Released a little over a month ago, Microsoft's new Edge browser has gotten its first set of critical security patches.
But the fact that Edge had fewer vulnerabilities this month than IE, which had 17, shows that Microsoft's engineering effort in building a more secure browser seems to be paying off, Kandek said.
As part of its monthly round of security fixes, colloquially known as Patch Tuesday, Microsoft released a critical bulletin, MS15-05, with four patches covering vulnerabilities in the Windows 10-only Edge browser.
Overall this month, Microsoft issued 12 bulletins covering 56
vulnerabilities. Five bulletins were deemed as critical, meaning they
should be addressed as soon as possible.
In addition to Edge, this month's patches
cover issues in Internet Explorer, Windows, Office, Exchange, the .Net
framework, the Hyper-V virtual machine, Active Directory, and Skype for
Business.
Microsoft built Edge as the next generation browser for Windows, one designed to replace Internet Explorer over time.
All the Edge vulnerabilities Microsoft disclosed this month were also found in Internet Explorer, which was covered by MS15-094, pointed out Wolfgang Kandek, chief technology officer for IT security firm Qualys.
"Someone could attack you, whether you have either Internet Explorer or Edge, using a specially crafted Web page," Kandek said.
The duplicates show the code overlap between Edge and IE, indicating
that the engineering team developing Edge used at least part of the code
base for IE, Kandek said.But the fact that Edge had fewer vulnerabilities this month than IE, which had 17, shows that Microsoft's engineering effort in building a more secure browser seems to be paying off, Kandek said.
It also shows how difficult it is to write software that is error-free and immune to attackers, he said.
Because Windows 10 hasn't been widely installed in the
enterprise yet, reviewing the Edge bulletin may not be the top priority
on administrators' to-do lists.
Instead, the bulletins that they should take a look at first are MS15-097 and MS15-099,
which describes a number of critical vulnerabilities found in Office
2007 and 2010, advised Amol Sarwate, Qualys director of engineering.
"There are already attacks going on in the wild" that use
these vulnerabilities, Sarwate said. Many are remote code execution
vulnerabilities, meaning the user only needs to open a
maliciously-crafted Excel or Word document, and the code within can
execute actions without the user's knowledge.
Those shops running Microsoft Exchange and Active Directory should also take a close look at MS15-096 and MS15-103, covering Active Directory and Microsoft Exchange, respectively.
The Exchange vulnerability could allow a malicious attacker
to gain entry to a user's files through the Outlook Web Access (OWA)
client.
The Active Directory flaw makes the software vulnerable to a denial of service (DoS) attacks.
Active Directory is typically a critical application for
businesses. It keeps track of all the user accounts, and it is not
usually exposed to the Internet. But the administrator still should
remain diligent in keeping it patched.
"If someone breaks into your network, Active Directory may be the first thing they will try to attack," Sarwate said.
Thus far this year, Microsoft has issued 105 bulletins, and
Qualys estimates that number to hit 145 by the end of the year. This is
up from years past. In 2014, Microsoft issued 106 bulletins and 100 in
2011. (Those issues that Microsoft finds internally are typically not
publicized and instead are patched with routine updates before attackers
find out about them.)
"I don't think software is becoming any more vulnerable,"
Kandek said. Rather a rising number of vulnerabilities stems from more
third party researchers and attackers finding problems, coupled with the
growing numbers of different products, versions and platforms that
products run on.
"It's a good indicator for how important security is becoming," Kandek said.
Post a Comment