Microsoft fixes critical Windows, IE flaws for Patch Tuesday
Summary: Updates, ahoy. Get a strong pot of coffee on the go, Patch Tuesday is on deck for another month. Microsoft has released patches for seven security vulnerabilities, four of them considered 'critical'.
Microsoft has released four critical security updates for Windows and Internet Explorer, along with a bevy of other products, in order to protect against at least 19 vulnerabilities identified in its software.

On deck this month, there are four "critical" vulnerabilities that affect Windows, Internet Explorer, Office, and Windows Server, including one for Silverlight that affects both Windows and Mac machines.
Critical updates are reserved for security flaws that could compromise the security of a device or system data, while important updates are reserved for those that could lead to an increased scope of attack by malware or hackers, such as an elevation of user privileges to allow hackers to access system files under administrative reach.
First and foremost, Microsoft has fixed a nine vulnerabilities in MS13-021 — eight privately disclosed flaws and one that was disclosed publicly — in which the web browser was at risk of being attacked by a flaw being actively exploited in the wild for around one month.
The most severe Internet Explorer flaw affected all versions of Windows XP (Service Pack 3) and above, including Vista, Windows 7, and Windows 8 — including tablets running Windows RT — running Internet Explorer 6 and above. The flaw could have allowed a hacker to access the vulnerable system with the same user rights. Those running as "users" rather than "administrators" were less at risk from having system files or documents affected.
Other critical vulnerabilities include MS13-022, which patches three flaws in Silverlight that could allow a hacker to gain access and take over a Windows-based or OS X-based machine.
Meanwhile, MS13-023 affects Office, specifically Visio, that could allow remote code execution if a malware-ridden Visio file was opened on a vulnerable machine. MS13-024 affects Windows Server-based systems running SharePoint, in which an attacker could plant malicious code in a search query, commonly known as an XSS vulnerability. This would have given hackers full administrator rights over the affected system.
The other vulnerabilities rated as "important" could allow data and information disclosure, or an elevation of privileges on affected machines. These affect SharePoint, OneNote, Outlook for Mac, and kernel-mode drivers in Windows-based machines.
On Microsoft's Security blog, Dustin Childs explained that the software giant has taken a "recent shift" in its approach towards application updates on the Windows Store, such as those that are available for Windows 8 and Windows RT-based machines.
"In the end, our decision provides customers easy access to needed security updates in a timely manner without sacrificing transparency."
In a separate post, Microsoft's Security Response Center's Mike Reavey said that the company will "deliver high-quality security updates for Windows Store apps as they become available. Providing security updates to Windows Store apps more frequently will allow us to add new functionality, fix issues and improve security".
"To ensure transparency, we will document all security updates for Windows Store apps in a security advisory, which we will revise with each new security update release. The security update process itself will be identical to that of any other Windows Store app update — customers will simply click on the store tile and select the update," he noted.
Today's Patch Tuesday updates are available on the usual channels, such as Windows and Microsoft Update, or through Windows Server Update Services.
The next round of monthly updates will arrive on April 9.
Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.


Talkback
more details
I run all my user accounts on Windows...
It's easy: Any user I support must run as a standard user...
Amazingly
I'' stick with superior software, no thank's Windows
All the lame excuses and convoluted reasoning in the world - of Windows dominant market share and anecdotal stories of personal satisfaction won't compensate for fact that only Windows needs the plethora of anti-everything utility software that still does not work properly.
I'll stick with Mac OSX and Gentoo Linux for far superior reliability, security and performance.
This is what Apple users actually believe
I guess you didn't get the info on the biggest virus
IE10 for Win7 via MS Update now
IE 10 for Windows 7 is NOT affected
re: Note that IE 10 for Windows 7 is NOT affected.
http://en.wikipedia.org/wiki/Pwn2Own#Contest_2013
--dick
Also note..
http://failover.washingtonpost.com/business/technology/fail-chrome-firefox-and-ie-all-crack-during-hacking-competition/2013/03/08/b58eed8e-8783-11e2-a80b-3edc779b676f_story.html
But, by all means...
Could you explain this sentence a bit better?
First off, that is not proper English. Is that nine vulnerabilities addressed in one update? Second, if I only have one OS, is that not just one vulnerability addressed, thus dividing your assertion by 9? I would hope you hold to some credible journalistic standards to not use this number as some form of multiplier for one vulnerability.
And the beat goes on !!!!!
By the way
I Love It
i get to email all my other retired buddies and we party while updating all the time.
I know ehhh Get a Life ! LOL
12 years
Never and I guarantee it
Another good example is Hosted Exchange, where we are now waiting to launch 2013 because MS are (we hope soon) launching what is essentially a service pack but not? so users can be migrated between 2010 and 2013 over the same domain. You would have thought something such as a migration path was the first thing on the drawing board?
Enough anecdotal personal Windows sales pitches
Three perfect examples:
Netflix chose FreeBSD as best OS infrastructure for their Network appliances to stream "millions" of movies daily to customers through Internet Service Providers (ISP). While Linux was just as robust, it's networking stack was not quite as fast or as flexible.
Even after many months of testing, Windows totally failed evaluations with poor reliability and unacceptable security, and particularly terrible scalability.
Windows Security Essentials - an integral part of Windows 7/Windows 8 recently "twice" failed critical security tests in a European testing lab.
Wiindows Server 2012 was seccessfully hacked at the CanSecWest security technology event recently in British Columbia, Canada. Several "participating" security professionals posited that the problem in OS may not be fixable.
Address these "real world" issues of Windows reliability and security, as opposed to publishing endless personal Windows promotional stories that have no industry technical evaluations or test cases to support your experiences.
Maybe you windows guys/gals know more than almost 90% of all the top technology Universities, companies and organization in the world!!!
I agree with the Linux comments.