2011’s First Patch Tuesday Fixes Three Windows Flaws

Microsoft released just two bulletins in this month’s
edition of patch Tuesday. Both bulletins cover vulnerabilities in Windows, and Microsoft is recommending that users install the critical fix for the two vulnerabilities covered in MS11-02 immediately.

Windows patchMicrosoft released just two bulletins in this month’s
edition of patch Tuesday. Both bulletins cover vulnerabilities in Windows, and Microsoft is recommending that users install the critical fix for the two vulnerabilities covered in MS11-02 immediately.

In addition to the patches for three total vulnerabilities, Microsoft also released some updated guidance for customers trying to defend against the unpatched Internet Explorer CSS bug that was disclosed recently. The guidance includes the release of a FixIt tool to help users protect against attacks.

“This workaround is an MSI package (Microsoft “FixIt”) that uses the
Windows application compatibility toolkit to make a small change to
MSHTML.DLL every time it is loaded by Internet Explorer. This change
causes Internet Explorer to refuse to import a CSS style sheet if it has
the same URL as the CSS style sheet from which it is being loaded.
Simply put, the workaround inserts a check to see if a style sheet is
about to be loaded recursively, and if it so, it aborts the load of the
style sheet,” Microsoft said in its guidance.

The first patch release of 2011 is a relatively small one considering
the 16
bulletins released in October
that addressed 49 vulnerabilities and the 17
released two months later
addressing 40 vulnerabilities.

MS11-01
is rated as important, and resolves a vulnerability in Windows Backup Manager
that was disclosed publicly. Exploiting it could give remote code execution to
an attacker if a user opens a legitimate Windows Backup Manager file in the
same network directory as a specifically crafted library file. To be
successful, the user must visit an unknown
remote file system location or WebDAV share and open the legitimate file from
that location, which could cause Windows Backup Manager to load the specially crafted
library file.

MS11-02
is rated critical and resolves two privately disclosed vulnerabilities, a DSN
overflow and ADO record memory vulnerability, in Microsoft Data Access
Components. This bug could allow remote code execution if the user views a
specifically crafted Web page. The successful attacker could exploit this
vulnerability and gain access to the same user rights as the local user. The
accounts of users that are configured to allow fewer user rights are likely to
be less affected than those with administrative user rights.

Suggested articles

Discussion

  • Shinigami on

    Wow, good job microsoft for fixing these issues......now what about the others?

  • Anonymous on

    Scheduled maintenance is not a problem for microsoft, unscheduled maintenance is.  At some point pretty soon, I am expecting the scheduled patches to fix the exploits to result in something being broken. It's happened before, it's just a matter of time before it happens again. For example mess around with the html backend dlls or iexplorer and the next thing you know pro tools will be broken again.  Or maybe they mess with the shell and it breaks all the legacy dos apps.  It's really getting to be a trust problem with microsoft, you literally have to keep a cloned drive to un-do their mistakes these days.  Anyway, my intuition says, we're getting close to another scheduled crippled OS.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.