Microsoft's February Patch Targets 20 Security Vulnerabilities

Microsoft released 12 security bulletins in its February security update Tuesday, targeting more than 20 software vulnerabilities.  

The patch contains three bulletins rated "critical," along with nine considered "important." Remote code execution (RCE) considerations are addressed in the three critical bulletins. For the important items, there are two RCE risks and five items with elevation-of-privilege implications. In the remainder of the slate, Microsoft addressed denial-of-service and information-disclosure issues.

Critical Items
The first critical bulletin comes highly anticipated as it's for Internet Explorer, affecting IE 6, 7, and 8 on all supported Windows operating systems.

"We finally got our patch for Internet Explorer today in the midst of Microsoft's 12 bulletins; three of which were critical and nine important," said Paul Henry, security analyst at Lumension. "Nine hundred million people are now sharing the love for Microsoft after last month, when we waited for the IE patch that never came."

According to Microsoft's notes about the IE flaw, an attack can be executed when a specially crafted Web page "opens a legitimate HTML file that loads a specially crafted library file."

The second critical item addresses the publicly disclosed vulnerability in the Windows Shell graphics processor, a leftover issue from earlier this year that is finally being patched. The patch touches every supported operating system except for Windows 7 and Window Server 2008.

The final critical bulletin on tap affects every supported Windows OS version and involves vulnerability in the Windows OpenType Compact Font Format driver.

Important Items
The first important fix affects Vista, Windows Server 2008 and Windows 7 operating systems and patches Internet Information Services.

Important item No. 2 only touches Windows Server 2003, resolving a publicly disclosed vulnerability in Windows Active Directory.

Important bulletin No. 3 provides an update for Microsoft Office, the Visual Studio development environment and Visio applications (versions 2002, 2003 and 2007).

The fourth important item addresses Windows 7 and Windows Server 2008 operating systems. Microsoft is providing a patch for vulnerabilities in the JScript and VBScript scripting engines. The patch protects against specially crafted Web pages that could muck up an Internet Explorer session.

Important bulletin No. 5 focuses on a vulnerability in the Microsoft Windows Client/Server Run-time Subsystem in Windows XP and Windows Server 2003.

The sixth important bulletin is a fix for every supported Windows OS, plus a Windows update. The same scenario can be expected with important item No. 7.

Important items No. 8 and No. 9 both address systems running Windows XP and Windows Server 2003. Item No. 8 addresses domain components and Windows Kerberos, while item No. 9 covers the Local Security Authority Subsystem Service in Windows XP and Windows Server 2003.

Security Insanity?
As usual, many security pros are talking about what's not in the patch. Such questions seem to come up each month. For instance, despite the fact that there are 12 fixes in the February security update, Microsoft still came up short on patching the MHTML issue in Windows/Internet Explorer.

While there's no patch for the MHTML flaw, Microsoft did release a workaround in its security advisory 2501696.

Some security pundits, such as Anup Ghosh, chief scientist and founder of security shop Invincea, are going out on a limb and questioning the patch release model more generally. Ghosh labeled the monthly update routine as a "security insanity cycle."

"The security industry today has largely accepted that the standard in network defense is a wash-rinse-repeat cycle in a never-ending game of whack-a-mole where all industry interests are aligned in perpetuating the cycle and servicing the problem, rather than breaking it," Ghosh said in a blog post.

Meanwhile for IT administrators expecting to wrestle with Microsoft's February patch, it's important to know that all security items may require a restart. IT pros can tap this Knowledge Base article for info on nonsecurity updates distributed through Windows Server Update Services, Windows Update, and Microsoft Update.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • glowing crystal ball with network connections

    Call for Opinions: 2026 Predictions for Higher Ed IT

    How will the technology landscape in higher education change in the coming year? We're inviting our readership to weigh in with their predictions, wishes, or worries for 2026.

  • Woman in tech, illuminated by blue data light

    Transforming Research Data Management for Greater Innovation

    Institutions that want to maximize their research investments need a strategic management approach that balances preservation, accessibility, and security and satisfies stakeholders' needs at the same time.

  • circuit patterns forming the shape of a brain

    SharePoint Rolls Out Agentic AI Building and Governance Tools

    Microsoft has announced a number of AI enhancements for its SharePoint collaboration platform, including a public preview of agentic building capabilities, a redesigned user experience, and expanded content governance tools.

  • Abstract speed motion blur in vibrant colors

    3 Ed Tech Shifts that Will Define 2026

    The digital learning landscape is entering a new phase defined by rapid advances in artificial intelligence, rising expectations for the student experience, and increasing pressure to demonstrate quality and accountability in online education.