Most of the software patches issued by Microsoft yesterday should not affect stable systems.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The 11 remaining patches did not produce any significant errors, according to ChangeBase. The Aok Application Compatibility Lab suite tests the patches against 2,000 applications.
Security firm Symantec strongly encouraged users to patch their systems against all the vulnerabilities covered by the latest Patch Tuesday update.
"The SMB Server pathname overflow vulnerability tops my list this month," said Joshua Talbot, security intelligence manager, Symantec Security Response. "Server-side vulnerabilities are not too common anymore, but they are a golden goose for attackers when they are discovered. With this one, if an attacker can find a vulnerable remote server that has a guest account set up, just like that, they have got access to the machine and possibly the entire local network - all without any user involvement required.
"The TCP/IP router advertisement vulnerability is also a biggie. It too is a server-side remote code execution issue and the scary thing is that this affects everyone running one of the effected systems; whereas the SMB issue only affects users with an SMB server. To make matters worse, by default, the Windows firewall does not protect against this, and again, no user interaction is required for exploitation."