Categories: PCSecurityWorkspace

Microsoft Patches Two Critical Security Flaws

Microsoft’s Patch Tuesday has patched two critical security flaws, which could leave users vulnerable if targeted by social engineering.

Visual Basic And Outlook Fixes

The release comes a month after the biggest Patch Tuesday of the year, which took aim at 25 bugs. Today’s update addresses two bugs; one a vulnerability in Microsoft Visual Basic for Applications, and the other a vulnerability impacting Outlook Express, Windows Mail and Windows Live Mail.

Both vulnerabilities are rated critical and can leave users open to remote code execution by attackers.

“I’ve put the Visual Basic for Applications (VBA) vulnerability first on my list,” said Joshua Talbot, security intelligence manager at Symantec Security Response. “Both vulnerabilities require social engineering to exploit, but the VBA vulnerability requires less action from a user. For instance, an attacker would simply have to convince a user to open a maliciously crafted file – likely an Office document – which supports VBA and the user’s machine would be compromised. I can see this being used in targeted attacks, which are on the rise.”

Microsoft VBA is used to develop client desktop packaged applications and integrate them with existing data and systems. According to Microsoft, the vulnerability is due to the way VBA searches for ActiveX controls in a VBA-supported document. As a result, it is possible for a host application to pass a specially crafted document with embedded ActiveX controls to the VBA runtime and create a condition where arbitrary could run.

The other vulnerability is caused when a common library used by Outlook Express and Windows Mail insufficiently validates network data before using that data to calculate the necessary size of a buffer.

“An attempt to exploit the vulnerability would not require authentication, allowing an attacker to exploit the vulnerability by sending a specially crafted response to a client initiating a connection to a server under his control using the common mail protocols POP3 and IMAP,” Microsoft warned.

No Scripting Fix

Missing from today’s patch lineup is a fix for a cross-site scripting flaw affecting Office SharePoint 2007 and Windows SharePoint Services 3.0 first reported April 28. The SharePoint vulnerability permits escalation of privileges within the SharePoint site. If successfully exploited, the bug allows an attacker to run commands against the SharePoint server with the privileges of the compromised user.

Microsoft recommends users concerned about the issue implement the workaround contained in the advisory issued 29 April.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

TikTok Viewed As Chinese Influence Tool By Most Americans – Poll

Most people in the United States view TikTok as a Chinese influence tool a poll…

13 hours ago

Ofcom Confirms OnlyFans Investigation Over Age Verification

UK regulator confirms it is investigating whether OnlyFans is doing enough to prevent children accessing…

14 hours ago

Ex Google Staff Fired Over Israel Protest File NLRB Complaint

Dismissed staff file complaint with a US labor board, and allege Google unlawfully terminated their…

15 hours ago

Tesla Axes Entire Supercharger Team, Plus Senior Executives

Elon Musk dismisses two senior Tesla executives, plus the entire division that runs Tesla's Supercharger…

16 hours ago

Microsoft, OpenAI Sued By More Newspaper Publishers

Eight newspaper publishers in the US allege Microsoft and OpenAI used their millions of their…

18 hours ago

Binance’s Changpeng Zhao Sentenced To Four Months In Prison

US judge sentences Binance founder, Changpeng Zhao, to four months in prison for ignoring money…

21 hours ago