STE WILLIAMS

Patch Tuesday wrap-up, March 2014

ie-170We already wrote about Microsoft’s March 2014 patches, noting that, as usually happens, there was an All Points Bulletin for Internet Explorer coming up.

Microsoft doesn’t call them APBs, of course – they are Cumulative Security Updates, with one bulletin covering all the numerous versions, bitnesses and CPU flavours of Redmond’s IE browser.

What we weren’t able to tell you in advance was whether the widely-publicised (but fortunately not widely-exploited) CVE-2014-0322 hole would be closed.

Good news – the fix made it into this month’s update.

As we mentioned before, there wasn’t actually a terrible urgency for the CVE-2014-0322 fix, because a number of workarounds and mitigations were available.

But a permanent fix is a permanent fix, so apply it as soon as you can, if you haven’t let Windows Update apply it for you already.

flash-170Adobe Flash has an important fix to add to its two recent between-Patch-Tuesday critical updates.

Flash Player goes to 12.0.0.77 on Windows and Macintosh; Linux users are stuck on an older flavour of version 11 forever, and go to 11.2.202.346; other users who have stayed with version 11 out of choice or necessity get 11.7.700.272.

Google Chrome, Microsoft IE 10 and Microsoft IE 11 include and manage their own Flash player code – Adobe has confirmed that both Google and Microsoft have published the necessary patches.

The Microsoft flavour of Adobe’s security fix isn’t listed amongst Microsoft’s own Patch Tuesday bulletins, but Microsoft’s updating tools should take care of it for you.

If you prefer the manual approach, KB2938527 has the details and the downloads.

Of course, those are just the top-of-mind patches.

Don’t forget the other four Microsoft bulletins.

We’ve written them up with our assessment of their likely risk, if you like to do a risk/benefit check before you go live with updates, as follows:

If you are still in any doubt about the value of patches (or need to convince yourself of the trouble approaching when patches go missing from XP after next month), we invite you to read the latest paper by SophosLabs researcher Gabor Szappanos.

Szappi, as he is known, is a regular on Sophos Naked Security: he writes articles that are crisp, logical and end with clear advice.

In his latest report, Advanced Persistent Threats – the new normal?, Szappi takes a look at how APT-type attacks have gone mainstream.

He explains how 91% of a class of widely-reported threats that we still talk about as “Advanced” could have been rendered harmless by Microsoft patches issued in 2010 and 2012.

Don’t delay. Patch today!

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/614qSyFDaQw/

Comments are closed.