Microsoft patches 4 zero-day vulnerabilities

Malware

by CBR Staff Writer| 11 December 2013

Five of the patches deal with at least one vulnerability rated as critical.

Microsoft has released 11 security patches to resolve issues with 24 vulnerabilities in its product line up including Windows, Windows Server, Exchange Server, Microsoft SharePoint Server, Office Web Apps, Lync, ASP.NET SignalR, and Visual Studio Team Foundation Server 2013.

The software major stressed that five of the patches address at least one vulnerability rated as critical.

Four of the bulletins including MS13-096, MS13-098, MS13-104 and MS13-106 come with a vulnerability which is highly being exploited, with major concern on MS13-098, which is anticipated to weaken code signing.

About six of the patches are specially targeted at issues rated as 'important', with one of flaw being a security bypass hole in Microsoft Office, while other fixes are aimed at fixing data-disclosure flaw in Office, the ability to boost privileges on Windows via driver-level programming faults, and SharePoint's remote-code execution defect.

Last month, Microsoft rolled out a patch to resolve issues with Exchange Server 2013 that hit its backup and recovery operations, which mainly targeting consumers relying uponBackup and Recovery mechanisms to protect Exchange data.

The fix also included improved Exchange admin console and the audit log, while removing the need for Windows 8.1/IE11's use of OWA Light.

 

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

715 people like this.
1516 people follow this.

Malware Intelligence

Buy the latest industry research online today!
See more

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.