If Patch Tuesday is a party, this would be the IT security version of pre-gaming.
On Aug. 9, Microsoft accidentally released information on the five security updates it is planning to release tomorrow as part of this month’s Patch Tuesday. The information, which has since been taken down, represents a rare procedural slip-up in the company’s Patch process. Normally, Microsoft publishes an advanced notification the Thursday before Patch Tuesday – the second Tuesday of every month – and then posts no further information until the Patch Tuesday updates are released.
This time though, information about the following security updates was posted live on the Web the day after the advanced notification:
• MS011-070 Vulnerability in WINS could allow elevation of privilege
• MS011-071 Vulnerability in Windows could allow remote code execution (DLL Linking Vuln.)
• MS011-072 Arbitrary code execution vulnerability in Excel
• MS011-073 Code execution vulnerability in Microsoft Office
• MS011-074 Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege
Typically, attackers try to reverse engineer the patches after the release, leading some people to dub the day after Patch Tuesday as “Exploit Wednesday.” However, since the patches themselves were not released, the impact of Microsoft’s gaffe may be minimal.
In a statement, David Forstrom, director of Trustworthy Computing at Microsoft, said the draft text of the month’s bulletin summary was posted inadvertently, and was removed “as soon as the issue was discovered.” “We are not aware of any customer impact and we are monitoring the issue,” he said.
The updates are slated to fix 15 separate vulnerabilities, and all are rated “Important”. The patches are scheduled to be released at 10 a.m. PDT Sept. 13.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
