Skip to main content
  1. Home
  2. Computing
  3. Legacy Archives

January Patch Tuesday mends eight important and critical Windows security defects

Add as a preferred source on Google

After pushing back on Google for the search giant’s reveal of a major Windows 8.1 security vulnerability before a patch could be issued, Microsoft has delivered on its promise, and ultimately fixed the bug.

As part of a long-established tradition unofficially dubbed Patch Tuesday, this month’s second Tuesday saw no less than eight updates deployed in total to amend glitches rated important or critical. Interestingly, none of these address Internet Explorer defects, which may well be a first for the routine patch program.

Recommended Videos

That could be interpreted as good news by enduring IE fans, suggesting a certain level of stability has been reached at last after years of struggles. Or the exact opposite, with Redmond perhaps ready to throw in the towel and concentrate squarely on Spartan.

Still, no matter how you look at it, eight new Windows vulnerabilities are eight too many. The most serious is a critical issue in the Telnet service affecting systems running Vista, 7, 8 and 8.1, plus Windows Server 2003, 2008 and 2012.

Telnet isn’t enabled by default on Windows Server 2003, and isn’t installed altogether on fresher OS flavors than Vista. But it can be installed and enabled on all the platform iterations listed above, and once that’s done, remote codes are easily executable by resourceful attackers capable of sending “specially crafted packets” to infected Windows servers.

Given the bug’s alarming rating, we assume Microsoft knows of hackers who’ve capitalized on the exploit, so you’d better patch on before it’s too late if you’ve activated Telnet.

Both the glitch Google made public earlier this week, and the one brought to our attention a little while back, are deemed important but not critical by Microsoft. They’re elevation of privilege warnings, and can be put to rest once and for all.

As can another “important” elevation of privilege vulnerability found in Windows Components, a couple of security feature bypass dangers, a denial of service malfunction, and yet another elevation of privilege snag discovered in Windows Kernel-Mode Driver. We’d say all’s well that ends well, but we’re aware many Patch Tuesdays will follow.

Adrian Diaconescu
Former Digital Trends Contributor
Adrian is a mobile aficionado since the days of the Nokia 3310, and a PC enthusiast since Windows 98. Later, he discovered…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more