Light Start to 2014 Patch Tuesday, from Microsoft Anyway

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Light Start to 2014 Patch Tuesday, from Microsoft Anyway-2 Next

MS14-002 - Important

First on your list of Microsoft priorities should be MS14-002, which is a patch for the elevation of privilege vulnerability discovered in late November with active exploits against Windows XP and Windows Server 2003 users. This bulletin addresses one CVE and has only been seen used in conjunction with a vulnerability in Adobe Reader and Acrobat that was patched in May as part of Adobe Security Bulletin APSB 13-15. This was typically exploited by an attacker sending your user a spear phishing email with a bad Adobe link. Once clicked, that attacker could then gain administrator access to the machine. Keeping your Adobe applications fully patched will mitigate this vulnerability, but it’s important to apply MS14-002 as a defense in depth.

MS14-002 replaces Security Advisory 2914486. This bulletin is only given a severity of “Important“ for a variety of reasons, including the fact that Microsoft will end support for XP in April. If you’re still using XP, this will be an important patch to deploy. And, hopefully, you are working on your platform migration plan.

This month’s Patch Tuesday aligns with Januarys of past … issuing a low number of Microsoft patches and giving IT a reprieve to start the year. We have just four new bulletins this month covering six CVEs. None of the bulletins are rated critical and only one bulletin was known to have active exploits prior to today’s release. According to Russ Ernst, director, product management, Lumension, after you deploy the few needed patches this month, you likely will need to turn your attention to Adobe as well as Oracle’s quarterly security updates, however. They announced that they will release 144 new security vulnerability fixes for hundreds of products.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.