Patch Tuesday Analysis for November 2006

6 Bulletins this month.  Most are workstation centric risks and 3 can be mitigated via group policy with my free KillBits administrative template.

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS06-068

920213
Arbitrary code

/ Active X
Workstations
Terminal Servers
No/NoNoCritical XP
Server 2003
Small Business Server 2003
Small Business Server 2000
Active XTest&patch or use my free KillBits ADM tool
MS06-067

922760
Arbitrary code

/ IE
Workstations
Terminal Servers
Yes/YesNoCritical XP
Server 2003
Small Business Server 2003
Multiple vulnerabilities requiring different responsesUse my free KillBits ADM tool AND test and then patch
MS06-069

923789
Arbitrary code

/ Adobe Flash Player
Workstations
Terminal Servers
No/NoNoCritical XP
XP OnlyTest and then patch
MS06-066

923980
Arbitrary code

/ Client Service
Netware Clients
No/NoNoImportant Win2000
XP
Server 2003
Server 2000
Datacenter Server 2000
Small Business Server 2003
Advance Server 2000
Small Business Server 2000
Client Service for NetwareGet rid of Netware - just kidding - test and patch
MS06-070

924270
Arbitrary code

/ Workstation Service
Workstations
Terminal Servers
Servers
No/NoNoCritical Win2000
XP
Small Business Server 2000
Workstation ServiceTest and then patch
MS06-071

928088
Arbitrary code

/ Active X
Workstations
Terminal Servers
Yes/YesNoCritical XML Core Services
ActiveXPatch or use my free KillBits ADM tool

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.