June’s Patch Tuesday is a little heavier than usual with Microsoft, Adobe, and Java all dogpiling on the poor sysadmins. Not only the quantity of the updates are concerning but the severity as well. Microsoft and Java are reporting zero-day attacks for the vulnerabilities they are patching.
Microsoft
Microsoft released seven updates to address 26 flaws in products like IE, Dynamics AX, Lync, and the .NET Framework. Three of those patches were marked critical – following up on the Windows Updates and WSUS patches related to Flame malware last week.
Additionally, a separate security advisory (2719615) was published yesterday regarding Microsoft XML Core Services warning of remote code execution and allowing the remote attacker to assume the same rights as the logged in user. Google discovered the vulnerability being actively exploited in the wild and reported it to Microsoft. There is no patch available for this zero-day though Microsoft does have a FixIt Solution that will disable the vulnerable component. This attack could be used against anybody that uses IE and visits a malicious or infected website. Windows XP through Windows 7 operating systems are reported vulnerable.
Java
Java published updated 6u33 and 7u5 yesterday. Addressing it as a critical patch update, Oracle stresses “the threat posed by a successful attack” and recommends applying the fixes as soon as possible.
Apple, recently afflicted with the flashback malware that took advantage of out-of-date Java on Mac OS X, has also pushed out an updated Java for Mac OS X.
This update configures web browsers to not automatically run Java applets. Re-enable Java applets by clicking the region labeled “Inactive plug-in” on a webpage. If no applets have been run for an extended period of time, the Java web plug-in will deactivate.
This release updates Java SE 6 to version 1.6.0_33.
This release is only for Mac OS X v10.6.8 or later versions of Mac OS X v10.6.
Java for Mac OS X Lion 2012-004
Java for Mac OS X v10.6 Update 9
Adobe
Adobe released a security hotfix for ColdFusion 9.0.1 and earlier versions on Windows, Mac, and Unix.
This update resolves an HTTP response splitting vulnerability in the ColdFusion Component Browser (CVE-2012-2041).
This vulnerability could add or modify additional headers, which might cause unexpected behavior.
Adobe recommends users follow the hotfix instructions in the ColdFusion technote.