navigation bar left navigation bar right

Secunia CSI7
navigation left tab About us navigation right tab
navigation left tab Careers navigation right tab
navigation left tab Memberships navigation right tab
navigation left tab Newsroom navigation right tab
navigation left tab Contact us navigation right tab
Blog
News
Articles

Why Microsoft XML Core Services is the most exposed program on private PCs for 11 months running

Get this blog as an RSS Feed
15:15 CET on the 31st October 2013
Entry written by Secunia Research.

The Secunia Country Reports for Q3 2013 have just aired and once again Microsoft XML Core Services (MSXML) 4.x tops the list of “Most Exposed” software among users of the Secunia PSI.
Microsoft XML Core Services has topped the list since December 2012.

There are currently 2 vulnerabilities in Microsoft XML Core Services.
The vulnerabilities affect a large percentage of computer users, as can be seen from the Secunia Country Reports, which describe the state of security on private computers. The reports have the Microsoft program topping the list in 12 different countries.
The data from the US Country Report serves as an example of how widespread the program - and how large the number of users that have not yet patched it - is:

In the US, 79% of PC users who use Secunia PSI had Microsoft XML Core Services installed in Q3 2013. 50 % of these users had not patched the program, even though a patch is available. This means that an estimated 39.5 % of US PCs are made vulnerable by MSXML 4.
And since we can assume that computer users who install the Secunia PSI on their PCs are more security aware than the average user, we suspect that 39.5 % is a conservative number.

So why does a Microsoft program top the list, when Microsoft is known for pushing automatic security updates to its users, thus ensuring that vulnerabilities in Microsoft programs are patched quickly, effectively and automatically?

The reason MSXML is topping the list is because of the way updates for the software are being handled:

Normally, patches for Microsoft products are being offered through Windows Update. But in the case of MSXML, patches are only offered for MSXML Service Pack 3. Since older MSXML Service Packs are considered End-of-Life, users are not being offered patches as they normally would.

This can be remedied by installing the latest service pack for the software, which is also offered to consumers through the Secunia PSI and to businesses through the Secunia CSI.

 
Once the latest service pack is installed, patches will once again be offered correctly through Windows Update.

Stay secure,
Secunia Research

Discuss this blog entry
A new thread in our forum is created. Activate the thread by commenting/discussing below.
Subject: Why Microsoft XML Core Services is the most exposed program on private PCs for 11 months r 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+