Microsoft delivers a dozen security bulletins this month

Will one fix the latest windows zero day?

Remember the good ol’ days (last month), when Microsoft would only release a few bulletins on Patch Day. This month won’t be like that.

According to this month’s advanced notification, Microsoft intends to release a dozen security bulletins next Tuesday, February 8th. Ten of the bulletins will fix security flaws in Windows (or components that ship with it), one bulletin covers vulnerabilities in Internet Explorer (IE), and the remaining one fixes flaws in Office. Microsoft rates three of the bulletins as Critical, and the others as Important.

On a related note, late January Microsoft released a Security Advisory (their form of an early security warning for unpatched issues) describing a zero day web-related vulnerability in Windows. The flaw involves the Windows MHTML or MIME HTML component, which is used to handle special web pages that include both HTML and MIME (typically pictures, audio, or video) content contained in one file. If an attacker can entice you to visit a specially crafted web-page, or click a malicious link, he could exploit this flaw in much the same way he might exploit a Cross-Site Scripting (XSS) vulnerability ; t0 steal your cookies, redirect your browser to malicious sites, or essentially take any action you could on a web site.

As mentioned, Microsoft hasn’t released a patch for this flaw yet, but I am hoping that they do during next Tuesday’s Patch Day. Until they do, be sure to check out the “Suggested Actions” section of their advisory, which points to a FixIt solution that should mitigate the risk of this unpatched flaw.

Whether or not Microsoft includes the MHTML patch in next week’s Patch Day, I highly recommend you prepare your staff for a full day of testing and patching. With twelve bulletins to navigate, it will probably take awhile to get your Windows network up to date.

We’ll know more about these bulletins next Tuesday, and will publish alerts about them here. — Corey Nachreiner, CISSP

About Corey Nachreiner

Corey Nachreiner has been with WatchGuard since 1999 and has since written more than a thousand concise security alerts and easily-understood educational articles for WatchGuard users. His security training videos have generated hundreds of letters of praise from thankful customers and accumulated more than 100,000 views on YouTube and Google Video. A Certified Information Systems Security Professional (CISSP), Corey speaks internationally and is often quoted by other online sources, including C|NET, eWeek, and Slashdot. Corey enjoys "modding" any technical gizmo he can get his hands on, and considers himself a hacker in the old sense of the word.

Trackbacks/Pingbacks

  1. Microsoft Black Tuesday: A dozen bulletins fix 22 vulnerabilities (but not the zero day MHTML flaw) « WatchGuard Security Center - February 8, 2011

    […] expected, Microsoft posted their first big patch day of 2011 today (the last one was small). Unfortunately, […]

  2. A Trio of Microsoft Updates Make for a Light Patch Day « WatchGuard Security Center - March 5, 2011

    […] said, Microsoft still hasn’t patched the zero day MHTML flaw in Windows that we mentioned during last Patch Day. The flaw involves the MIME HTML (MHTML) component, Windows uses to handle web pages that contain […]

  3. Thirteen Windows Bulletins Patch 18 Security Holes | WatchGuard Security Center - April 12, 2011

    […] MHTML Information Disclosure Vulnerability In our February advanced notification post, we mentioned a zero day MHTML vulnerability that was similar to a Cross-site Scripting (XSS) […]

  4. Thirteen Windows Bulletins Patch 18 Security Holes | microreksa - April 12, 2011

    […] our February advanced notification post, we mentioned a zero day MHTML vulnerability that was similar to a Cross-site Scripting (XSS) […]

  5. Eleven Windows Bulletins Patch Many Critical Vulnerabilities - July 13, 2011

    […] MHTML Information Disclosure Vulnerability In our February advanced notification post, we mentioned a zero day MHTML vulnerability that was similar to a Cross-site Scripting (XSS) […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: