in its latest patch."