Two fixes released on lightweight Patch Tuesday

Posted by   Virus Bulletin on   Nov 14, 2007

Monthly security update covers just couple of dangers.

Microsoft has released its monthly 'Patch Tuesday' security bulletin, with only two patches issued, one rated 'Important' and the other 'critical'.

The more serious flaw, a problem with URI validation, has been publicly disclosed and can be used to remotely compromise a system. While exploitation methods have only been found for Internet Explorer 7, the flaw is in Shell32.dll, a vital system file found on many versions of Windows, and so could expose many users to danger.

The patch labelled 'important' could also present significant dangers, as it could be used to set up DNS spoofing and redirect connections aimed at legitimate sites to spoofed versions, allowing phishing of sensitive data and thus identity fraud and theft. The flaw is in DNS sever software and thus only affects server versions of Windows, and has not so far been publicly divulged.

The bulletin, with more details of the patches and the flaws they cover, is here. A Microsoft blog entry on the release, with information on the re-release of another, less important fix, is here.

Posted on 14 November 2007 by Virus Bulletin



Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.