Patch Tuesday Analysis for March 2009

MS09-006 replaces last year’s patch MS08-061 both of which patch vulnerabilities with how Windows processes certain image files (WMF and EMF).   This is a workstation patch that should be rolled out after normal testing.

MS09-007 only applies to secure web servers that require certificate based client authentication. Simply running an https:// web site doesn’t make you vulnerable to this exploit – only if you are using client certificates. I wrote an article some time ago on how you can implement soft 2-factor authentication using client certificates - http://www.ultimatewindowssecurity.com/articles_certs.html.

Remember DNS spoofing last year. Well here’s another patch with MS09-008 but this one affects only DNS and WINS servers--not the client. Don’t delay in patching vulnerable
DNS servers especially any on the Internet.

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS09-006

958690
Arbitrary code

/ Kernel
Workstations
Terminal Servers
No/NoNoCritical Win2000
XP
Vista
Server 2003
Server 2008
Restart Req’dPatch after testing
MS09-007

960225
Spoofing

/ Site Spoofing
Web Servers
No/NoYesImportant Win2000
XP
Vista
Server 2003
Server 2008
Restart Req’d Patch after accelerated testing for web servers that use schannel
MS09-008

962238
Spoofing

/ DNS/WINS
Servers
DNS Servers
Yes/NoNoImportant Server 2003
Server 2000
Server 2008
Restart Req’d Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.