Patch Analysis for January 2008

Only 2 bulletins this month and neither is what I’d call high priority unless you manage a server exposed to the Internet that sends or receives multi-cast traffic. If you have systems connected to hostile networks that are open to IGMP/MLD and Router Discovery Protocol you should load this patch as soon as possible. Of course workstations are typically in this category but I would recommend testing the patch before rolling out to hundreds or thousands of workstations. Your other option – for systems that don’t need to support multicast traffic – is to disable the features with a registry tweak that can be automated through group policy with a custom administrative template. 

The other vulnerability is limited to the risk of someone logged on locally who runs a specially crafted program which elevates its privileges. This is mostly a matter for high security workstation environments where end users don’t have admin authority and Terminal Servers where end-users could access and execute a specially crafted program. 
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Arbitrary code

/ Windows
Terminal Servers
No/NoYesCritical Win2000
Server 2003
Small Business Server 2003
Restart is RequiredOptions: - Disable or block IGMP/MLD and Router Discovery Protocol. This will break multi-cast applications such as some features in Ghost or live Internet broadcasts. Can be disabled using group policy by creating a custom administrative template. - Patch after testing

Privilege elevation

/ Windows
Terminal Servers
No/NoNoImportant Win2000
Server 2003
Restart is RequiredPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources