Microsoft has released its security software patches for April, addressing an unpatched bug in Internet Explorer (IE) that hackers had been exploiting for several weeks.
As expected, the company released five patches - called "updates" in Microsoft parlance - addressing a number of critical vulnerabilities in IE and the Windows operating system.
Microsoft also released an update for Outlook Express, rated "important," and a fix for Windows FrontPage Server Extensions and SharePoint Team Services 2002, rated "moderate."
In Microsoft's rating system, the most serious vulnerabilities are rated "critical," meaning they could allow unauthorised software to be installed without user action. The "critical" designation is followed by "important," and then "moderate" ratings.
The most anticipated of this month's update is the MS06-013 patch, which fixes several IE bugs, including the "create TextRange ()" vulnerability reported last month. Hackers had been exploiting this problem by installing unauthorised software on PCs by tricking users into visiting sites that took advantage of the bug.
The problem was serious enough that security vendors eEye Digital Security and Determina created patches to address it. On Tuesday, eEye said that it had seen more than 156,000 downloads of its software, which Microsoft does not recommend.
Because of this vulnerability, Isabel Maldonado ended up following Microsoft's advice and disabling Active Scripting on the 1,100 workstations she administers at the county attorney's office in Maricopa, Arizona. Her office's support desk ended up fielding about 100 support calls as a result of these changes over the two-week period that the flaw remained unpatched, said Maldonado, a LAN administrator with the county.
Microsoft has said that it tends to avoid releasing early patches - even when they relate to "0day" bugs that hackers are already exploiting - because customers find the regular monthly patch releases far less disruptive.
But Maldonado said she would have been happy to have the TextRange () problem patched earlier. "I would have much rather they'd rushed out a patch," she said. "I can't think of a customer that would say, 'Oh no. Don't send me the patch right now,' if there's a zero day alert."
Security researchers had reported four separate IE vulnerabilities prior to the release of the MS06-13 update, but Microsoft said it has addressed a total of 10 issues - including address spoofing and cross-site scripting vulnerabilities -- with the patch.
The IE update also will include changes to the way that IE handles ActiveX controls, meaning that on some Web sites, users may now have to click through some extra steps when using dynamic content like Flash animation. These changes come as the result of a $521 million judgment against Microsoft in a patent lawsuit brought by Eolas Technologies and the University of California.
Though he does not expect a major malware outbreak following the release of Tuesday's patches, Qualys Product Manager Jonathan Bitle said that hackers are likely to take advantage of some of the new vulnerabilities.
"With so many issues addressed by these patches... we expect that we might see some aftershocks," he said. "These issues could easily be exploited leveraging the naivety of inexperienced users."
On Tuesday, Microsoft also patched a similarly critical vulnerability in the way Windows Explorer handles Component Object Model objects. Attackers could take over a system by tricking users into visiting a Web site that would then connect them to a remote file server. "This remote file server could then cause Windows Explorer to fail in a way that could allow code execution," Microsoft said.
This vulnerability affects all supported versions of Windows, Microsoft said.
The third critical fix in April's updates addresses a vulnerability in an ActiveX control, called RDS.Dataspace, which is distributed with the Microsoft Data Access Components. This software is included with the Windows operating system and is typically used by database software.
The RDS.Dataspace component problem is rated critical for Windows 98, Windows 2000 and Windows XP. It is considered a moderate risk for Windows Server 2003 users.