Vulnerabilities

Microsoft Patches Critical Flaws in Windows, Internet Explorer

The six security bulletins released by Microsoft for October 2015 address more than 30 vulnerabilities affecting Windows, Internet Explorer, Edge, and Office.

<p><strong><span><span>The six security bulletins released by Microsoft for October 2015 address more than 30 vulnerabilities affecting Windows, Internet Explorer, Edge, and Office.</span></span></strong></p>

The six security bulletins released by Microsoft for October 2015 address more than 30 vulnerabilities affecting Windows, Internet Explorer, Edge, and Office.

One of the bulletins rated critical is MS15-106, which resolves a total of 14 vulnerabilities in Internet Explorer. The list of flaws includes memory corruption, privilege escalation, information disclosure, and VBScript and JScript ASLR bypass issues impacting Internet Explorer and the scripting engine.

The most serious of the security holes patched with this bulletin can be exploited by a remote attacker for arbitrary code execution by tricking the targeted user into viewing a specially crafted webpage via Internet Explorer.

Another bulletin that has been rated “critical” is MS15-108, which patches information disclosure, memory corruption, and ASLR bypass vulnerabilities in the VBScript and JScript scripting engines in Windows.

A bulletin that addresses remote code execution flaws in Windows has also been classified as having critical severity. The bugs are caused due to the way Windows Shell and the Microsoft Tablet Input Band handle objects in memory.

The bulletins rated “important” fix weaknesses in Edge, Office, and the Windows kernel. The flaws can be leveraged for information disclosure and remote code execution.

According to Microsoft, there is no evidence that any of these vulnerabilities have been exploited in the wild.

“It’s official, a record has been set for the most bulletins released by Microsoft in a single year. In 2013, we saw 106 bulletins released, this month we hit 111 for 2015 and we still have two Patch Tuesdays left,” said Tyler Reguly, manager of security research at Tripwire.

Advertisement. Scroll to continue reading.

“This month’s updates are pretty ho-hum, we’ve got a list of entirely typical updates. Given that this month is so light, it’ll be interesting to see what November has in store for us. That said, sys admins shouldn’t take the light month to mean they can sit back and take a break. We still have a number of vulnerabilities that should be patched, so updates should be applied following regular schedules.” Reguly told SecurityWeek

Microsoft, Google and Mozilla announced in September their intention to kill the RC4 cipher stream in their web browsers at the beginning of 2016. On Tuesday, Microsoft took further steps in this direction by disabling RC4 in the .NET Transport Layer Security (TLS) on Windows 10 systems running .NET 3.5 applications, and systems with .NET Framework 4.6 that are running .NET 4.5, 4.5.1 and 4.5.2 applications.

Adobe also released security updates on Tuesday to patch a total of nearly 70 vulnerabilities affecting Flash Player, Reader and Acrobat. Shortly after the release of the patches, news broke that malicious actors have been exploiting a Flash Player zero-day in their attacks.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version