Well, here we go again! Another “Windows Patch Tuesday” has come and gone (Microsoft sends its Windows updates on the 2nd Tuesday of the month, if you haven’t noticed), and in this month’s batch we have a few interesting ones!
Microsoft has continued to plug holes in its Active Template Library (the coding widgets used by many software developers on the Windows platform), and this month’s updates included 5 separate ATL patches for my Windows XP SP3 machine. Additionally, there were two vulnerabilities fixed in remote service protocols, one in Windows Media handling, and an update for MS Office. Finally, there is an update to the Outlook Junk E-mail filter as well.
Make sure to patch your systems and keep them up to date! Remember, you are never bullet proof, but you can stay a step ahead of the rest by updating frequently!
If you’re interested, here is the list of patches that came through on my system this morning:
- MS09-043: Description of the security update for Office 2003 Web Components and Office XP Web Components in Office 2003: August 11, 2009
- Microsoft Security Bulletin MS09-044 – Critical – Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (970927)
- Microsoft Security Bulletin MS09-042 – Important – Vulnerability in Telnet Could Allow Remote Code Execution (960859)
- Microsoft Security Bulletin MS09-038 – Critical – Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (971557)
- Microsoft Security Bulletin MS09-041 – Important – Vulnerability in Workstation Service Could Allow Elevation of Privilege (971657)
- Microsoft Security Bulletin MS09-037 – Critical – Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution (973908) (5 separate patches in Windows XP SP3)
- Outlook 2007 Junk E-mail Filter update: August 11, 2009
- Extended Protection for authentication
- Windows Malicious Software Removal Tool – August 2009
Late breaking update! As this went to press, I learned that WordPress has also issued a security update this morning, bringing their current version to 2.8.4. Update soon, this one’s a critical risk.