Patch Tuesday Analysis for September 2009

This month you server admins have basically just one patch to really worry about and that is MS09-048 which deals with 3 TCP/IP vulnerabilities.  2 are denial of service holes – one of which has been publicly disclosed.  The 3rd vulnerability is remote code execution but so far has not been publicly disclosed.  I strongly recommend you get your servers patched since these vulnerabilites are at such a low and generalized level in the network stack.

The remaining vulnerabilities are basically workstation/terminal server risks and none have been publicly disclosed.  Workstation risks are bad though.  I can’t stress how important it is to treat endpoints as part of your trusted computing base.  Tune into my upcoming webinar, Top 4 Misconceptions about Endpoint Data Security, for more on that subject.

The chart of fast facts on this month’s patches is below.  By the way you can research several years worth of patches at my security bulletin database at http://www.ultimatewindowssecurity.com/patchAnalysis/default.aspx.

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS09-046

956844
Arbitrary code

/ Windows
Workstations
Terminal Servers
No/NoYesCritical Win2000
XP
Win2003
Restart may be req'dSet kill bit; patch after testing
MS09-048

967723
Arbitrary code
Denial of service

/ Windows
Servers
Yes/NoNoCritical Win2000
Win2003
Vista
Win2008
TCP/IP vulnerability; restart req'dPatch after testing
MS09-049

970710
Arbitrary code

/ Wireless LAN AutoConfig
Workstations
Terminal Servers
No/NoNoCritical Vista
Server 2008
Restart Req'dPatch after testing
MS09-045

971961
Arbitrary code

/ JScript Scripting Engine
Workstations
Terminal Servers
No/NoNoCritical Win2000
XP
Win2003
Vista
Win2008
Restart may be req'dPatch after testing
MS09-047

973812
Arbitrary code

/ WMF
Workstations
Terminal Servers
No/NoNoCritical Win2000
XP
Win2003
Vista
Win2008
Restart may be req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.