SHARE
Facebook X Pinterest WhatsApp

March Patch Tuesday Fixes Yet Another IE Vulnerability

Is it really Patch Tuesday time again already? After the past few months with a high number of patches, March is relatively quiet, with just seven patches – but four of those are critical. Or as the Sophos Naked Security Blog stated it, “drop-everything-and-fix-this-now” critical. The blog also stated this truism: On the surface of […]

Written By
SP
Sue Poremba
Mar 11, 2013

Is it really Patch Tuesday time again already?

After the past few months with a high number of patches, March is relatively quiet, with just seven patches – but four of those are critical. Or as the Sophos Naked Security Blog stated it, “drop-everything-and-fix-this-now” critical. The blog also stated this truism:

On the surface of it, March doesn’t look half as gnarly as the monster-sized 57 updates that Microsoft dumped on our doorsteps in February. But numbers don’t tell the whole story. For every corporation, every patch brings the possibility of conflicts.

Perhaps not surprisingly, one of those critical patches involves IE – and experts are advising that this patch be addressed first. The folks at Trustwave SpiderLabs told me the following in an email:

Bulletin One is Remote Code Execution (RCE), is rated as critical and impacts just about every version of Windows from XP SP3 on up and Internet Explorer 6 through 10.  My guess is this will probably be a use after free vulnerability, we’ve seen a lot of those lately, they impact a lot of stuff and often result in in RCE.

However, this patch warning may be incomplete. Ross Barrett, security manager of security engineering at Rapid7, told me that, in his opinion, it should include IE 10 for Windows 7, unless the fix came when IE10 for Win7 was released recently. In any case, Barrett agrees that this patch needs to be taken care of immediately, no matter what version of IE you are using.

Why is it so important to deal with patches, especially critical patches, as soon as they come out? It isn’t just a matter of protecting the network, but it is an effort to try to keep a half-step ahead of the bad guys. As the Naked Security Blog pointed out, the bad guys are also interested in the newest patches so they can exploit all of these newly announced vulnerabilities. Delaying the patches means the hackers know exactly where they can slip into your network and take over your machines.

That IE has yet another flaw that needs to be patched disturbs me. (That people are still using IE6 is even more disturbing . . .).  I keep hearing that the newer versions of IE are supposed to be more secure, yet, it seems that every month a new hole is found. At this point, it is time to question whether the browser can ever be secure.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.