IE takes center stage in June patch release

 

USA - Microsoft has released security updates that repair a total of 15 security vulnerabilities in its Windows operating system and bundled products.

Nine of the repaired vulnerabilities are rated critical, a severity rating that indicated that attackers can exploit the flaw without any user interaction.

Internet explorer is the most patched Microsoft application. The browser received a total of six plugs, five of which will repair critical vulnerabilities. The application is a prime target for attackers attempting to steal confidential information or recruit a computer for a botnet. It allows users to set up attacks by hosting a specially crafted website that promises content such as free pornographic images.

The remaining critical flaw are spread out over three other Windows components. Two affect the Mail application that is bundled with Windows Vista and could be exploited when a user opens a specially crafted message. One affects the Secure Channel Windows component that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) internet standards in Windows XP.

The final critical vulnerability is found in an undisclosed component of the Win32 application programming interface (API). The technology allows third party applications to interact with the operating system but is also used by Internet Explorer to parse specially crafted web pages. The flaw affects Windows 2000, Windows XP and Windows Server 2003.

The remaining security holes have severity ratings ranging from important to low.

Users can download the update from through the Windows Update or Microsoft Update service.

Full details of Microsoft's June security update are available on the company's TechNet Security Center website.

Copyright ©v3.co.uk


IE takes center stage in June patch release
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1088

Vote