Most of the software patches issued by Microsoft yesterday should not affect stable systems.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The 11 remaining patches did not produce any significant errors, according to ChangeBase. The Aok Application Compatibility Lab suite tests the patches against 2,000 applications.
Security firm Symantec strongly encouraged users to patch their systems against all the vulnerabilities covered by the latest Patch Tuesday update.
"The SMB Server pathname overflow vulnerability tops my list this month," said Joshua Talbot, security intelligence manager, Symantec Security Response. "Server-side vulnerabilities are not too common anymore, but they are a golden goose for attackers when they are discovered. With this one, if an attacker can find a vulnerable remote server that has a guest account set up, just like that, they have got access to the machine and possibly the entire local network - all without any user involvement required.
"The TCP/IP router advertisement vulnerability is also a biggie. It too is a server-side remote code execution issue and the scary thing is that this affects everyone running one of the effected systems; whereas the SMB issue only affects users with an SMB server. To make matters worse, by default, the Windows firewall does not protect against this, and again, no user interaction is required for exploitation."