[IS&T Security-FYI] Patch Tuesday and other Updates
Monique Yeaton
myeaton at MIT.EDU
Fri Jan 12 16:01:06 EST 2007
It is once again a week of released Microsoft updates. Here is our
summary on these latest as well as other vulnerabilities not related
to Microsoft and announced by CERT (www.cert.org) which you will want
to be aware of.
-----------------------
Microsoft Patches
-----------------------
On Jan. 9, Patch Tuesday, Microsoft released updates for the following:
- Windows
- Internet Explorer
- Outlook
- Excel for Windows and Mac OS X
Descriptions of the vulnerabilities are available in Microsoft
Security Bulletins MS07-001 through MS07-004. Three of these are
listed as critical and one as important.
A summary of the January 2007 bulletins can be found here:
<http://www.microsoft.com/technet/security/bulletin/ms07-jan.mspx>
We recommend that users take the upgrades unless you have specific
information indicating that it is incompatible with an application
you need to use.
These patches are now approved for deployment via MIT WAUS.
<http://web.mit.edu/ist/topics/windows/updates/>
To download all of the updates manually:
Visit Windows Update <http://go.microsoft.com/?LinkID=275655> and
click "Scan for updates."
Visit the Protect your PC site <http://www.microsoft.com/athome/
security/default.mspx> to learn how to have the latest security
updates delivered directly to your computer.
The very best first line of defense against vulnerabilities is to
take Microsoft patches automatically whenever feasible. We want to
thank everyone who already uses Microsoft's Automatic Update Service
or MIT's local Windows Automatic Update Service.
-------------------
Microsoft Word
-------------------
As a follow up to the Word vulnerabilities reported in December 2006,
Microsoft has not addressed this issue in the January release.
Microsoft is closely monitoring this issue and concludes that the
vulnerability is subject to very limited and targeted attacks. In
order for an attack to be carried out, a user must first open a
malicious Word file attached to an e-mail or otherwise provided to
them by an attacker. They strongly recommend users always exercise
extreme caution when opening unsolicited attachments from known and
unknown sources.
---------------------
Apple QuickTime
---------------------
A vulnerability exists in the way Apple QuickTime handles specially
crafted Real Time Streaming Protocol (RTSP) URL strings. This means
that malicious code could exist on web pages that use a QuickTime
plug-in or ActiveX control, a page that uses "rtsp://" protocol or in
a file that is associated with the QuickTime Player. The
vulnerability is not dependent on the web browser being used. Note
that Apple iTunes and other software using QuickTime may also be
affected.
Systems affected:
- Microsoft Windows platforms
- Apple Mac platforms
There is currently no solution available for this problem. We
recommend you do not access QuickTime (video) files from untrusted
sources.
In order to convince users to visit their sites, attackers often use
a variety of techniques to create misleading links including URL
encoding, IP address variations, long URLs, and intentional
misspellings. Do not click on unsolicited links received in email,
instant messages, web forums, or internet relay chat (IRC) channels.
Type URLs directly into the browser to avoid these misleading links.
While these are generally good security practices, following these
behaviors will not prevent exploitation of this vulnerability in all
cases, particularly if a trusted site has been compromised or allows
cross-site scripting.
More on cross-site scripting can be found here: <http://
en.wikipedia.org/wiki/Cross_site_scripting>
We will track this QuickTime vulnerability and provide follow up
information when a patch has been made available.
------------------------------------------------------------
Adobe Acrobat Plug-in Version 7.0.8 and earlier
------------------------------------------------------------
Several vulnerabilities exist in the Adobe Acrobat Plug-in. The Plug-
in allows users to view PDF files inside of a web browser. A
malicious file must be loaded in Adobe Reader by the end user for an
attacker to exploit these vulnerabilities and take control of the
affected system.
We recommend you upgrade to Adobe Reader 7.0.9. If you have a version
earlier than 7.0.8 you may need to install the incremental patch (see
http://www.adobe.com).
The IS&T department at MIT has made the 7.0.9 Adobe Reader version
available on their downloads page. To view and download the latest
supported software visit <http://web.mit.edu/software/mac.html> for
Mac users, and <http://web.mit.edu/software/win.html> for Windows users.
-----------
If you have any questions regarding any of these issues, please
contact security at mit.edu. I want to thank you for staying aware of IT
Security issues. Let's make 2007 a safe computing year!
Sincerely,
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
N42-040, tel: (617) 253-2715
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20070112/3d3550f1/attachment.htm
More information about the ist-security-fyi
mailing list