Patch Analysis for November 2008
2 patches this month both targeted at workstations and with exploit details public.
MS08-069 is yet another browser related patch affecting mostly workstations and terminal servers. Exploit details are public so get your workstations patched before it starts showing up in web pages that your users frequent or may be directed to through emailed links.
The other patch is rather interesting – again impacting principally workstations. The bulletin is poorly written and I’ve requested clarification from Microsoft. If I understand it correctly I’m not sure I agree with Microsoft’s. It’s not clear in the bulletin but apparently the victim user is tricked into authenticating an SMB session (mostly used for file sharing) to a malicious server which snaps the client’s credentials, initiates a new SMB session back to the Server service on the victim user’s computer using the snagged credentials. My question to Microsoft is “Does the Server service need to enabled on the victim client as a prereq for this attack to work? If so why isn’t that listed as a workaround?” If my understanding that a reverse SMB session (bad guy server back to victim’s PC) is required is correct then perimeter firewalls should protect you against malicious servers on the Internet leaving this basically an issue for other untrusted and internal networks.
And here's the chart:
|System Types Affected||Exploit|
/ Being exploited?
|MS severity rating||Products Affected||Notes||Randy's recommendation|
|Arbitrary code |
/ Windows XML
|Yes/No||No||Critical ||Win2000 |
|Addresses 3 vulnerabilities||Patch ASAP with minimal testing|
|Arbitrary code |
/ Windows SMB
|Yes/No||Yes||Important ||Win2000 |
|NTLM Authentication not handled correctly||Enable SMB signing or patch ASAP with minimal testing|
Receive Randy's same-day, independent analysis each Patch Tuesday
We will not share your address. Unsubscribe anytime.
"Thank you. I am very glad I subscribed to this newsletter.
Relevant content clearly and concisely. Finally!!!"
- John K.
"I really like the Fast Facts on this Month's Microsoft
Security Bulletins. Do you keep old copies? If yes, please let me know how I can
"Thanks, Randy. Your regular updates have streamlined my
monthly patching. Much appreciated,"
- Steve T.
"Really appreciate your patch observor. In the corporate
IT world, anything we can get our hands on that speeds the process of analyzing
threats and how they may or may not apply to our environments is a God-send.
Thanks so much for your efforts."
- Tess G.
"Many thanks for this Randy"
- Roger G.
"The chart is a REAAALLY good idea :)"
- Phil J.
"I like the table. Your insight is very valuable. "
"I liked your high level overview of patches in the
table. There are so many sources of patch information which can be very specific
or surrounded by other stuff that it’s refreshing to get everything summarised
like this. The “Randy’s Recommendation” comment is useful starting point too.
Please keep up the good work."
- David A.
"Your Patch Observer is a very good tool in
making the decision whether to patch or not to patch. And also to patch asap or
to wait a while before patching. Also I do think the use of the table is realy
improving the readability of the provided information."
- Gerard T.