Two of the updates buck the trend, notes security researcher. Microsoft Tuesday delivered six security updates that patched nine vulnerabilities. The patches fix two bugs now being used by hackers but leave one still open to exploit.Of the six bulletins, three patched some part of Windows, while the remainder plugged holes in Publisher, Internet Security and Acceleration Server (ISA), and Microsoft’s virtualization software. Six of the nine bugs were ranked critical, Microsoft’s highest ranking in its four-step score, while three were tagged as “important,” the next-lowest label.“We got what we expected,” said Andrew Storms, director of security operations at nCircle Network Security. “We got the ‘kill bit’ we were looking for in the ActiveX control, and the DirectShow fix,” he said, referring to two recent vulnerabilities that attackers have been exploiting for weeks.In May, Microsoft acknowledged ongoing attacks exploiting a bug in DirectShow, one of the components in Windows’ DirectX graphics platform. Last week, it owned up to a bug in a video streaming ActiveX control used by Internet Explorer (IE), which it had known about — but not fixed — for the past 18 months. Last Thursday, Microsoft had gone into unusual detail to describe the upcoming patches, and promised that both the DirectShow and ActiveX bugs would be patched.Microsoft also delivered patches today for two critical vulnerabilities in a Windows’ font engine, and one important bug each in Publisher 2007, ISA 2006, and the client and server editions of its virtualization software. “MS09-029 and MS09-030 are bucking the trend,” said Storms, talking about two of the six bulletins released today. “Typically, Microsoft’s newer software is more secure, but that’s not the case here.”The fix for the Embedded OpenType (EOT) Engine in MS09-029 is rated critical in all versions of Windows, including Vista and Server 2008, which if not immune from many attacks, are often less threatened by exploits because of additional security measures baked into those operating systems. And the Publisher patch in MS09-030 fixes a file format flaw in the newest 2007 edition.“The fact that we got them both in the same month is probably just a coincidence,” said Storms, “but it doesn’t surprise me that researchers are looking at the newer software, because it’s the newer software that’s being deployed.”Missing from today’s batch was a patch or automated “kill bit” solution for another ActiveX control vulnerability that Microsoft disclosed only yesterday. Web attacks exploiting that bug are rapidly increasing, but Microsoft said Monday that it wouldn’t be able to wrap up a fix in time for today.July’s updates can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through Windows Server Update Services. Related content news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Electronic Health Records Electronic Health Records news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing news New Trojan ZenRAT masquerades as Bitwarden password manager A report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities. By Lucian Constantin Sep 28, 2023 4 mins Cyberattacks Hacking Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe