Patch Tuesday wrap-up, March 2014 – critical fixes from Microsoft and Adobe

leadership team img1

By Michelle Drolet

Founder & CEO

Ms. Drolet is responsible for all aspects of business for Towerwall. She has more than 24 years of,

Read More

by Paul Ducklin on March 12, 2014
We already wrote about Microsoft’s March 2014 patches, noting that, as usually happens, there was an All-Points Bulletin for Internet Explorer coming up.
Microsoft doesn’t call them APBs, of course – they are Cumulative Security Updates, with one bulletin covering all the numerous versions, bitnesses and CPU flavors of Redmond’s IE browser.
What we weren’t able to tell you in advance was whether the widely-publicized (but fortunately not widely-exploited) CVE-2014-0322 hole would be closed.
Good news – the fix made it into this month’s update.
As we mentioned before, there wasn’t actually a terrible urgency for the CVE-2014-0322 fix, because a number of workarounds and mitigations were available.
But a permanent fix is a permanent fix, so apply it as soon as you can, if you haven’t let Windows Update apply it for you already.
Adobe Flash has another critical fix to add to its two recent between-Patch-Tuesday updates.
Flash Player goes to on Windows and Macintosh; Linux users are stuck on an older flavor of version 11 forever, and go to; other users who have stayed with version 11 out of choice or necessity get 11.7.700.272.
Google Chrome, Microsoft IE 10 and Microsoft IE 11 include and manage their own Flash player code – Adobe has confirmed that both Google and Microsoft have published the necessary patches.
The Microsoft flavor of Adobe’s security fix isn’t listed amongst Microsoft’s own Patch Tuesday bulletins, but Microsoft’s updating tools should take care of it for you.
If you prefer the manual approach, KB2938527 has the details and the downloads.
Of course, those are just the top-of-mind patches.
Don’t forget the other four Microsoft bulletins.
We’ve written them up with our assessment of their likely risk, if you like to do a risk/benefit check before you go live with updates, as follows:

Microsoft ID Sophos ID Description and KB number
MS14-013 VET585 Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (2929961)
MS14-014 VET587 Vulnerability in Silverlight Could Allow Security Feature Bypass (2932677)
MS14-015 VET586 Vulnerabilities in Windows Kernel Mode Driver Could Allow Elevation of Privilege (2930275)
MS14-016 VET588 Vulnerability in Security Account Manager Remote (SAMR) Protocol Could Allow Security Feature Bypass (2934418)