Microsoft patch Tuesday - info from Symantec

Published March 11th, 2010 - 10:15 GMT

This month, Microsoft issued two security bulletins which address eight vulnerabilities, none of which Microsoft has rated as critical.


“Since Windows 7, Microsoft has seemed to downgrade file-based vulnerabilities,” said Joshua Talbot, security intelligence manager, Symantec Security Response. “In the past, I think many of the vulnerabilities patched this month could have been rated critical, but with protections like DEP and ASLR, these types of vulnerabilities are less of an issue for Windows 7. My concern is that in many enterprise environments, Windows XP is still common, and these vulnerabilities are more serious on XP and older systems.”


“Microsoft didn’t patch the win32hlp Internet Explorer vulnerability made public just over a week ago,” Talbot added. “We’ve seen proof-of-concept exploit code for this vulnerability, but haven’t seen any attacks using it in the wild.”


“A unique user interaction is required to make the IE vulnerability work, but an attacker could engineer an exploit that would entice a user to carry out the action,” Talbot concluded. “For example, causing a pop-up window to appear repeatedly until the user hits the necessary key to make it stop, which would subsequently also cause the machine to become infected.”


Symantec strongly encourages users to patch their systems against all these vulnerabilities. In addition, enterprises are encouraged to consider implementing an automated patch management solution to help mitigate risk.


The Symantec Security Response blog can be viewed here:


Additional information on Microsoft’s security bulletins can be found here:


“In addition to Microsoft’s Patch Tuesday updates today, the company also issued an advisory for a new zero day vulnerability affecting Internet Explorer,” said Josh Talbot, Security Intelligence Manager, Symantec Security Response. “Symantec has observed exploitation of this vulnerability in the wild and has created Trojan.Malscript!html and JS.Downloader detection to mitigate this attack.”


More information regarding this advisory can be found here:

© 2000 - 2019 Al Bawaba (

You may also like