{"id":978,"date":"2013-03-10T00:00:00","date_gmt":"2013-03-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/10\/microsoft-patch-tuesday-targets-internet-explorer-drive-by-attacks-sharepoint-microsoft-security\/"},"modified":"2021-12-30T11:38:31","modified_gmt":"2021-12-30T11:38:31","slug":"microsoft-patch-tuesday-targets-internet-explorer-drive-by-attacks-sharepoint-microsoft-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/10\/microsoft-patch-tuesday-targets-internet-explorer-drive-by-attacks-sharepoint-microsoft-security\/","title":{"rendered":"Microsoft Patch Tuesday targets Internet Explorer drive-by attacks &#8211; Sharepoint, Microsoft, security"},"content":{"rendered":"<p>Internet Explorer vulnerabilities warrant notice in this month&#8217;s set of Microsoft Patch Tuesday bulletins and need to be fixed quickly even though the sheer number of patches may seem daunting. Not patching them because they are time-consuming will just widen the window of opportunity hackers have to exploit them, says Alex Horan, a senior product manager at CORE Security. &#8220;Preventing future drive-by style attacks and protecting end-users appear to be the theme of this month&#8217;s Patch Tuesday,&#8221; Horan says.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It fixes critical vulnerabilities that could be used for machine takeover in all versions of Internet Explorer from 6 to 10, on all platforms including Windows 8 and Windows RT,&#8221; says Qualys CTO Wolfgang Kandek.<\/p>\n<p>It affects Silverlight whether deployed on Windows or Mac OS X operating systems, where it is used to run media applications such as Netflix, Kandek says.<\/p>\n<p>&#8220;It is puzzling to see such a high rating for this software that typically requires opening of an infected file in order for the attack to work.   It will be interesting to see the attack vector for this vulnerability that warrants the &#8216;critical&#8217; rating,&#8221; he says.<\/p>\n<p>Three of the bulletins are rated important and include two that could allow data to leak and one that could allow attackers to elevate privileges on an exploited machine.   Important bulletins include vulnerabilities that could lead to compromised confidentiality, integrity or availability of user data, or of the integrity or availability of processing resources, Microsoft says. <\/p>\n<p>Link: http:\/\/www.arnnet.com.au\/article\/455814\/microsoft_patch_tuesday_targets_internet_explorer_drive-by_attacks\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-978","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=978"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/978\/revisions"}],"predecessor-version":[{"id":3465,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/978\/revisions\/3465"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}