Patches for Edge, Office, and Windows fix three vulnerabilities Credit: Microsoft Microsoft has released its first batch of patches for this year, and it’s one of the smallest ever for the company, with only three vulnerabilities fixed across its entire product portfolio.The patches are covered in four security bulletins, but one is dedicated to Flash Player, for which Microsoft distributed patches through Windows update.The only security bulletin rated as critical is the one for Microsoft Office and Office Services and Web Apps. It covers a memory corruption vulnerability that can be exploited by tricking users to open specially crafted files and can lead to remote code execution.Another bulletin, for Microsoft’s Edge browser, covers a privilege escalation flaw that can be exploited by tricking users to view a specially crafted web page. The issue exists in the browser’s cross-domain policies and could allow attackers to inject information from one domain into another domain. Microsoft rates this bulletin as important. The third bulletin covers a denial-of-service issue in Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2. The flaw is in the Local Security Authority Subsystem Service (LSASS) that handles authentication requests and can be exploited to reboot the system.The LSASS vulnerability is rated as important, but it has been publicly disclosed before being patched, and a proof-of-concept exploit for it could appear soon. It’s worth noting that this will be the last time Microsoft will arrange information about patches into security bulletins. Starting next month the company will publish vulnerability and patch details on a new portal called the Security Updates Guide that will give users more flexibility in how they search for and view such information.For example, users will be able to sort and filter the data by CVE vulnerability identifier, knowledge base (KB) article number, product, or release date. They will also be able to filter out products that don’t apply to them and access the information through an application programming interface.“This could be the calm before the storm,” said Chris Goettl, product manager at patch management firm Shavlik. “We have not seen this light of a Patch Tuesday since January of 2014. Next month you should expect some adjustments and a heavier Patch Tuesday drop as Microsoft changes methodologies.” Related content feature What should be in a company-wide policy on low-code/no-code development Low-code/no-code development could bridge the gulf of development backlogs that exists between great ideas and great execution of digital innovation. But not without security policies around areas like access control, code quality, and application vi By Ericka Chickowski Dec 06, 2023 15 mins Application Security Application Security Security Practices news analysis Cisco unveils AI-powered assistants to level up security defenses New AI-driven tools aim to simplify and bolster policies, alerts and prevention to reduce complexity when setting security policies and assess traffic without decryption. By Rosalyn Page Dec 05, 2023 5 mins Encryption Cloud Security brandpost Sponsored by Microsoft Security How Microsoft and Amazon are expanding the fight against international tech support fraud By partnering with other companies to share vital information and resources, Microsoft is taking the fight to ever-evolving support fraud in 2024…and beyond. By Microsoft Security Dec 05, 2023 1 min Security news analysis Russia's Fancy Bear launches mass credential collection campaigns The campaigns exploit Outlook and WinRAR flaws to target government, defense, and other entities, and they represent a change of tactic for the APT28 group. By Lucian Constantin Dec 05, 2023 5 mins Advanced Persistent Threats Critical Infrastructure Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe