Microsoft is planning to release nine bulletins, three critical, as part of the July edition of its Patch Tuesday monthly update cycle.
One of the three crucial advisories is expected* to offer patches for a serious XML Core Services vulnerability, disclosed but not fixed in June’s Patch Tuesday. This vulnerability has been actively exploited in attacks over recent weeks. The other two crucial bulletins cover unspecified problems in Internet Explorer and Windows.
The remaining six bulletins are rated "important" and grapple with flaws in Windows, Office, Sharepoint and Office for the Mac.
Redmond has also been rolling out an improved version of the Windows Update client over recent weeks, designed to address shortcomings in the patching mechanism abused by the Flame cyber-espionage tool. These improved patching measures will come into play in earnest with next week's update, which is due to arrive on 10 July.
Microsoft's advisory can be found here. Additional commentary from Wolfgang Kandek, CTO at vulnerability scanning firm Qualys, can be found here. ®
Bootnote
* The majority of security watchers expect Redmond to patch the XML flaw next Tuesday but this remains unconfirmed. Paul Henry, security and forensic analyst at Lumension, certainly has his doubts.
"It remains unclear if Microsoft will be issuing a patch this Patch Tuesday for the XML Core Services issue that is currently being actively exploited in IE attacks," Henry writes. "Microsoft normally includes details in their pre-release information if a Day Zero patch is included. However, in the July pre-release, no mention of the issue was included."
Similar topics
Broader topics
Narrower topics
- Authentication
- Azure
- Bing
- Black Hat
- BSoD
- Common Vulnerability Scoring System
- Cybercrime
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- DDoS
- Digital certificate
- Encryption
- Excel
- Exploit
- Firewall
- Hacker
- Hacking
- Identity Theft
- Infosec
- Internet Explorer
- Kenna Security
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- NCSC
- .NET
- Office 365
- Outlook
- Palo Alto Networks
- Password
- Phishing
- Pluton
- Ransomware
- REvil
- SharePoint
- Skype
- Spamming
- Spyware
- SQL Server
- Surveillance
- TLS
- Trojan
- Trusted Platform Module
- Visual Studio
- Visual Studio Code
- Wannacry
- Windows
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows XP
- Xbox
- Xbox 360
- Y2K
- Zero Day Initiative
- Zero trust