The second Tuesday of the month has come and gone and with that we have a several patches with which to follow-up. Keep in mind “Super Tuesday” though initiated by Microsoft has also become a popular day for other companies to release their scheduled patches as well. So regardless of your OS of choice please check with your update service for any new items.
Microsoft released three (3) patches this month.
One (1) of the patches is listed as critical and should be applied immediately.
MS11-015 – Critical (high) – Vulnerabilities in Windows Media Could Allow Remote Code Execution (2510030)
MS11-016 – Important (medium) – Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2508062)
MS11-017 – Important (medium) – Vulnerability in Microsoft Groove Could Allow Remote Code Execution (2494047)
Microsoft also released the usual updates and signatures for the
- Anti-Malware definitions for FCS and SE
- Malicious Software Removal Tool
- Outlook / Mail email junk filters
For more information on MS patches see,
Macintosh and Apple Software users
Java for Mac OS X v10.5 Update 9 – ISO Recommended Critical
Java for Mac OS X v10.6 Update 4 – ISO Recommended Critical
iTunes 10.2 – ISO Recommended Critical
The popular distributions all released updates for their respective package repositories
Redhat, Fedora, Ubuntu, Debian, Gentoo, Slackware, Suse, etc.
As always, run your distro / package manager of choice on a regular basis.
Current Distro Releases
More and more of the exploits are targeting web browsers. Regardless of what operating system you are running the web browser is the biggest open door into your system.
All the major browsers released updated and patched versions this month. Take a moment to verify that your browser is up to date.
Current browser versions:
APSB11-01 Adobe Shockwave – ISO Recommended Critical
APSB10-02 Adobe Flash – ISO Recommended Critical
APSB10-03 Adobe Reader and Acrobat – ISO Recommended Critical
APSB10-04 Adobe Coldfusion – ISO Recommended Critical
- – -
Happy patching and we’ll see you next month.
**All UT Arlington Windows based assets should be registered with the UTA domain and should receive critical MS patches automatically via SCCM. If your device is not registered or not receiving patches please contact the OIT HelpDesk at 2-2208.