Among the security patches released by Microsoft Tuesday is an Internet Explorer fix that is now being distributed for the third time, due to problems that weren’t fixed on the patch’s first or second releases, the company has admitted.Last month, eEye Digital Security warned users that Microsoft’s August security update, MS06-042, had in fact introduced a new critical security bug. Microsoft responded with a “hotfix” repairing the problem.The two companies also engaged in a war of words over eEye’s disclosure of the seriousness of the problem introduced by MS06-042. While Microsoft described the problem as relatively minor, involving browser crashes, eEye discovered that the hole could be exploited to run malicious code. Microsoft called this disclosure “irresponsible” and removed eEye from the flaw credits. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe That wasn’t the end of the story, however. The “hotfix” of Aug. 24 failed to completely fix the problem, eEye discovered. This week’s second update fixes the problems missed by the first rerelease, Microsoft said. “With the increased scrutiny this release received, a security researcher responsibly disclosed to us that a similar vulnerability was also discovered in IE5.01 on Windows 2000, IE 6.0 SP1 (in a different location), and the original release of Windows Server 2003 (not SP1),” said Microsoft group product manager Tony Chor, on the IE Blog.“This release and the need for subsequent rereleases have certainly been a learning experience for us,” he added. “This update cycle has not been an example of our best work.” Also this week, Apple urged users to upgrade to a new version of QuickTime that fixes a total of seven security holes. Current versions of QuickTime expose Macs and PCs to serious security vulnerabilities, Apple said.Apple warned that QuickTime is vulnerable to an attack via specially crafted movies using the H.264 video codec standard. The malicious files can cause an integer overflow or buffer overflow that can crash the application and allow malicious code execution with the privileges of the user, according to Apple.A separate bug can also crash the application and allow arbitrary code execution, Apple said. The bugs are fixed in QuickTime 7.1.3, available from Apple’s site.-Matthew Broersma, Techworld.com (London)Related Links: Microsoft Expects to Release Only Three Patches in September Microsoft Patches New Office Flaw Hackers Use New Word Flaw in AttacksThis article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in. Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content feature Mastercard preps for the post-quantum cybersecurity threat A cryptographically relevant quantum computer will put everyday online transactions at risk. Mastercard is preparing for such an eventuality — today. By Poornima Apte Sep 22, 2023 6 mins CIO 100 CIO 100 CIO 100 feature 9 famous analytics and AI disasters Insights from data and machine learning algorithms can be invaluable, but mistakes can cost you reputation, revenue, or even lives. These high-profile analytics and AI blunders illustrate what can go wrong. By Thor Olavsrud Sep 22, 2023 13 mins Technology Industry Generative AI Machine Learning feature Top 15 data management platforms available today Data management platforms (DMPs) help organizations collect and manage data from a wide array of sources — and are becoming increasingly important for customer-centric sales and marketing campaigns. By Peter Wayner Sep 22, 2023 10 mins Marketing Software Data Management opinion Four questions for a casino InfoSec director By Beth Kormanik Sep 21, 2023 3 mins Media and Entertainment Industry Events Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe