Microsoft’s Next Monthly Security Bulletin
In a posting on it’s website yesterday, Microsoft released some details of their next monthly security bulletin.
As part of the monthly security bulletin release cycle, Microsoft provides advance notification to our customers on the number of new security updates being released, the products affected, the aggregate maximum severity and information about detection tools relevant to the update. This is intended to help our customers plan for the deployment of these security updates more effectively.
One update is critical and concerning Microsoft windows, another is an update to the Malicious software removal tool and one non-security high priority update.
They will also be hosting a webcast where they will answer questions about these bulletins. TechNet Webcast: Information about Microsoft’s [MONTH] Security Bulletins (Level 100) on Wednesday, 14 September 11:00 AM (GMT-08:00) Pacific Time (US & Canada). Click here for more info.
On News.com they added this commentary, “Microsoft’s Thursday notice did not specify whether one of the patches will be for Internet Explorer. Over the last few weeks, several security researchers have come forward with flaws in the Web browser. Some of these vulnerabilities could let an attacker gain control of a user’s PC.”
This is one of the big ones they should be updating, along with the Windows operating system updates. With more and more people getting online everyday, there’s more and more potential of them getting loaded up with spyware or adware or viruses and helping spread the problem. The web browser nowadays needs to be rock solid, and with more and more people using Firefox or Opera, we are starting to see exploits and problems with them as well. Like this one concerning Firefox,
“A new, unpatched flaw in that affects all versions of Firefox could let attackers surreptitiously run malicious code on users’ PCs, a security researcher has warned. The security vulnerability is a buffer overflow flaw that “allows for an attacker to remotely execute arbitrary code” on a vulnerable PC, Ferris said. An attacker could host a Web site containing the malicious code to exploit the flaw, he said. Though his proof of concept only crashes Firefox, Ferris claims he has been able to tweak it to run code.”