Microsoft releases patch for the Duqu flaw from

Microsoft has at his updateronde Tuesday released a patch for the vulnerability that the trojan Duqu in diffusion are used. The patch for ssl – and tls-bug was, however, at the last moment withdrawn.

The patch the Duqu-hole must be sealed is one of the three critical updates-Microsoft on Tuesday as part of his monthly patchronde released. In total, Microsoft releases 13 security updates, which together 19 vulnerabilities in Windows, Internet Explorer, Microsoft Office, and Windows Media Player should be sealed.

Duqu was to be spread using a vulnerability in the parsing engine for TrueType fonts. Microsoft has the patch been released as a critical update, although Duqu is on a limited number of goals focused. Duqu spread via malicious Word documents as e-mail attachment sent. In Security Bulletin MS11-087 Microsoft describes, however, that the TrueType Font-parsing vulnerability also be misused by a user to a rogue website to lure. The software company gave at the beginning of november already a security advisory for the vulnerability.

Initial wanted Microsoft to a error in ssl 3.0 and tls 1.0 undo, but this patch at the last moment withdrawn. Security researchers showed in september that the security protocols to work were by cookies to intercept and decrypt them with a tool called Browser Exploit Against SSL/TLS, or simply BEAST.

“The bullletin for Security Advisory 2588513 is postponed due to compatibility issues with an application from a third party with whom we directly work together to solve the problem,” said Jerry Bryant of Microsoft’s Trustworthy Computing team at Computerworld. It would go to SAP software.


Posted

in

by

Tags: