We already wrote about Microsoft’s March 2014 patches, noting that, as usually happens, there was an All Points Bulletin for Internet Explorer coming up.
Microsoft doesn’t call them APBs, of course – they are Cumulative Security Updates, with one bulletin covering all the numerous versions, bitnesses and CPU flavours of Redmond’s IE browser.
What we weren’t able to tell you in advance was whether the widely-publicised (but fortunately not widely-exploited) CVE-2014-0322 hole would be closed.
But a permanent fix is a permanent fix, so apply it as soon as you can, if you haven’t let Windows Update apply it for you already.
Flash Player goes to 126.96.36.199 on Windows and Macintosh; Linux users are stuck on an older flavour of version 11 forever, and go to 188.8.131.526; other users who have stayed with version 11 out of choice or necessity get 11.7.700.272.
Google Chrome, Microsoft IE 10 and Microsoft IE 11 include and manage their own Flash player code – Adobe has confirmed that both Google and Microsoft have published the necessary patches.
The Microsoft flavour of Adobe’s security fix isn’t listed amongst Microsoft’s own Patch Tuesday bulletins, but Microsoft’s updating tools should take care of it for you.
If you prefer the manual approach, KB2938527 has the details and the downloads.
Of course, those are just the top-of-mind patches.
Don’t forget the other four Microsoft bulletins.
We’ve written them up with our assessment of their likely risk, if you like to do a risk/benefit check before you go live with updates, as follows:
|Microsoft ID||Sophos ID||Description and KB number|
|MS14-013||VET585||Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (2929961)|
|MS14-014||VET587||Vulnerability in Silverlight Could Allow Security Feature Bypass (2932677)|
|MS14-015||VET586||Vulnerabilities in Windows Kernel Mode Driver Could Allow Elevation of Privilege (2930275)|
|MS14-016||VET588||Vulnerability in Security Account Manager Remote (SAMR) Protocol Could Allow Security Feature Bypass (2934418)|
If you are still in any doubt about the value of patches (or need to convince yourself of the trouble approaching when patches go missing from XP after next month), we invite you to read the latest paper by SophosLabs researcher Gabor Szappanos.
In his latest report, Advanced Persistent Threats – the new normal?, Szappi takes a look at how APT-type attacks have gone mainstream.
He explains how 91% of a class of widely-reported threats that we still talk about as “Advanced” could have been rendered harmless by Microsoft patches issued in 2010 and 2012.
Don’t delay. Patch today!