Patch Analysis for May 2010

Last week Microsoft alerted us to a possible vulnerability in Sharepoint sites (specifically cross-site scripting or XSS). No patch was released for that today so we expect something in the future-perhaps an out-of-band release. 

Otherwise, the two bulletins this month are rated critical. One is for VBA and Office and the other the Windows platform. 

The VBA related patch (MS10-031) is an unusual situation.  Because VBA is part of Office products but also a separate product that ISV developers can build into their applicaitons to allow their users ability to customize their application.  The developer tool version of Microsoft VBA is sold through Summit Software.  If your company develops software and uses Microsoft VBA you will want to read this one carefully - otherwise just pay attention to bits about Office and VBA. MS10-030 is for a vulnerability in Outlook Express and Windows Mail. The “workaround” suggests using web-based mail instead.  For corporations this shouldn't be an issue anyway since you are probably using Outlook or someother mail client.  You should still patch though incase users are using Windows Mail or Outlook Express to connect to personal accounts. 

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Arbitrary code

/ Visual Basic for Applications
Terminal Servers
Programmer Workstations
No/NoYesCritical Office XP
Office 2003
Office 2007
Restart may be req'dPatch after testing

Arbitrary code

/ Windows Outlook Express and Mail
Terminal Servers
No/NoNoCritical Win2000
Windows 7
Win2008 R2
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources