Microsoft's February Patch Targets 20 Security Vulnerabilities 
        
        
        
        		Microsoft released  12 security bulletins in its February  security update Tuesday, targeting more than 20 software vulnerabilities.  
The patch contains three bulletins  rated "critical," along with nine considered "important." Remote code execution (RCE) considerations  are addressed in the three critical bulletins. For the important items, there  are two RCE risks and five items with elevation-of-privilege implications. In  the remainder of the slate, Microsoft addressed denial-of-service and information-disclosure  issues. 
Critical Items 
The first critical bulletin comes highly anticipated as it's  for Internet Explorer, affecting IE 6, 7, and 8 on all supported Windows  operating systems. 
"We  finally got our patch for Internet Explorer today in the midst of Microsoft's  12 bulletins; three of which were critical and nine important," said Paul  Henry, security analyst at Lumension. "Nine hundred million people  are now sharing the love for Microsoft after last month, when we waited for the  IE patch that never came." 
According  to Microsoft's  notes about the IE flaw, an attack can be executed when  a specially crafted Web page "opens a legitimate HTML file that  loads a specially crafted library file." 
The second critical item addresses  the publicly disclosed vulnerability in the Windows Shell graphics processor, a  leftover issue from earlier this year that is finally being patched. The patch  touches every supported operating system except for Windows 7 and Window Server 2008. 
The final critical bulletin on tap affects every supported Windows OS  version and involves vulnerability in the Windows OpenType Compact Font  Format driver. 
Important Items 
The first important fix affects Vista, Windows Server 2008 and Windows 7 operating  systems and patches Internet Information Services. 
Important item No. 2 only touches  Windows Server 2003, resolving a publicly disclosed vulnerability in Windows  Active Directory. 
Important bulletin No. 3 provides an  update for Microsoft Office, the Visual Studio development environment and  Visio applications (versions 2002, 2003 and 2007). 
The fourth important item addresses  Windows 7 and Windows Server 2008 operating systems. Microsoft is providing a  patch for vulnerabilities in the JScript and VBScript scripting engines. The  patch protects against specially crafted Web pages that could muck up an Internet  Explorer session. 
Important bulletin No. 5 focuses on  a vulnerability in the Microsoft Windows Client/Server Run-time Subsystem in  Windows XP and Windows Server 2003. 
The sixth important bulletin is a  fix for every supported Windows OS, plus a Windows update. The same scenario  can be expected with important item No. 7. 
Important items No. 8 and No. 9  both address systems running Windows XP and Windows Server 2003. Item No. 8 addresses  domain components and Windows Kerberos, while item No. 9 covers the Local  Security Authority Subsystem Service in Windows XP and Windows Server 2003. 
Security Insanity? 
As usual, many security pros are  talking about what's not in the patch. Such questions seem to come up each month.  For instance, despite the fact that there are 12 fixes in the February security  update, Microsoft still came up short on patching the MHTML issue in Windows/Internet Explorer. 
While there's no patch for the MHTML flaw, Microsoft did release a  workaround in its security advisory 2501696. 
Some security pundits, such as Anup Ghosh, chief scientist and founder of  security shop Invincea, are going out on a limb and  questioning the patch release model more generally. Ghosh labeled the monthly update  routine as a "security insanity cycle." 
"The security  industry today has largely accepted that the standard in network defense is a  wash-rinse-repeat cycle in a never-ending game of whack-a-mole where all  industry interests are aligned in perpetuating the cycle and servicing the  problem, rather than breaking it," Ghosh said in a  blog post. 
Meanwhile for IT administrators expecting to wrestle  with Microsoft's February patch, it's important to know that all security items  may require a restart. IT pros can tap this Knowledge Base article for info on nonsecurity  updates distributed through Windows Server Update Services, Windows Update, and  Microsoft Update. 
        
        
        
        
        
        
        
        
        
        
        
        
            
        
        
                
                    About the Author
                    
                
                    
                    Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.