{"id":15086,"date":"2015-07-30T16:32:55","date_gmt":"2015-07-30T16:32:55","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4305"},"modified":"2019-11-15T07:03:03","modified_gmt":"2019-11-15T12:03:03","slug":"microsoft-updates","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/microsoft-updates\/15086\/","title":{"rendered":"Microsoft goes after the critical flaws and pushes updates the hard way"},"content":{"rendered":"<p>Last week, Microsoft released a critical out-of-band patch for all versions of Windows in order to contain the possible harm from a vulnerability in Windows\u2019 Adobe Typ Manager Library. It was erroneously handling OpenType fonts, which allowed for a remote code execution on the attacked machine.<\/p>\n<p><strong>Fixing the flaws<\/strong><\/p>\n<p>A\u00a0hasty patch release is always somewhat of an eyebrows-raising event: It means that something is so wrong it can\u2019t wait for the next routine patch distribution day (Patch Tuesday, in Microsoft\u2019s case). Microsoft said it had no information of real-world exploitation of MS15-078 vulnerability, although it was known that this bug is already public.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Microsoft goes after the critical flaws out-of-band and pushes updates the hard way<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FWW2u&amp;text=%23Microsoft+goes+after+the+critical+flaws+out-of-band+and+pushes+updates+the+hard+way\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>According to <a href=\"https:\/\/threatpost.com\/microsoft-issues-critical-out-of-band-patch-for-all-versions-of-windows\/113866\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>, \u201cAn attacker could leverage the vulnerability to take complete control of a system \u2013 meaning they could be given the ability to install programs, view, and change or delete data, along with the ability to create new accounts with full user rights.\u201d<\/p>\n<p>This is indeed a critical problem, which required a quick resolution.<\/p>\n<p>In fact, just a week ago there was yet another patch for the Adobe Type Manager Font Driver flaw, \u2013 the already notorious <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-2387\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2015-2387<\/a>. So users who have automatic updates for Windows turned on could have seen \u2013 over the course of a few days \u2013 two notifications in a row, encouraging the users to reboot in order to install the patches.<\/p>\n<p>Both were considered critical, even though the latter was a bit less dire.<\/p>\n<p><strong>Errarum est<\/strong><\/p>\n<p>The fact that Microsoft chose to fix things ASAP is encouraging. The Windows maker is often (historically, even) criticized for the amount of errors and vulnerabilities it has to patch, when, in fact, every software vendor makes mistakes, and the more complex the system is, the more these mistakes are going to happen \u2013 and be found. Both things are inevitable. It\u2019s fine if the white-hats discover the flaw. But the second vulnerability \u2013 CVE-2015-2387 \u2013 appears to be in exploitation for at least some time, keeping a zeroday status. And the circumstances of its discovery were quite displeasing.<\/p>\n<p>But after all the flaws are discovered, the most important thing is how quickly and efficiently they are fixed. Microsoft did handled it in a properly responsive fashion.<\/p>\n<p>Then there\u2019s the end-users\u2019 reaction. The sheer amount of fixes, updates, and patches raining down on them is actually a good thing, even though it may be a bit irritating. Is it a reason to ignore them? By no means. But they are often ignored.<\/p>\n<p><strong>Pushing through<\/strong><\/p>\n<p>In other \u2013 related \u2013 news, Windows 10 was released to general availability just yesterday: for the first time in its lifetime, perhaps, Microsoft actually gave it out to users of genuine copies of eligible editions of Windows 7 or Windows 8.1.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Microsoft is going to play hard with #Windows10 updates. #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FWW2u&amp;text=%23Microsoft+is+going+to+play+hard+with+%23Windows10+updates.+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Among all of its promised security enhancements, Microsoft also said that updates will be performed as a \u201cservice\u201d: Users will receive new features at no charge for the \u201csupported lifetime\u201d of the device it is installed on. The Home and Pro editions automatically receive all non-critical updates as they are released without the possibility of declining them, in addition to automatic driver updates. Pro versions will be able to defer updates for a limited time, but not ignore them completely.<\/p>\n<p>This approach may look a little \u201cinsensitive,\u201d but those often \u2013 and sometimes indefinitely long \u2013 delays with installing the patches create extra risks, which have to be dealt. Microsoft has chosen this certain course of action.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Among all of its promised security enhancements, Microsoft also said that updates will be performed as a &#8220;service&#8221;: Users will receive new features at no charge for the &#8220;supported lifetime&#8221; of the device it is installed on.<\/p>\n","protected":false},"author":209,"featured_media":15617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1343,38,121,113],"class_list":{"0":"post-15086","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-0days","10":"tag-microsoft","11":"tag-updates","12":"tag-windows"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/microsoft-updates\/15086\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/microsoft-updates\/3079\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/microsoft-updates\/15086\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/microsoft-updates\/15086\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/microsoft\/","name":"Microsoft"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15086"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15086\/revisions"}],"predecessor-version":[{"id":30440,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15086\/revisions\/30440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15617"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}