Microsoft released a patch on Tuesday, May 8, which included 23 fixes across a number of services. The security flaws expose billions of Windows users to remote code execution attacks.
Among the 23 fixes are patches for Microsoft Office, Windows, Silverlight and the Microsoft .NET framework. Microsoft is urging users to pay attention MS12-034 - described as "critical" - that patches 10 security holes. The company expects working exploit code to be released within 30 days as three of the exploits have already been publicly revealed.
The update patches three publicly disclosed exploits and privately reported exploits across Office, Silverlight, Windows and .NET. The most severe of the exploits would allow remote code execution if a user opened a specific type of document which embeds TrueType font files. Attacks would convince users to visit a malicious Web site by clicking a link in an e-mail or Instant Messaging message.
Microsoft says the MS12-029 update should also be downloaded immediately, as the exploit allows machines to be controlled completely through a security flaw in Microsoft Word. The company warns users to be aware of malicious Web sites and e-mails.
A range of other updates are available. MS12-035 fixes exploits in the .NET framework. The exploit allows remote code execution is a user views a Web browser XAML browser applications. Microsoft says users who use account with less user rights could be affected less.
The MS12-030 updates resolves one publicly disclosed and five privately reported issues in Microsoft Office. Again, these could allow for remote code execution if a user opens a specifically crafted Office file and an attacker could gain the same users rights as a logged-in users. Less users rights also means less vulnerabilities, Microsoft says.
MS12-031 fixes another flaw in Office, allowing remote code execution if a Visio file is opened. The implications of an attack of the same as the 030 update.
The 032 update fixes one privately reported and one publicly reported in Microsoft Windows. If an attacker logs onto a system and runs a specific application, privileges could be increased.
Finally, the MS12-033 patches a privately reported exploit in Windows. Again privilege will be elevated if an attacker logs onto a system and runs a specific application. However, attackers must be able to log in locally and have valid credentials.
(reported by Jonathan Charles, edited by Dave Clark)
© Copyright 2024 Mobile & Apps, All rights reserved. Do not reproduce without permission.