Microsoft will deliver 10 security updates next week to patch serious bugs in Windows, Internet Explorer (IE), Word and Excel.
If the company follows through on its plans -- sometimes Microsoft ditches an update at the last minute -- next week's Patch Tuesday will be the largest since October 2008.
"We're back to a normal load," said Andrew Storms, director of security operations at nCircle Network Security. "Some may think of it as pretty big, but really, for anyone who's dealt with Patch Tuesday for the last five years, it's what we should be expecting."
Last month, Microsoft issued just one security update, a 14-patch fix for PowerPoint.
Of the 10 updates Microsoft announced in its monthly advance notification, six will affect Windows, and one each will patch problems in Internet Explorer (IE), Word, Excel and Microsoft Office. Six of the 10 were marked "critical," the Microsoft highest threat ranking, while three were judged "moderate" and one as "important."
The six critical updates will patch Windows (two updates), IE, Word, Excel and Office.
"The red flag is going to be [the] IE [update]." said Storms. "It's critical, it's on all versions [of Windows], and it's even critical in Vista for IE7 and IE8."
IE8, which was released in March, is Microsoft's most secure browser yet. Tuesday's update will provide the first-ever production patches for IE8.
Storms also pointed out that it looks like Microsoft won't protect Mac users this month. "We don't have the PowerPoint for the Mac patches," he said after reviewing the advance notice. Last month, Microsoft took the unusual step of patching the Windows versions of PowerPoint, but not the Mac editions, saying that it didn't want to postpone the update to await Mac fixes.
Attackers had been exploiting the PowerPoint bug in Windows since at least early April. "[But] none of the exploit samples we have analysed will reliably exploit the Mac version, so we didn't want to hold the Windows security update while we wait for Mac packages," Jonathan Ness, an engineer at the Microsoft Security Response Centre, explained last month.
Some criticised Microsoft's decision. Swa Frantzen, an analyst at SANS Institute's Internet Storm Centre (ISC), said Microsoft was breaking its own rules about "responsible disclosure" by letting the Mac patches slide. "We all know from past experience [that] the reverse engineering of patches back into exploits starts at the time -- if not before -- the patches are released," said Frantzen four weeks ago. "So in the end, Microsoft just released what hackers need to attack."
Other recently-acknowledged bugs may or may not get fixed next week, said Storms. He was pessimistic about Microsoft patching a problem in DirectX that the company confirmed only last week; the bug is actively being exploited by hackers, according to Microsoft. None of the updates' revealed today seemed to fit the affected software profile of the DirectX vulnerability, Storms said.
But another outstanding advisory, which Microsoft reported two weeks ago and which involved its Internet Information Services (IIS) Web-server software, may get patched.
"It's not called out as IIS, so it's hard to say if it will be patched, but I could see them putting it under one of the [six] Windows updates," said Storms. Microsoft has downplayed the IIS bug, which could be used by criminals to steal data from Web servers, because only some configurations are at risk.
IT administrators won't really know the extent of next week’s patching job until the total CVE (Common Vulnerabilities and Exposure) count is revealed Tuesday, Storms argued.
Microsoft often bundles multiple patches -- each identified by a specific CVE number assigned to the flaw that it fixes -- in each update. "The workload will depend on the CVE count out of this," said Storms. "We may get 60, or we may get 20."
While the CVE count doesn't affect the testing companies do on Microsoft's security updates, it can affect the amount of work if, as is often the case, an organisation is unable to patch immediately and so implements the workarounds that Microsoft recommends.
In its update bulletins, Microsoft lists separate workarounds for each CVE; in other words, if an update includes five patches for five CVEs, it could list five different workarounds.
"So it could go either way next week," said Storms. "But it's going to be an all-eyes forward on the IE update. That's the red flag for June."