News

'Important' Fixes To Come in July Patch Cycle

IT pros will come back from the holiday weekend to face a possible four patches in Microsoft's July patch rollout, according to an advance announcement.

IT pros will come back from the holiday weekend to face a possible four patches in Microsoft's July patch rollout, according to an advance announcement issued by the company. The patches, arriving Tuesday, won't contain "critical" or "moderate" items, but all four will be deemed "important."

Microsoft will address a mix of exploit risks with the July patch, including two elevation-of-privilege vulnerabilities, one spoofing security risk and one remote code execution (RCE) exploit. The infamous RCE problem continues to be a concern as the software giant's 2008 hotfix cycle passes its half-way point.

The first important fix addresses an elevation-of-privilege problem in SQL Server. Hackers can gain back-door access into the database and change fields to configure user access parameters, giving themselves superuser or unlimited access to run amok on a network.

In the last week of June, Redmond issued a security advisory pertaining to certain components of SQL Server, citing a recent "escalation in a class of attacks targeting Web sites" and using the database application as an incursion vector. This new SQL patch is far reaching as it touches several releases of the database and server software program, including SQL Server 7.0 Service Pack 4, SQL Server 2000 for Itanium systems and all versions of SQL Server 2005 SP2.

Also included as part of this fix are Microsoft Data Engine 1.0 SP4, SQL Server 2000 Desktop Engine SP4, SQL Server 2005 Express Edition SP2 and SQL Server 2005 Express Edition with Advanced Services SP2.

The SQL patch affects Windows 2000 Service Pack 4 and Windows Server 2003 (SP1 and SP2), including 64-bit editions. Windows Internal Database (WYukon) is also affected as the patch relates to all versions of Windows Server 2008 except for Itanium-processor-based systems.

The second fix blocks potential RCE exploits in all versions of Windows Vista and Windows Server 2008.

The third fix staves off spoofing, which is the act of masking Internet Protocol configurations under false pretenses by faking the sending address of a transmission in order to gain illegal entry into a secure system. The patch affects the client and server side update functions for Windows 2000 SP4, client updates for multiple versions of Windows XP, and client and server update functions in Windows Server 2003. The fix addresses server-side updates for all versions of Windows Server 2008, except for those running on an Itanium system.

The final fix is one that network and systems administrators might note. It involves an elevation-of-privilege attack on Exchange Server, the near ubiquitous software package that supports e-mail, task scheduling, instant messaging and Web traffic flow. A hacker with carte blanche access could shut down Exchange Server, redirecting traffic or stealing large e-mail listserve addresses.

All four fixes will require a restart to implement the patch.

Microsoft's advanced warning is not always the final word on what IT pros can expect to see, but it's a good indicator. Redmond points users to this Knowledgebase article for a list of all Windows Server Update Services and Windows Update upgrades that will come out this month.

Future items will include an update of the dynamic installer function in Internet Explorer, a Windows Mail junk e-mail feature and a nonsecurity update for Windows Server 2008.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

comments powered by Disqus

Featured

  • Creating Business Applications Using Blazor

    Expert Blazor programmer Michael Washington' will present an upcoming developer education session on building high-performance business applications using Blazor, focusing on core concepts, integration with .NET, and best practices for development.

  • GitHub Celebrates Microsoft's 50th by 'Vibe Coding with Copilot'

    GitHub chose Microsoft's 50th anniversary to highlight a bevy of Copilot enhancements that further the practice of "vibe coding," where AI does all the drudgery according to human supervision.

  • AI Coding Assistants Encroach on Copilot's Special GitHub Relationship

    Microsoft had a great thing going when it had GitHub Copilot all to itself in Visual Studio and Visual Studio Code thanks to its ownership of GitHub, but that's eroding.

  • VS Code v1.99 Is All About Copilot Chat AI, Including Agent Mode

    Agent Mode provides an autonomous editing experience where Copilot plans and executes tasks to fulfill requests. It determines relevant files, applies code changes, suggests terminal commands, and iterates to resolve issues, all while keeping users in control to review and confirm actions.

  • Windows Community Toolkit v8.2 Adds Native AOT Support

    Microsoft shipped Windows Community Toolkit v8.2, an incremental update to the open-source collection of helper functions and other resources designed to simplify the development of Windows applications. The main new feature is support for native ahead-of-time (AOT) compilation.

Subscribe on YouTube