Patch Tuesday Analysis for September 2010

Of the nine bulletins released today all but two (MS10-063 and MS10-064) have a vulnerability where consistent exploit code is expected.  Details on 2 are public with one of them already being exploited.  Attention will need to be given to both servers and workstations.  Check out my fast facts chart to make triage your patching efforts.

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS10-069

2121546
Privilege elevation

/ Windows
Workstations
Terminal Servers
No/NoNoImportant XP
Server 2003
Chinese, Japanese, or Korean system locale Restart Req'dPatch after testing
MS10-067

2259922
Arbitrary code

/ Wordpad
Workstations
Terminal Servers
No/NoYesImportant XP
Server 2003
Restart may be req'dPatch after testing
MS10-065

2267960
Arbitrary code

/ IIS
IIS Servers
Yes/NoNoImportant IIS 5.1
IIS 6.0
IIS 7.0
IIS 7.5
Restart may be req'dPatch after testing
MS10-064

2315011
Arbitrary code

/ Office Outlook
Workstations
Terminal Servers
No/NoNoCritical Office 2003
Office 2007
Office 2002
Features may need to be installed after patchPatch after testing
MS10-063

2320113
Arbitrary code

/ Windows, Office
Workstations
Terminal Servers
No/NoNoCritical XP
Win2003
Vista
Win2008
Office XP
Office 2003
Office 2007
Restart Req'dPatch after testing
MS10-061

2347290
Arbitrary code

/ Print Spooler
Workstations
Terminal Servers
Print Servers
Yes/YesYesCritical XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing
MS10-062

975558
Arbitrary code

/ Windows Media Player
Workstations
Terminal Servers
No/NoYesCritical XP
Win2003
Vista
Win2008
 Patch after testing
MS10-066

982802
Arbitrary code

/ RPC
Workstations
Servers
No/NoNoImportant XP
Server 2003
Restart Req'dPatch after testing
MS10-068

983539
Privilege elevation

/ Active Directory
Domain Controllers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.