• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Microsoft Visual and Expression Studio; Patch 'Em If You Have 'Em

March 15, 2012 By Corey Nachreiner

On Tuesday, I sent alerts about Microsoft Patch Day and their more severe Windows bulletins. If you haven’t jumped on those Windows updates yet, I recommend you do so — especially the RDP one. However, Microsoft also released two other less severe bulletins this week, fixing security flaws in Visual Studio and Expression Studio as well. I suspect fewer people use these specialized products. Nonetheless, if you are someone who does, you should definitely apply these patches, too.

I quickly summarize the two remaining March Microsoft bulletins below:

  • MS12-021: Visual Studio Elevation of Privilege Vulnerability

Visual Studio is Microsoft’s popular software development environment. If you have any Windows developers in your organization, you likely have it. Visual Studio suffers from a security issue involving the way it loads add-ins. If an attacker can physically gain access to a computer with Visual Studio, and can place a specially crafted add-in file into a specific directory, she could gain full administrator access to that computer. However, if attackers already have log-in credentials, and access to your computer’s file system, you have bigger fish to fry. This issue primarily poses an insider threat.

 Microsoft rating: Important

  • MS12-022: Expression Design Code Execution Vulnerability

Expression Design is a vector-based graphic illustration program. It suffers from a Dynamic Link Library (DLL) loading class of vulnerability that we’ve described in many previous Microsoft alerts. In a nutshell, this class of flaw involves an attacker enticing one of your users into opening some sort of booby-trapped file from the same location as a specially crafted, malicious DLL file. If you do open the booby-trapped file, it will execute code in the malicious DLL file with your privileges. If you have local administrative privileges, the attacker could exploit this type of issue to gain complete control of your computer. In this particular case, the vulnerability is triggered by .xpr and .DESIGN files for Expression Studio.

Microsoft rating: Important

Though I don’t feel these flaws are as severe as the Windows ones I described earlier this week, they do still pose some risk to users who have these applications. I suggest you patch them at your earliest convenience. — Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Uncategorized Tagged With: Microsoft, Updates and patches, Visual Studio; Expression Studio

Comments

  1. online marketing says

    February 17, 2014 at 1:58 am

    Search ‘public domain articles’ and you will find many sites to choose from.
    Stop reading now, and take the action you
    need to take your business to the next level. Try sending
    out some promotional freebies in your customers’ packages.

    Reply
  2. Latanya says

    February 18, 2014 at 8:05 pm

    Once you have developed your skills and you feel that you can go on,
    you are now ready to embark the career of being an Internet marketing consultant.
    Stop reading now, and take the action you need to take your business to the next
    level. Marketing and advertising and advertising and marketing high
    expense goods and services usually requires a distinct technique than promoting and marketing commodities, and organization to small business
    advertising and marketing is a great deal much more specialized.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use