Patch on December 11

Dec 10, 2007 11:45 GMT  ·  By

DirectX 10, the graphics technology exclusive to Windows Vista, has been applauded as an apex of the evolution for Windows' DirectX suite of multimedia application programming interfaces, but a critical security vulnerability in the APIs allows a potential attacker to completely take over the computer. Tomorrow, Microsoft will make available (December 11) a patch for DirectX 10 in both 32-bit and 64-bit versions of Vista, plugging a hole that, in the eventuality of a successful exploit, allows for remote code execution on the affected system.

"As part of our regularly scheduled bulletin release, we're currently planning to release. Six Microsoft Security Bulletins affecting Microsoft Windows with a Maximum Severity rating of Critical. One Microsoft Security Bulletin affecting Internet Explorer with a Maximum Severity rating of Critical. As we do each month, the Microsoft Windows Malicious Software Removal Tool will be updated. Finally, we are planning to release six high-priority, non-security updates on Microsoft Update and one high-priority, non-security update on Windows Update", revealed Bill Sisk, Response Communications Manager, Microsoft.

The DirectX critical vulnerability affects not only v10 of the APIs iteration, but also DirectX 7.0, DirectX 8.1 and DirectX 9.0c. And despite the claims coming from Sisk, Microsoft apparently plans only a total of three security bulletins labeled as Critical, and impacting Windows, DirectX, DirectShow, Windows Media Format Runtime, and Internet Explorer. In addition, the Redmond company will also serve four important security bulletins, all focused on the Windows operating system. As it is the case each month, the information was made public via the Microsoft Security Bulletin Advance Notification for December 2007.

Windows 2000, Windows XP, Windows 2003 and Windows Vista will all receive security patches tomorrow. At this point in time, Microsoft has failed to reveal if the security flaws are actively exploited in the wild, or if proof-of-concept code is available, putting end users at risk. However, the company did indicate that the majority of the vulnerabilities have been privately reported.