News Stay informed about the latest enterprise technology news and product updates.

Microsoft delivers 12 fixes for December Patch Tuesday

Microsoft ended the security cycle of 2015 by releasing eight critical bulletins, including details on a font exploit.

For December's Patch Tuesday, Microsoft closed out 2015 by releasing 12 security bulletins, with eight marked critical,...

including a graphics-system exploit that affects all supported versions of Windows, Skype for Business and several other Microsoft products.

Microsoft issued a critical patch for bulletin MS15-128 to plug a security hole in the Windows graphics system, specifically a vulnerability with font handling. This affects all versions of Windows, the .NET framework, Microsoft Office 2007 and 2010, Skype for Business, Microsoft Lync and Silverlight.

A hacker can run a remote code execution attack via these products if a user goes to a website or opens a document from an email that contains specially crafted embedded fonts.

"This is a familiar type of patch that involves fonts," said Amol Sarwate, director of engineering for security vendor Qualys Inc., in Redwood City, Calif. "If an attacker hosts a malicious site with these fonts, and if a user visits the page, their system could be compromised."

"These types of font vulnerabilities are rated critical and the patches for them should be applied quickly, because it's very difficult to control which websites users will visit."

Shutting down a zero-day exploit

While marked important, security analysts said bulletin MS15-135 should be one of the first patches applied by IT shops, because it concerns a zero-day vulnerability in the kernel of several Windows operating systems.

"These are very important to address quickly," said Wolfgang Kandek, CTO at Qualys. "Many times, these patches are coming out to address attacks that are being used in the wild."

Public DNS servers at risk

Another critical bulletin, numbered MS15-127, affects organizations that have a Microsoft domain name system (DNS) server running on Windows Server 2008 and 2008 R2, Windows Server 2012 and 2012 R2, and Server Core that can be accessed publicly. In this vulnerability, an attacker can send a malicious packet to the DNS server and gain control of the server.

"If an attacker takes over the DNS server, then they can direct users to a different server that contains malicious code," Sarwate said. "A lot of times, these DNS servers are internal and are not exposed to the Internet, so they could be patched at a later date if other patches have greater priority."

More Web-related vulnerabilities

Two critical security bulletins, MS15-124 and MS15-125, deal with vulnerabilities in the Internet Explorer and Microsoft Edge browsers, respectively. To date, the Edge browser has had just five bulletins issued since it became widely available following the July 29 release of Windows 10.

Also related to browsing, critical bulletin MS15-126 handles 30 issues affecting the JavaScript libraries in Vista and Windows Server 2008.

Silverlight and more font issues

Critical bulletin MS15-129 deals with the remote code execution vulnerabilities in Microsoft Silverlight, which affects users on Mac and Windows systems who browse sites with specially crafted content.

The final critical bulletin, MS15-130, refers to font vulnerabilities in Windows 7 and Windows Server 2008 R2, which could allow an attack if a user opened a particular document or went to a malicious website.

A fast, but measured approach

Microsoft had to reissue a patch from November to address problems reported by some users running Outlook 2010 and 2013. Certain emails would cause Outlook to crash on Windows 7 systems after the initial patch for MS15-115 was applied to the machines.

"While it is best for administrators to roll out patches as quickly as possible, it is best to do it in a well-structured manner," Kandek said.

He explained some IT shops roll out patches to 1% of an organization's users and to a diverse cross-section of machines running on different systems in different locations to see if there are any issues with a patch. If there are no problems reported, then administrators continue the patching process by updating 10% of the machines on the second day, while continuing to monitor the results.

"By the third or fourth day, the patch should be rolled out to everyone else," Kandek said. "You certainly shouldn't wait longer than a week to get these patches installed."

More detailed information on these and the remaining bulletins can be found on the Microsoft Security Advisories and Bulletins site.

Next Steps

Light month for Microsoft patches in October

The difference between Windows patch management tools

Understanding the evolution of Patch Tuesday

Dig Deeper on Microsoft SharePoint Implementation

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Which bulletins in December's Patch Tuesday concern you the most and why?
Cancel
I wonder if there is any other product in any other industry that could be so faulty from the day of its release, constantly in need of repairs, so prone to intrusion and outside manipulation....?

"Yes, but an OS is so complicated" is not a very good answer. So are passenger jets and yet they rarely crash (on their own) and have never had their operating systems hacked.
Cancel

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchEnterpriseDesktop

SearchVirtualDesktop

Close