Microsoft Plans to Fix 23 Bugs in October Patch Tuesday
#1
Microsoft Plans to Fix 23 Bugs in October Patch Tuesday
Microsoft plans to patch 23 vulnerabilities in Microsoft Windows, Silverlight and server software as part of the October Patch Tuesday release.
Microsoft will release eight security bulletins, of which two are rated "critical," according to the Microsoft Security Bulletin Advance Notification issued Oct. 6. The remaining important bulletins address flaws in Forefront Unified Access Gateway, Host Integration Server as well as some versions of Windows.
One of the critical bulletins patches a bug in Windows and Internet Explorer that if exploited would allow attackers to remotely malicious code, Microsoft said. Affected software versions include Internet Explorer 6 through 8, Windows XP, Vista and 7, as well as Windows Server 2003 and 2008.
"As usual, this month we will receive the mandatory critical update to Internet Explorer," Andrew Storms, director of security for nCircle, told eWEEK.
Attackers will continue to trick users into clicking on malicious links, so they will continue exploring Web browsers and plug-ins for weaknesses to exploit, Marcus Carey, security researcher at Rapid7, told eWEEK.
"My standard advice is to be careful when browsing," Carey said.
Read more: http://www.eweek.com/c/a/Security/Mi...uesday-317687/
Microsoft will release eight security bulletins, of which two are rated "critical," according to the Microsoft Security Bulletin Advance Notification issued Oct. 6. The remaining important bulletins address flaws in Forefront Unified Access Gateway, Host Integration Server as well as some versions of Windows.
One of the critical bulletins patches a bug in Windows and Internet Explorer that if exploited would allow attackers to remotely malicious code, Microsoft said. Affected software versions include Internet Explorer 6 through 8, Windows XP, Vista and 7, as well as Windows Server 2003 and 2008.
"As usual, this month we will receive the mandatory critical update to Internet Explorer," Andrew Storms, director of security for nCircle, told eWEEK.
Attackers will continue to trick users into clicking on malicious links, so they will continue exploring Web browsers and plug-ins for weaknesses to exploit, Marcus Carey, security researcher at Rapid7, told eWEEK.
"My standard advice is to be careful when browsing," Carey said.
Read more: http://www.eweek.com/c/a/Security/Mi...uesday-317687/
Thread
Thread Starter
Forum
Replies
Last Post
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)