Microsoft has released its monthly set of security patches, fixing problems in Windows, Internet Explorer and the SSL software used for secure Web browsing. In total, Microsoft released six sets of patches, called updates, fixing 15 flaws in its products. Four of these updates are rated critical, and administrators should patch them as soon as possible, security experts said Tuesday. Many of the flaws that Microsoft patched on Tuesday can be exploited via the Web—in particular the MS07-033 update, which fixes bugs in Internet Explorer and MS07-031, which addresses a critical flaw in the SSL libraries used by Windows. The SSL flaw is particularly interesting because it affects users who are visiting supposedly trustworthy websites, and because it could also affect non-Microsoft browsers like Firefox and Opera, said Amol Sarwate, manager of Qualys’s vulnerability research lab. “It will affect all the browsers that call the libraries that are in the Windows operating system,” he said. Although Microsoft warned that this flaw could be used by attackers to run unauthorized software on the victim’s computer, this would be hard to do. “Attempts to exploit this vulnerability would most likely result in the Internet Web browser or application exiting,” Microsoft wrote in its MS07-031 bulletin. “The system would not be able to connect to Web sites or resources using SSL … until a restart of the system.” The two other critical updates are MS07-035, which fixes a bug in the core Windows operating system’s Win32 application programming interface, and MS07-034, which fixes bugs in Outlook Express and Windows Mail. Because MS07-035 could be exploited via the Web, it should also be patched as soon as possible, Sarwate said. The other updates released Tuesday fix less critical flaws in Windows Vista and Microsoft’s Visio drawing software. The Vista update is noteworthy because it marks the first time that Microsoft has patched a flaw that was introduced in the Vista operating system, Sarwate said. Previous Vista patches have repaired “legacy” code that was written for earlier versions of Windows, and then reused in Vista. But the MS07-032 update applies to Vista only. This flaw, rated “moderate” by Microsoft, could allow an attacker to gain unauthorized access to information such as administrative passwords stored within Windows.-Robert McMillan, IDG News Service (San Francisco Bureau) Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills IT Skills IT Skills news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe