Patch Tuesday Analysis for May 2008

Welcome to Patch Tuesday!  This month there are just four Security Bulletins. Three involve Office products and therefore our primary focus for those is on workstations.

 

However, pay particular attention to the third one, MS08-028.  It’s presently being exploited. So disable the Jet Database component (if you don’t need it…) either by group policy or otherwise, especially on servers. Check your version of Jet Database since it only affects older ones. Note that hole can be exploited in other file types besides just MDB files; for instance Word documents can be crafted that exploit this vulnerability.  The Outlook attack vector vulnerability can be mitigated by setting the client to read in text only. See http://support.microsoft.com/default.aspx/kb/831607 on how to view all messages in plain text. Yeah, I know, it’s boring. Personally I can do without the dancing icons if it means I miss the ‘excitement’ of cleaning up a compromised workstation.  On second thought, why not disable everything you don’t need?

 

The Malware Protection Engine MS08-029 is also interesting. It must be embarrassing for Microsoft when their security products introduce security vulnerabilities.  If you’re using Microsoft’s product to guard your henhouse, then by all means keep it up-to-date!  Check out my chart of all 4 below.
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS08-028

950749
Arbitrary code

/ Windows
Workstations
Terminal Servers
Servers
Yes/YesYesCritical XP
Server 2003
Jet Database Component; Patch may require restartApply workarounds, Test and Patch ASAP.
MS08-026

951207
Arbitrary code

/ Office
Workstations
Terminal Servers
No/NoNoCritical Office 2000
Office XP
Office 2003
Office 2007
Word Viewer
Office 2004 for Mac
Office 2008 for Mac
Comp. Pack for Office 2007
Word ComponentPatch after testing
MS08-027

951208
Arbitrary code

/ Office
Workstations
Terminal Servers
No/NoNoCritical Office 2000
Office XP
Office 2003
Office 2007
Publisher ComponentPatch after testing
MS08-029

952044
Denial of service

/ Live OneCare, Antigen, Defender, Forefront
Workstations
Terminal Servers
Servers
No/NoNoModerate XP
Vista
Microsoft Malware Protection EngineUpdate if you’re using this product.

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.