Patch Analysis for December 2009

The first 3 bulletins affect primarily servers while the last 3 impact workstations and TS. A restart is required on all but the last one.

  • MS09-069 patches a vulnerability in the way LSASS (local security authority system service) handles specially crafted ISAKMP message via IPsec. If you’re not using IPsec, as a workaround, you can disable the service with a simple registry adjustment. Servers are the primary target and a restart is required to put the fix into action.
  • MS09-070 addresses two vulnerabilities with ADFS (active directory federation servers) enabled web servers. There are a couple of known issues with this patch so do your reading.
  • MS09-071 is rated critical for Server 2008 SP2 and moderate to important for other OSs. Usually upgrading to a SP improves the security but it this case the severity of the vulnerability was increased. One of the vulnerabilities is public. The vulnerabilities affect servers using Internet Authentication Service (Microsoft’s RADIUS server) when configured to use PEAP (Protected Extensible Authentication Protocol) with MS-CHAP v2 authentication. The faulty code exists on other machines so the patch is being issued for a wider range of machines.
  • MS09-072 is a cumulative update for IE that addresses multiple public vulnerabilities.
  • The workaround offered in MS09-073 disables the wordpad text converter. When the patch is applied a Word 6.0 file cannot be opened with Wordpad. This may make it necessary to install an Office Word viewer if Office is not installed. Some additional issues may appear before the dust settles on this one.
  • The Office Project vulnerability addressed in MS09-074 only works if a user opens a malicious Project file. We tell users not to open such files from an un-trusted source but it still happens…
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Arbitrary code

/ Office Project
Terminal Servers
No/NoNoCritical Project 2003
Project 2000
Project 2002
 Patch after testing

Arbitrary code

/ Active Directory
Web Servers
No/NoNoImportant Server 2003
Server 2008
Restart Req'dPatch after testing

Arbitrary code

/ Windows
Yes/NoYesCritical Win2000
Restart Req'dPatch after testing

Denial of service

/ Windows IPsec
No/NoYesImportant Win2000
Server 2003
Restart Req'dPatch after testing

Arbitrary code

/ Wordpad; Office
Terminal Servers
No/NoYesImportant Win2000
Office 2003
Server 2003
Office Converter Pack
Office 2002
Works 8.5
Restart Req'dPatch after testing

Arbitrary code

/ Internet Explorer
Terminal Servers
Yes/NoNoCritical Win2000
Cumulative Update; Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources