Skip to content

Microsoft's October 2014 Patch Tuesday: Urgent Fixes for Actively Exploited Vulnerabilities

Microsoft rushes to fix actively exploited vulnerabilities. System administrators and users urged to apply patches promptly.

This is a picture of a screen , where there are some icons , and there is a popup message on it.
This is a picture of a screen , where there are some icons , and there is a popup message on it.

Microsoft's October 2014 Patch Tuesday: Urgent Fixes for Actively Exploited Vulnerabilities

Microsoft's October 2014 Patch Tuesday focuses on desktop software, addressing several critical vulnerabilities, some of which are actively exploited. This includes the 'Sandworm' 0-day vulnerability and multiple remote code execution (RCE) issues.

The 'Sandworm' campaign, observed by iSight Partners (now part of FireEye), exploited a 0-day Windows vulnerability (CVE-2014-4114) in the summer of 2014. This allowed attackers to execute arbitrary code by opening a specially crafted file. The campaign primarily targeted devices in Ukraine and other countries, linked to the Russian cyber-group 'Sandworm Team'. Microsoft addresses this vulnerability in MS14-060.

Five out of eight bulletins allow for RCE attacks, a higher number than usual. MS14-058, MS14-056, and MS14-061 are among these, with MS14-061 fixing a Word vulnerability. MS14-057 has a critical URI parsing underflow vulnerability affecting certain Asian Unicode characters. Adobe's Flash update (APSB14-22) addresses three RCE vulnerabilities.

Oracle's Java update addresses 25 CVEs, 22 of which are usable for RCE. System administrators are advised to prioritize these updates due to the high number of critical issues and active exploits. Users should apply these patches promptly to protect against potential security threats.

Read also:

Latest