This seems to be that the IE vulnerability exploited in the Pwn2Own contest has somehow been exposed to the outside because others cannot discover this vulnerability in the contest: HP TippingPoint, the sponsor of the event. Exam, do not reveal information about the vulnerabilities they have purchased.
Andrew Storms, director of security operations at nCircle Security, said: ' We still see a lot of people finding a gap '.
Another bulletin is also on the top of everyone's list of priorities: MS11-020, which fixes a critical flaw in Windows' SMB (Server Message Block) protocol.
Amol Sarwate, Director of Qualys Inc's Security Research Department, said: ' This is a familiar flaw, something we have seen for a long time. There is no need for any user effects to activate, and once infiltrated inside, a worm using this hole can spread through the entire network . '
Storms, like Sarwate when ranking SMB updates with IE bulletin, indicates that Conficker worm has exploited a serious vulnerability.
Conficker, which began to attack Windows-based computers in November 2008, spread through millions of computers within a few months, and caused a media disturbance in April 2009 when one a large number of computers that received new malware updates, also exploited a SMB vulnerability.
Even when Microsoft rushed to release an emergency patch before Conficker appeared, the worm spread widely and quickly.
Storms said: ' I don't know which version is more important, MS11-018 or MS11-020. However, an SMB error is a kind of vulnerability. It is another Conficker . '
Suppose an attacker could 'implant' malware on the computer - not difficult when people click on the link without noticing - he can use the patched SMB error in MS11-020 to spread the worm. to another computer on the same network.
Storms said: ' We have learned a lot of lessons from Conficker, and recommend that people install this patch immediately '.
MS11-019 , another patch also focused on the SMB protocol, is Bryant's third update to give top priority.
Besides, the company also released patches for Excel, PowerPoint, .Net and many other small parts of Windows.
In the last section, MS11-034 patched 30 vulnerabilities in Windows Kernal device drivers. All 30 patches were reported by Tarjei Mandt, a researcher working for Norman ASA, a Norwegian antivirus company.
Microsoft has also released two security advisory versions, which users can retrieve and install.
According to the researchers, the most remarkable thing about these two versions is that they provide a file authentication security feature, which first appeared in Office 2010 with users using Office 2003 office applications and Office 2007.
In December 2010, Microsoft announced that it could add file validation features to Office 2003 and Office 2007, adding that it could do this earlier this year.
Security patches can be downloaded and installed through Microsoft Update and Windows Update services, as well as through Windows Server Update Services.