In-Depth

Microsoft Patches Three Flaws, Zero-Day Still Open

As expected, Microsoft released three patches last week to fix one critical Office vulnerability as well as two Windows flaws.

As expected, Microsoft released three patches last week to fix one critical Office vulnerability as well as two Windows flaws.

The critical patch (MS06-054) addresses a hole in Microsoft Publisher that "could allow remote code execution" -- a common issue with patches Microsoft deems critical. There do appear to be issues with installing this patch; more information is available in the references links on this page of Microsoft's Web site.

Symantec Security Response rates the Publisher vulnerability to be the most critical of the security bulletins. This remote client-side execution vulnerability can be triggered by a malformed string from within a Publisher file (.pub). The company said attacks may occur through files processed by an affected application, via e-mail attachments, or by hosting them on a malicious Web page. It warns that "A successful attack requires the user to open the file and will cause arbitrary code to be executed with the privileges of the currently logged in user. This vulnerability affects Publisher 2000, 2002 and 2003."

The two Windows-related patches are rated important (MS06-052) and moderate (MS06-053), and address flaws with Reliable Multicast Program and indexing services, respectively. See the related links for more information.

Redmond also re-released two patches (MS06-040 and MS06-042) originally included in last month's "Patch Tuesday" -- the company issued updates in late August to fix problems with the patches.

Noticeably absent from today's offerings was a patch that would fix the current zero-day Word exploit. Microsoft said in the Security Advisory it issued for the flaw last week that it was considering an out-of-cycle patch for that issue.

"It was too soon to pull together because [Microsoft] acknowledged it on the sixth...but at the same time, it is zero-day so it should be a big priority," commented Amol Sarwate, director of the vulnerability research lab at Redwood Shores, Calif.-based Qualys, a provider of enterprise Software as a Service (SaaS) security and compliance software.

Sarwate recommends IT professionals educate their users about the flaw until the patch is released.

To view today's official advisory, go here.

About the Author

Becky Nagel serves as vice president of AI for 1105 Media specializing in developing media, events and training for companies around AI and generative AI technology. She also regularly writes and reports on AI news, and is the founding editor of PureAI.com. She's the author of "ChatGPT Prompt 101 Guide for Business Users" and other popular AI resources with a real-world business perspective. She regularly speaks, writes and develops content around AI, generative AI and other business tech. Find her on X/Twitter @beckynagel.

Must Read Articles