No Love for IT this Valentine’s Day

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Next No Love for IT this Valentine’s Day-4 Next

MS13-020 is an update in OLE (object linking and embedded) automation. The impact of this bulletin is limited, only affecting XP Service Pack 3. However, this should be a very high priority for XP users because it is a remote code execution issue. Risk is mitigated slightly because authentication is required for execution. The primary vector for attack through this vulnerability would be parsing RTF files in email through OLE automation.

According to Paul Henry, security and forensic analyst at Lumension, it’s going to be a rough Valentine’s Day for many IT admins this month. With ongoing issues with Java and 12 bulletins from Microsoft, including five critical issues and many restarts, it’s going to be a very disruptive Patch Tuesday.

It’s disturbing to note how many different Microsoft platforms are critically affected this month. Everything from Windows XP to the new Windows RT is critically impacted. It’s never a good sign when your current code base is impacted. There are also many more bulletins this month than we’ve seen in the last few months. Henry noted in December that 2012 brought more consistency and stability to Patch Tuesday than we saw in 2011. He hopes that this month is a one-time spike and not a return to the yo-yo pattern of 2011.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.