After canceling Patch Tuesday for the first time ever, Microsoft releases a Flash patch. Fixes for the 2 vulnerabilities with public exploit code will wait until March. Credit: Magdalena Petrova Microsoft released MS17-005 to patch critical flaws in Adobe Flash Player, but that’s it. Microsoft didn’t release the fix for the two zero-day exploits disclosed this month.After the company said patches would be delayed in February, it clarified that security updates would instead be released on Patch Tuesday in March. Yet InfoWorld’s Woody Leonhard reported that Microsoft emailed its largest customers on Monday with a heads-up about the Flash patches for Internet Explorer and Edge.Don’t expect Microsoft to release any out-of-band patches for the Windows exploit code that’s in the wild, since the email from Microsoft told its big, important customers, “No other security updates are scheduled for release until the next scheduled monthly update release on March 14, 2017.”2 flaws leave Windows users vulnerableWindows users are left vulnerable to two different sets of publicly released exploit code. On February 2, US-CERT released an advisory about a Windows SMB bug. The vulnerability note stated, “Microsoft Windows contains a memory corruption bug in the handling of SMB traffic, which may allow a remote, unauthenticated attacker to cause a denial of service on a vulnerable system.”The bug was discovered by security researcher Laurent Gaffié, aka PythonResponder. Microsoft allegedly had a patch ready to go three months ago, but it kept pushing the fix back. Gaffié told The Register he “submitted the bug to Microsoft on Sept. 25, 2016, and that Microsoft had a patch ready for its December patch cycle. The company pushed the fix back to February, he explained, because it made more sense to them to released several SMB fixes at once rather than a single one in December.”Since Microsoft has previously “sat on vulnerabilities that he’s reported,” Gaffié decided to release proof-of-concept exploit code at the beginning of February. Then Microsoft canceled Patch Tuesday for first time ever.By releasing only a fix for Adobe Flash Player, Microsoft also chose to leave customers vulnerable to the Windows graphic library flaw that was disclosed by Google’s Project Zero team member Mateusz Jurczyk.He first notified Microsoft last year, and the company attempted to resolve the issues with MS16-074, which was released in June 2016. However, Jurczyk discovered Microsoft did not patch all the flaws in the GDI library. An attacker could still steal information from memory, so he notified Microsoft again in November 2016.He wrote, “It is possible to disclose uninitialized or out-of-bounds heap bytes via pixel colors, in Internet Explorer and other GDI clients which allow the extraction of displayed image data back to the attacker.” The pixels “may include sensitive information, such as private user data or information about the virtual address space.”Jurczyk “confirmed that the vulnerability reproduces both locally in Internet Explorer, and remotely in Office Online, via a .docx document containing the specially crafted EMF file.” Per Project Zero’s disclosure policy, 90 days passed and Microsoft failed to patch, so the details of the vulnerability were publicly disclosed.Microsoft has not given any in-depth explanation for what problems caused the February Patch Tuesday delay. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe