Last updated at Tue, 25 Jul 2017 20:58:47 GMT

So I know we all were hoping to see a fix for some of this Windows Graphic Rendering Engine nastiness...but no go. For now, you'll need to resort to the good ol' FixIt option or if you wanna get your hands dirty, you can modify the ACL on shimgvw.dll directly.

Either way, if you're running IE, you'll have to patiently wait for the official patch release.

So this monthly release was lean-n-mean, Microsoft released (2) bulletins, addressing (3) vulnerabilities. One of which is pretty hardcore - expect to see active exploitation, while the other takes a lot more finesse for an attacker.


Pure Evil: MS11-002 addresses 2 privately reported vulnerabilities(CVE-2011-0026 & CVE-2011-0027).  Both target the way Microsoft Data Access Components validate memory allocation. Essentially an attacker could provoke a user into going to a website, in which a process to target MDAC can be executed. This would allow the attacker to take control of the target under the user's permissions. With that being said, your standard users are less of a concern. Your CEO that demanded Admin privileges? Well, thats another story =)

Kinda Evil: MS11-001 address a publicly disclosed vulnerability that effects Windows Backup Manager (CVE-2010-3145). So "001" is not just another "Important" patch, it marks a seemingly predictable trend of DLL-loading vulnerabilities. I'm not quite sure what that's all about, but its definitely notable.  So whats "001" all about? In order to exploit this, the user would have to knowingly accept a backup file from a 3rd party or visit an untrusted remote file system. If your users are doing these types of things, a patch is the least of your worries = | The other element that makes this less exposure have less B-A-N-G is that it only affects Windows Vista.

Below is the official breakdown of the January 2011 Patch Tuesday Release:

MS11-002/KB294871 - Critical (Windows XP,Vista,Win7,2003,2008 *Server Core): This  security update resolves two privately reported vulnerabilities in   Microsoft Data Access Components. The vulnerabilities could allow remote   code execution if a user views a specially crafted Web page. An   attacker who successfully exploited this vulnerability could gain the   same user rights as the local user. Users whose accounts are configured   to have fewer user rights on the system could be affected less than   users who operate with administrative user rights. **Patch ASAP**

MS11-001/KB294871 – Important (Windows Vista): This security update resolves a publicly disclosed vulnerability in  Windows Backup Manager. The vulnerability could allow remote code  execution if a user opens a legitimate Windows Backup Manager file that  is located in the same network directory as a specially crafted library  file. For an attack to be successful, a user must visit an untrusted  remote file system location or WebDAV share and open the legitimate file  from that location, which in turn could cause Windows Backup Manager to  load the specially crafted library file.

Until next time...Happy Patching!