News

Microsoft Issues 3 Patches, 1 Fixes Critical SQL Flaw

Microsoft Corp. released three security bulletins late Wednesday, including one with a patch for a critical flaw in its SQL Server database. The other two bulletins included patches for moderate threats to the Windows XP Help and Support Center and to a seldom-used feature of Word and Excel.

The flurry of security bulletins takes Microsoft to 61 bulletins so far in 2002, one more than the software giant issued for all of 2001. However, Microsoft is not close to issuing as many bulletins as it did in 2000, when the company put out 100 alerts.

The SQL Server flaw rates a "critical" designation on Microsoft's threat scale because it carries the possibility of an attacker elevating his privileges on a system. Both SQL Server 7.0 and SQL Server 2000 are vulnerable. To exploit the flaw, an attacker must be able to authenticate to the SQL Server and the server has to use a feature known as Web tasks.

More information on the vulnerability is available here.

Security Bulletin MS02-061 is the second major security bulletin for SQL Server this month and the fourth in the last four months.

Microsoft posted a patch for Windows XP Help and Support Center on Wednesday for a vulnerability that could allow an attacker to delete files on a user's system. The vulnerability is of the class that requires a user to open an HTML mail from an attacker or visit the attacker's Web site to exploit. More information on the vulnerability can be found here.

In another case of a seldom-used, whiz-bang feature turning out to be a vulnerability, Microsoft posted a bulletin for a problem with Word fields and Excel external updates. Both allow data from one document to be inserted to another document. Such features are a staple of Microsoft demos, where back-end databases constantly feed the latest corporate data into end user documents.

Turns out attackers can use the normally hidden fields to steal files from a user without the user's knowledge. The attacker would have to know the exact filename and entice the user to open the document, save it and return it to the attacker. Such an attack would leave an audit trail, if the victim ever became aware of it.

More information on the vulnerability can be found here.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Offers More Help on Windows Server 2008 Upgrades

    Microsoft this week published additional help resources for organizations stuck on Windows Server 2008, which fell out of support on Jan. 14.

  • Microsoft Ups Its Carbon Reduction Goals

    Microsoft on Thursday announced a corporatewide carbon reduction effort that aims to make the company "carbon negative" by 2030.

  • How To Dynamically Lock Down an Unattended Windows 10 PC

    One of the biggest security risks in any organization happens when a user walks away from their PC without logging out. Microsoft has the solution (and it's not a password-protected screensaver).

  • First Stable Chromium-Based Microsoft Edge Browser Released

    Microsoft on Wednesday announced the first release of its Chromium-based Microsoft Edge browser at the "stable" commercial-release stage.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.