Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Microsoft and Adobe Address Critical Security Vulnerabilities in Latest Patch Updates

Microsoft and Adobe Systems each released patches today to address critical security vulnerabilities in their products.

For Patch Tuesday, Microsoft issued four security bulletins to plug a total of four vulnerabilities. Just one of those bulletins is rated ‘critical’ – a bug in Microsoft Windows that can be exploited by an attacker to remotely execute code.

Microsoft and Adobe Systems each released patches today to address critical security vulnerabilities in their products.

For Patch Tuesday, Microsoft issued four security bulletins to plug a total of four vulnerabilities. Just one of those bulletins is rated ‘critical’ – a bug in Microsoft Windows that can be exploited by an attacker to remotely execute code.

According to Microsoft, the vulnerability is caused when the Windows TCP/IP stack processes a continuous flow of specially-crafted User Datagram Protocol (UDP) packets. This result is an integer overflow.

“The Reference Counter Overflow Vulnerability from this month’s update is probably the most concerning of the bunch,” said Joshua Talbot, security intelligence manager for Symantec Security Response. “We estimate an attack attempting to leverage it would take a considerable amount of time; perhaps 4 to 5 hours to complete a single attack. However, if an attacker can pull it off the result would be a complete system crash or compromise if the attacker develops a reliable means of exploitation.”

So far, Microsoft has not seen any evidence the vulnerability has been targeted in the wild, and while this bulletin had the most severe ranking, two of the other bulletins were considered more likely to be exploited. Those two – MS11-085 and MS11-086 – were both rated ‘Important’, but had Microsoft’s highest exploitability rating possible. MS11-085 covers a remote code execution bug that is due to the way Windows Mail and Windows Meeting Space handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system, the company said in an advisory.

MS11-086 addresses a vulnerability impacting Active Directory (AD), Active Directory Application Mode (ADAM) and Active Directory Lightweight Directory Service (AD LDS). It can be exploited by an attacker for privilege escalation if AD is configured to use LDAP over SSL and the attacker has a revoke SSL certificate associated with a valid domain account and then uses that revoked certificate to authenticate to the Active Directory domain.

The final bulletin, MS11-084, is ranked ‘moderate’ and can be exploited to launch a denial of service attack.

“MS11-084 is definitely the most interesting bulletin this month,” opined Andrew Storms, director of security operations for nCircle. “This kernel bug and deals with how font files are parsed and only received only a moderate risk rating.”

Advertisement. Scroll to continue reading.

“The interesting thing about this bulletin is that it appears to have a lot in common with the Duqu advisory Microsoft released last week,” he added, referring to the security advisory Microsoft put out about a Windows Nov.3. “I wonder if we are seeing the beginning of a new malware trend focused on exploiting kernel and font parsing bugs.”

Meanwhile, the patching continues for systems running Adobe Shockwave Player. The company issued security update today to address critical vulnerabilities in Shockwave Player 11.6.1.629 and earlier for Windows and Macs. According to Adobe, these bugs could allow an attacker to run malicious code on a vulnerable system. Among the bugs fixed by the update are two memory corruption vulnerabilities in the DIRapi library and multiple memory corruption issues in the TextXtra module that could lead to code execution.

Adobe said that it is unaware of any attempts to exploit the vulnerabilities, and recommends users of Adobe Shockwave Player 11.6.1.629 and earlier versions update to Adobe Shockwave Player 11.6.3.633 using the instructions provided in the security bulletin.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.