Microsoft's February Patch Targets 20 Security Vulnerabilities

Microsoft released 12 security bulletins in its February security update Tuesday, targeting more than 20 software vulnerabilities.  

The patch contains three bulletins rated "critical," along with nine considered "important." Remote code execution (RCE) considerations are addressed in the three critical bulletins. For the important items, there are two RCE risks and five items with elevation-of-privilege implications. In the remainder of the slate, Microsoft addressed denial-of-service and information-disclosure issues.

Critical Items
The first critical bulletin comes highly anticipated as it's for Internet Explorer, affecting IE 6, 7, and 8 on all supported Windows operating systems.

"We finally got our patch for Internet Explorer today in the midst of Microsoft's 12 bulletins; three of which were critical and nine important," said Paul Henry, security analyst at Lumension. "Nine hundred million people are now sharing the love for Microsoft after last month, when we waited for the IE patch that never came."

According to Microsoft's notes about the IE flaw, an attack can be executed when a specially crafted Web page "opens a legitimate HTML file that loads a specially crafted library file."

The second critical item addresses the publicly disclosed vulnerability in the Windows Shell graphics processor, a leftover issue from earlier this year that is finally being patched. The patch touches every supported operating system except for Windows 7 and Window Server 2008.

The final critical bulletin on tap affects every supported Windows OS version and involves vulnerability in the Windows OpenType Compact Font Format driver.

Important Items
The first important fix affects Vista, Windows Server 2008 and Windows 7 operating systems and patches Internet Information Services.

Important item No. 2 only touches Windows Server 2003, resolving a publicly disclosed vulnerability in Windows Active Directory.

Important bulletin No. 3 provides an update for Microsoft Office, the Visual Studio development environment and Visio applications (versions 2002, 2003 and 2007).

The fourth important item addresses Windows 7 and Windows Server 2008 operating systems. Microsoft is providing a patch for vulnerabilities in the JScript and VBScript scripting engines. The patch protects against specially crafted Web pages that could muck up an Internet Explorer session.

Important bulletin No. 5 focuses on a vulnerability in the Microsoft Windows Client/Server Run-time Subsystem in Windows XP and Windows Server 2003.

The sixth important bulletin is a fix for every supported Windows OS, plus a Windows update. The same scenario can be expected with important item No. 7.

Important items No. 8 and No. 9 both address systems running Windows XP and Windows Server 2003. Item No. 8 addresses domain components and Windows Kerberos, while item No. 9 covers the Local Security Authority Subsystem Service in Windows XP and Windows Server 2003.

Security Insanity?
As usual, many security pros are talking about what's not in the patch. Such questions seem to come up each month. For instance, despite the fact that there are 12 fixes in the February security update, Microsoft still came up short on patching the MHTML issue in Windows/Internet Explorer.

While there's no patch for the MHTML flaw, Microsoft did release a workaround in its security advisory 2501696.

Some security pundits, such as Anup Ghosh, chief scientist and founder of security shop Invincea, are going out on a limb and questioning the patch release model more generally. Ghosh labeled the monthly update routine as a "security insanity cycle."

"The security industry today has largely accepted that the standard in network defense is a wash-rinse-repeat cycle in a never-ending game of whack-a-mole where all industry interests are aligned in perpetuating the cycle and servicing the problem, rather than breaking it," Ghosh said in a blog post.

Meanwhile for IT administrators expecting to wrestle with Microsoft's February patch, it's important to know that all security items may require a restart. IT pros can tap this Knowledge Base article for info on nonsecurity updates distributed through Windows Server Update Services, Windows Update, and Microsoft Update.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • college student working on a laptop, surrounded by icons representing campus support services

    National U Launches Student Support Hub for Non-Traditional Learners

    National University has launched a new student support hub designed to help online and working learners balance career, education, and family responsibilities as they pursue their education. Called "The Nest," the facility is positioned as a "co-learning" center that provides wraparound support services, work and study space, and access to child care.

  • university building icon connected to three simple career symbols—a briefcase, gear, and medical cross

    University of Illinois System Sets Sights on Community College Transfers with One Million Degrees Partnership

    In a multiyear pilot program, the University of Illinois System is working with nonprofit One Million Degrees to bridge the community college transfer gap and improve student outcomes.

  • robot waving

    Copilot Updates Aim to Make AI More Personal

    Microsoft has unveiled a range of updates to its Copilot platform, marking a new phase in its effort to deliver what it calls a "true AI companion" that adapts to individual users' needs, preferences and routines.

  • From Fire TV to Signage Stick: University of Utah's Digital Signage Evolution

    Jake Sorensen, who oversees sponsorship and advertising and Student Media in Auxiliary Business Development at the University of Utah, has navigated the digital signage landscape for nearly 15 years. He was managing hundreds of devices on campus that were incompatible with digital signage requirements and needed a solution that was reliable and lowered labor costs. The Amazon Signage Stick, specifically engineered for digital signage applications, gave him the stability and design functionality the University of Utah needed, along with the assurance of long-term support.