Microsoft released ten security advisories yesterday to address at least 31 vulnerability issues in its various Windows operating system (OS) versions and other software. This broke the company’s December 2008 record of releasing patches for 28 vulnerabilities. Six of the said vulnerabilities were categorized as critical, three were important, and one was moderate. This means that attackers can exploit these flaws to remotely execute malicious codes in vulnerable systems.
The following list summarizes the above-mentioned vulnerabilities Microsoft OS and software users should patch:
- (MS09-018) Vulnerabilities in Active Directory Could Allow Remote Code Execution (971055)
- (MS09-019) Cumulative Security Update for Internet Explorer (969897)
- (MS09-020) Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege (970483)
- (MS09-021) Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (969462)
- (MS09-022) Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution (961501)
- (MS09-023) Vulnerability in Windows Search Could Allow Information Disclosure (963093)
- (MS09-024) Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution (957632)
- (MS09-025) Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537)
- (MS09-026) Vulnerability in RPC Could Allow Elevation of Privilege (970238)
- (MS09-027) Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (969514)
The most noteworthy of the above-mentioned vulnerabilities is a flaw in Internet Explorer (IE), particularly in version 8, which was first exploited in a hacking competition held earlier in March. Microsoft also released an update that repairs at least seven bugs in Office Excel. It also shipped a single patch to fix around 16 security issues in various versions of PowerPoint.
Adobe also released its first-ever quarterly patch for its Reader and Acrobat product lines the same day Microsoft did. Adobe categorized its release as critical and recommends that users apply the update for their product installations. The updated patched up holes which could cause the applications to crash and potentially allow an attacker to take control of an affected system.
To avoid becoming the victims of these vulnerabilities, users are advised to download the latest security updates from the Microsoft and Adobe websites using the links in this blog entry.