Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Microsoft's April Patch Tuesday brings no Pwn2Own fix

In a relatively light month for Patch Tuesday, Microsoft has issued nine bulletins covering 14 vulnerabilities for April

System administrators and IT security pros can take bit of a breather: Microsoft has issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes.

"It's a boring Patch Tuesday this month, and that's an excellent thing for IT security teams because there won't be a mad dog rush to get this month's patches deployed," wrote Andrew Storms, director of security operations for security firm nCircle, in an email statement.

Perhaps the most surprising aspect of this month's issuance of patches was a high profile vulnerability that did not get covered. Many expected Microsoft to fix the Pwn2Own Internet Explorer bug unearthed earlier this year during a hacker contest, but such a fix was not included in this round. "This puts them quite a bit behind other browsers that already patched their Pwn2Own bugs," Storms noted.

Overall, Microsoft issued nine bulletins, covering 14 vulnerabilities. In contrast, the company fixed 20 vulnerabilities in March, and 57 in February.

Two of the bulletins in this month's collection were designated as critical, and the remaining seven were labelled as important. Windows desktop and server editions, Internet Explorer, Microsoft Office, Microsoft SharePoint and Windows Defender all need to be updated.

Security firms did advise updating Internet Explorer with the critical patches Microsoft released this month for the browser, both within the MS13-028 bulletin, affecting all supported versions of Internet Explorer, versions 6 through 10. "Attackers will be looking into how to exploit these two vulnerabilities, since attackers can target multiple versions of Internet Explorer through the use of only a couple vulnerabilities. So it is important to deploy this patch as soon as possible," wrote Marc Maiffret, chief technology officer for security firm BeyondTrust in his own analysis.

The other critical bulletin covered the Microsoft Remote Desktop client, MS13-029. This vulnerability exists in the client's ActiveX control, and could give attackers the ability to execute arbitrary code on the user's machine. Fortunately, this vulnerability is not in the latest version of Microsoft Remote Desktop client, which reduces to a considerable extent the affected number of machines, according to nCircle.

Microsoft is hosting a webcast to address customer questions about this round of patches on April 10.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is Joab_Jackson@idg.com

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Andrew, IDG, Microsoft, nCircle
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: BeyondTrust, security, Microsoft, ncircle, Exploits / vulnerabilities
Latest Blog Posts
Whitepapers
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
  • The CIO Paradox
    As there are timeless leadership principles underlying IT value, there are unfortunately also timeless challenges that thwart the IT organisations efforts and make for a rocky path to CIO success. These are the inherent contradictions we call the CIO Paradox.
    Learn more »
  • Top 20 Critical Security Controls - Compliance Guide
    Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO