Microsoft and Adobe Systems pushed out security updates today to address vulnerabilities in their products.
In the case of Adobe, the update comes in the form of a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. According to Adobe, the update resolves a vulnerability that could result in a Denial of Service condition. The company said it is not aware of any active attacks targeting the issue.
On the Microsoft front, the company as expected released two security bulletins to address issues in Visual Studio Team Foundation Server and Microsoft System Center Configuration Manager. If successfully exploited, the Visual studio vulnerability could enable an attacker to escalate privileges if they convince a victim to click on a malicious link or otherwise visit a malicious site.
The same is true of the other vulnerability, which can also allow attackers to elevate privileges.
“Both of these bulletins are pretty low risk to most organizations; however, employees should never be allowed to browse the Internet or check email from servers that this software could reside on,” said Marcus Carey, security researcher at Rapid7. “To be able to exploit these vulnerabilities, an attacker would craft a malicious link for a victim to click on, allowing them to compromise the victim’s system. It’s always a good idea to educate employees/ end-users on how to spot and avoid suspect links.”
In order to prioritize their patching for this month, administrators should asses their servers and prioritize accordingly to their software setup, blogged Jason Miller, manager of research and development at VMware.
“With the break administrators are getting this month, it presents the perfect opportunity to use the free time to test the Microsoft Security Advisory update KB2661254,” he added. “This non-security update was released last month to the Microsoft Download Center. During the October 2012 Patch Tuesday, Microsoft will be moving this patch to mainstream availability in Windows Update and WSUS. This patch has the possibility of crippling business applications that utilize digital certificates less than 1024 bits in length.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
