Patch Tuesday Analysis for March 2008

This month's updates all involve Microsoft Office components.  Since it is public and actively being exploited – and lacks a good workaround, MS08-014 should be given immediate attention if you don’t have the latest Office service packs installed. Another point - one of the MS 'workarounds' is "Do not open or save Microsoft Office files that you receive from untrusted sources or that you receive unexpectedly from trusted source". That's not really a workaround and 1) you will always find someone that does not know how to follow that simple instruction 2) just because it comes from a trusted source doesn’t mean his/her computer isn’t infected with malware. Some enterprise networks have elected to quarantine all file attachments with Office file extensions that come from outside the local network. 
Below is my standard chart of fast facts to help your analysis:
 

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS08-017

933103
Arbitrary code

/ Office Web Components
Workstations
Terminal Servers
No/NoYesCritical Office 2000
Office XP
Visual Studio .NET 2002
Visual Studio .NET 2003
Internet Sec. & Acc. Server 2K
Commerce Server 2000
BizTalk Server 2000
BizTalk Server 2002
Patch sets kill bitSet kill bit; Patch after testing
MS08-014

949029
Arbitrary code

/ Office Excel
Workstations
Terminal Servers
Yes/YesNoCritical Office 2000
Office XP
Office 2003
Office 2007
Office 2004 for Mac
Office 2008 for Mac
Comp. Pack for Office 2007
Fixes several vulnerabilities. Office 2003 SP3 and Office 2007 SP1 not affected.Patch immediately.
MS08-016

949030
Arbitrary code

/ Office
Workstations
Terminal Servers
No/NoYesCritical Office 2000
Office XP
Office 2003
Office 2004 for Mac
Some later service pack levels not affected.Install MOICE, use file block policy; Patch after testing
MS08-015

949031
Arbitrary code

/ Outlook
Workstations
Terminal Servers
No/NoYesCritical Office 2000
Office XP
Office 2003
Office 2007
2007 SP1 not affected.Disable mailto handler; Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.