Patch Analysis for May 2008

Welcome to Patch Tuesday!  This month there are just four Security Bulletins. Three involve Office products and therefore our primary focus for those is on workstations.


However, pay particular attention to the third one, MS08-028.  It’s presently being exploited. So disable the Jet Database component (if you don’t need it…) either by group policy or otherwise, especially on servers. Check your version of Jet Database since it only affects older ones. Note that hole can be exploited in other file types besides just MDB files; for instance Word documents can be crafted that exploit this vulnerability.  The Outlook attack vector vulnerability can be mitigated by setting the client to read in text only. See on how to view all messages in plain text. Yeah, I know, it’s boring. Personally I can do without the dancing icons if it means I miss the ‘excitement’ of cleaning up a compromised workstation.  On second thought, why not disable everything you don’t need?


The Malware Protection Engine MS08-029 is also interesting. It must be embarrassing for Microsoft when their security products introduce security vulnerabilities.  If you’re using Microsoft’s product to guard your henhouse, then by all means keep it up-to-date!  Check out my chart of all 4 below.
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Arbitrary code

/ Windows
Terminal Servers
Yes/YesYesCritical XP
Server 2003
Jet Database Component; Patch may require restartApply workarounds, Test and Patch ASAP.

Arbitrary code

/ Office
Terminal Servers
No/NoNoCritical Office 2000
Office XP
Office 2003
Office 2007
Word Viewer
Office 2004 for Mac
Office 2008 for Mac
Comp. Pack for Office 2007
Word ComponentPatch after testing

Arbitrary code

/ Office
Terminal Servers
No/NoNoCritical Office 2000
Office XP
Office 2003
Office 2007
Publisher ComponentPatch after testing

Denial of service

/ Live OneCare, Antigen, Defender, Forefront
Terminal Servers
No/NoNoModerate XP
Microsoft Malware Protection EngineUpdate if you’re using this product.

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources