I spoke earlier this week with Jerry Bryant, Microsoft group manager of response communications in the trustworthy computing group. Bryant suggested that IT administrators focus on the following updates as being the most significant: an update to the 64-bit edition of winload.exe, back-porting of file validation to Office 2003/2007, and three other specific security bulletins:
Security Advisory 2506014 - Update to 64-bit Winload.exe to Prevent Certain Rootkits: Microsoft has updated winload.exe on 64-bit systems in order to more effectively expose installed rootkits and improve interoperability with third-party anti-malware software, allowing them to more easily detect and elminate rootkits. (Read more in Microsoft Security Advisory 2506014.)
Security Advisory 2501584 - Backporting of Office 2010 File Validation to Office 2003/2007: A successful security feature introduced in Office 2010 -- Office File Validation -- is now being added retroactively to Office 2003 and 2007. Read more details on the Microsoft Office blog or on the relevant Microsoft security advisory page.
Security Bulletin MS11-018 - Cumulate IE 6/7/8 Vulnerabilities Update: Microsoft MSRC tweeted about this update earlier this week, and Bryant added that this vulnerability has come under some limited, targeted attacks. "It's not a widespread attack, but we'd advise everyone to apply this update," Bryant said. This update addresses five IE vulnerabilities, including one that was exploited by a security researcher to defeat Internet Explorer 8 at the recent CanSecWest Pwn2Own contest. Read more about this update on the relevant security bulletin page.
Security Bulletin MS11-019 - Vulnerability in SMB Client: This update resolves a pair of reported vulnerabilities for Microsoft Windows that could allow remote code execution. It impacts most versions of Microsoft Windows from Windows XP SP3 onwards. Read more in the related Microsoft security bulletin.
Security Bulletin MS11-020 - Vulnerability in SMB Server: According to Bryant, this update was the result of private disclosure of the flaw by a third party. It impacts all currently supported version of Windows Server, and Bryant encourage IT administrators to patch this as soon as possible. Read more in the related Microsoft security bulletin.
Have any thoughts on this mother of all patch Tuesdays? Tell me what you think by commenting on this blog post or taking up the discussion on Twitter.
Follow Jeff James on Twitter at @jeffjames3Follow Windows IT Pro on Twitter at @windowsitpro