Microsoft has released patches for Exchange, SQL Server, and Windows, including a fix for a widespread flaw in DNS Microsoft has patched bugs in its Exchange, SQL Server and Windows software that could give hackers new ways to break into computers.The company released four sets of patches Tuesday, all rated “important.” They address a total of nine bugs in Microsoft’s products.Although Microsoft has not rated any of its patches as critical, they will still keep corporate system administrators busy this week, said Andrew Storms, director of security operations with security vendor nCircle. “Not only will the IT admins have their hands full with the normal client-side updates, but they also need to go patch two of the most important enterprise services in an organization — e-mail and databases,” he said via instant message.Security experts say that the DNS (Domain Name System) bug is particularly worrisome. That’s because the bug is due to a design flaw in the DNS protocol that affects all DNS servers on the Internet. By sending certain types of queries to DNS servers, the attacker could then redirect victims away from a legitimate Web site — say, Bofa.com — to a malicious Web site without the victim realizing it. This type of attack, known as DNS cache poisoning, doesn’t affect only the Web. It could be used to redirect all Internet traffic to the hacker’s servers.The bug could be exploited “like a phishing attack without sending you e-mail,” said Wolfgang Kandek, chief technical officer with Qualys. Other DNS software providers, including the Internet Software Consortium, Cisco and Sun Microsystems are also patching this vulnerability.Although this flaw does affect some home routers and client DNS software, it is mostly an issue for corporate users and ISPs (Internet service providers) that run the DNS servers used by PCs to find their way around the Internet, said Dan Kaminsky, the IOActive security researcher who discovered the problem. “Home users should not panic,” he said in a Tuesday conference call.One of the bugs that Microsoft patched on Tuesday had previously been disclosed, making it a priority fix. That flaw, which lies in the version of Windows Explorer used by Vista and Windows Server 2008, could give criminals a way of running unauthorized software on a Windows PC. For that to happen, the attacker would first have to convince the user to open and save a specially crafted saved-search file using Windows Explorer.Exchange shops that read e-mail via the Web should give the Exchange patch a top priority, Qualys’ Kandek said. That’s because it can be exploited to attack users of Outlook Web Access (OWA) for Microsoft Exchange Server with a cross-scripting attack. By sending maliciously encoded e-mails to OWA users, attackers could theoretically steal e-mail credentials and install malicious software on a victim’s system, he said.Finally, the SQL Server patch fixes four bugs that affect all supported versions of SQL Server. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe