Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Microsoft's April Patch Tuesday brings no Pwn2Own fix

In a relatively light month for Patch Tuesday, Microsoft has issued nine bulletins covering 14 vulnerabilities for April

System administrators and IT security pros can take bit of a breather: Microsoft has issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes.

"It's a boring Patch Tuesday this month, and that's an excellent thing for IT security teams because there won't be a mad dog rush to get this month's patches deployed," wrote Andrew Storms, director of security operations for security firm nCircle, in an email statement.

Perhaps the most surprising aspect of this month's issuance of patches was a high profile vulnerability that did not get covered. Many expected Microsoft to fix the Pwn2Own Internet Explorer bug unearthed earlier this year during a hacker contest, but such a fix was not included in this round. "This puts them quite a bit behind other browsers that already patched their Pwn2Own bugs," Storms noted.

Overall, Microsoft issued nine bulletins, covering 14 vulnerabilities. In contrast, the company fixed 20 vulnerabilities in March, and 57 in February.

Two of the bulletins in this month's collection were designated as critical, and the remaining seven were labelled as important. Windows desktop and server editions, Internet Explorer, Microsoft Office, Microsoft SharePoint and Windows Defender all need to be updated.

Security firms did advise updating Internet Explorer with the critical patches Microsoft released this month for the browser, both within the MS13-028 bulletin, affecting all supported versions of Internet Explorer, versions 6 through 10. "Attackers will be looking into how to exploit these two vulnerabilities, since attackers can target multiple versions of Internet Explorer through the use of only a couple vulnerabilities. So it is important to deploy this patch as soon as possible," wrote Marc Maiffret, chief technology officer for security firm BeyondTrust in his own analysis.

The other critical bulletin covered the Microsoft Remote Desktop client, MS13-029. This vulnerability exists in the client's ActiveX control, and could give attackers the ability to execute arbitrary code on the user's machine. Fortunately, this vulnerability is not in the latest version of Microsoft Remote Desktop client, which reduces to a considerable extent the affected number of machines, according to nCircle.

Microsoft is hosting a webcast to address customer questions about this round of patches on April 10.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is Joab_Jackson@idg.com

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Andrew, IDG, Microsoft, nCircle
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: BeyondTrust, security, Microsoft, ncircle, Exploits / vulnerabilities
Latest Blog Posts
Whitepapers
  • Journey to the Future-State framework
    Defining the future role and cataloguing the competencies that would take CIOs there was only the first step. In 2009 Council members pushed for more – they wanted to help the IT profession make the journey from Functional Head (where IT is inevitably viewed as a cost centre) to a Business Strategist (where IT is externally focused and viewed as an organisational ‘game changer’). Although a single prescription for advancing the role is impossible because CIOs circumstances are all different, members wanted a general roadmap and guidelines.
    Learn more »
  • Secure by design - How to dramatically simplify data protection, access control and other critical security tasks
    This white paper examines how you can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
    Learn more »
  • Top 20 Critical Security Controls - Compliance Guide
    Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index


Computerworld
ARN
Techworld
CMO