Patch Analysis for March 2011

All three bulletins this month are related to Microsoft Security Advisory 2269637 that was published last August. It has to do with the way DLLs are loaded by applications. In addition to Microsoft products, third party software may be vulnerable. Workstations are at greatest risk.

MS11-015 addresses two vulnerabilities. One vulnerability is addressed by modifying the way Media Player and Media Center opens a .dvr-ms (Digital Video Recording) file. While some Windows Server 2008 R2 operating systems are vulnerable, it is not likely that a logged on user would be viewing media files on a server. The other vulnerability is related to the class of vulnerabilities that affects how applications load external libraries (DLLs). So the patch modifies the way the library is loaded.

MS11-016 addresses another of that same class of vulnerabilities, this time in the way Microsoft Groove 2007 loads external libraries. This is also publicly disclosed and a proof of concept has been published. Groove Server is not affected.

The third bulletin is MS11-017 addressing a DLL loading vulnerability in Remote Desktop (RDP) Client. While a client can be a server, it is not likely that an admin would be using an .rdp in an untrusted location that has the malicious DLL.

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Arbitrary code

/ Microsoft Groove
Yes/NoNoImportant Groove 2007
 Patch after testing

Arbitrary code

/ Remote Desktop
Yes/NoNoImportant XP
Server 2003
Server 2008
Server 2008 R2
Windows 7
 Patch after testing

Arbitrary code

/ Windows Media Player
Terminal Servers
Yes/NoNoCritical XP
Server 2008 R2
Windows 7
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources