Microsoft Patch Tuesday Fixes Two Separate IE Zero-Day Flaws
Microsoft released eight security bulletins, and one fixes two flaws in IE already being exploited in the wild.
Tue, October 08, 2013
PC World — Today is Patch Tuesday. It also happens to be the 10-year anniversary of the monthly security patch update. For October, Microsoft released eight new security bulletins--four rated as Critical and four Important. There is one in particular, though, that deserves the most urgent attention.
MS13-080--the cumulative security update for Internet Explorer--addresses a total of 10 separate vulnerabilities affecting all supported versions of the Web browser. But, the urgency for applying this update stems from the fact that two of the vulnerabilities addressed are zero-day flaws that are already being actively exploited in the wild.
"Many people have been on their toes watching the IE exploit since it first became public in mid-September," says Andrew Storms, senior director of DevOps for CloudPassage. "Despite the exploit being used in a watering hole attack and Metasploit releasing a module for the exploit, Microsoft did not find it necessary to release the fix out of band."
"So far these bugs are only being exploited in limited attacks, but users are still strongly encouraged to patch IE as soon as possible," says Lamar Bailey, director of security research and development forA Tripwire. "Now that a patch is available we expect to see a rise in the number of attacks using these vulnerabilities."
Storms agrees, cautioning IT admins and users not to take Microsoft's leisurely pace as a justification to sit on this one. "Regardless of Microsoft's decision to not go out-of-band, users should prioritize the fix at the top of their list," he says.
Internet Explorer doesn't have a monopoly on the fun this month. There are two other security bulletins that follow closely behind the Internet Explorer cumulative security update in terms of urgency.
MS13-081 addresses seven vulnerabilities in kernel-mode drivers affecting all versions of Windows except for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2. Two of the flaws are related to font-parsing and could enable an attacker to remotely execute malicious code if successfully exploited.
"Both of the font vulnerabilities will be a prime target for attackers in the near future, since these types of vulnerabilities have proven to be useful in targeted attacks in the past," says Marc Maiffret, CTO at BeyondTrust. "Administrators should deploy this patch as soon as possible."
Ross Barrett, senior manager of security engineering at Rapid7, says that it's important to apply the MS13-083 update as soon as possible as well. "This is a genuine article; a real, honest to goodness, potentially 'wormable' condition," he says. "If the 'bad guys' figure out a way to automate the exploitation of this, it could spread rapidly and the defense in depth measures of your organization will be tested."