Microsoft Issues 'Zero-Day' XML Core Patch, 5 Others

As expected, Microsoft today issued six patches for a variety of security issues,including an XML vulnerability considered to be "zero day."

According to Microsoft, this flaw (MS06-071), rated critical, could allow remote code to infect a user's machine if they visit a Web site with the attack code. According to an earlier security advisory, those using Windows Server 2003 SP1 with default settings and using Enhanced Security Configuration are not vulnerable.

According to Microsoft's Security Response Center blog, unlike today's other patches, the company was unable to distribute this one through SUS 1.0. "The update is available through all other channels, and Software Update Services customers can obtain this update directly from the Download Center or through WSUS," wrote Mike Reavey. "We are working to make this update available through SUS as quickly as possible and expect to release it with the next SUS 1.0 update."

This month's other patches are available through SUS 1.0, as well as all other distribution channels. They are:

  • MS06-066, Important: Fixes two problems relating to NetWare and Microsoft Client Services.
  • MS06-067, Critical: Described by Microsoft as a "Cumulative Security Update for Internet Explorer," fixes several problems relating to Windows and IE 5.01 and 6.
  • MS06-068, Critical: Relates to a flaw in Microsoft Agent Memory Corruption in various versions of Windows.
  • MS06-069, Critical: Deals with issues with Windows XP and Macromedia Flash Player.
  • MS06-070, Critical: Fixes a Workstation Service Memory Corruption vulnerability found in Windows 2000 SP4 and Windows XP SP2.

The company did not patch another flaw relating to Visual Studio that's also reported to be "zero day," meaning that active code exploiting the flaw has been found.

To view the official announcement regarding this month's release, go here.

About the Author

Becky Nagel is a contributor to Application Development Trends. She is the editor of ADT's sister sites, and, and is co-editor of You can contact her at [email protected].