Patch Tuesday to get 'ugly' with latest Microsoft security update

Government shutdown or not, security demands never sleep, and admins on duty will have plenty to do on Tuesday, when Microsoft releases a large array of fixes, according to the company's advance notice.

Microsoft plans to roll out 17 patches  in its monthly Patch Tuesday security update, with nine fixes deemed "critical" and eight considered "important." Remote code execution (RCE) attack risks dominate April's slate, as 15 of the 17 security bulletins address those considerations. Two security bulletins point to information disclosure and elevation-of-privilege threats.

"No matter how you look at it, it's ugly," said Paul Henry, forensic and security analyst at Lumension. "We're well into a new year and things have not improved. In fact, they've gotten worse."

Critical fixes

The first critical security bulletin appears to be the long-awaited cumulative fix for Internet Explorer. It will address every supported Windows operating system and covers IE 6, 7 and 8 browsers.

The remaining eight critical security bulletins are all Windows OS-level fixes with RCE exploit risks. Critical security bulletin No. 6 also includes a fix for Microsoft Office.

Important fixes

The important security bulletins are a hodgepodge of updates that affect various programs, including Office and development tools, along with Windows. Word, Excel and PowerPoint are all in the patch crosshairs for the month of April.

All 17 updates may require restarts. With the growth of vulnerabilities and patches, it may be helpful to some Windows IT pros to check out the newly released Microsoft Security Update Guide. It's an aid for keeping track of patches and evaluating threat risks.

The recent expansion in the number of Microsoft's security bulletins comes from a spike in vulnerabilities affecting third-party software designed to run on Windows or that users with Windows systems download, Henry explained.

"All of this is further evidence that our methods of securing our systems just aren't up to par," Henry said. "Again and again, Microsoft falls victim to third-party software causing a major breach. Everyone blames Microsoft month after month for patching issues, but this is not just a Microsoft issue. Unless we're going to get busy patching this garbage we're installing on our systems, it's going to continue to be an issue."

In the meantime, administrators can check out this Knowledge Base article for information about nonsecurity updates being pushed out via Windows Update, Microsoft Update and Windows Server Update Services.

About the Author

Jabulani Leffall is a journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

inside gcn

  • high performance computing (Gorodenkoff/Shutterstock.com)

    Does AI require high-end infrastructure?

Reader Comments

Mon, Apr 11, 2011 Col. Panek Earth

Like I tell my coworkers, "When you get tired of Windows, let me know."

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group