Patch Analysis for December 2012

Microsoft has released 7 Bulletins and re-released several others today.

MS12-077 is a cumulative update for IE.

With MS12-078 In addition to Workstations and Terminal Servers, SharePoint servers that allow conversion of Word files using Word Automation Services are also at risk.

MS12-079 is primarily a Word vulnerability but SharePoint Servers are at risk if they do conversion of Word files using Word Automation Services.

Of particular interest for those with Exchange Servers is MS12-080. The publicly disclosed Oracle Outside-in vulnerabilities have a workaround that could buy some extra time. The patches are actually a roll-up that will change some functionality so testing may be in order. The RSS feed vulnerability is less severe but it does not have a workaround.

It looks like only releases prior to the new Windows 8 and Server 2012 are vulnerable to the flaw in the Windows File Handling components as mentioned in the vulnerability at MS12-081. However if you are using the Windows 8 preview or Server 2012 RC you should apply the update.

Microsoft indicates the DirectPlay vulnerability indicated in MS12-082 would be difficult or unlikely to be exploited.

MS12-083 is a vulnerability where a revoked certificate can be bypassed on servers.

Microsoft also announced re-release of previous bulletins today.

Break away from WSUS and get centralized enterprise patch for Microsoft AND Flash, Acrobat, Java, and even for other platforms – all on one pane of glass with Lumension Patch and Remediation. But patch is just one slice of the pie. Add full endpoint security (AV, patch, encryption, device control, app control) to that same pane of glass with the Lumension® Endpoint Management and Security Suite. One agent, one console to address all risk vectors.

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS12-081

2758857
Arbitrary code

/ Windows
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-077

2761465
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Cumulative Update; Restart Req'dPatch after testing
MS12-083

2765809
Security feature bypass

/ Windows
Servers
No/NoYesImportant Server 2008 R2
Server 2012
Restart Req'dPatch after testing
MS12-082

2770660
Arbitrary code

/ DirectPlay
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req'dPatch after testing
MS12-079

2780642
Arbitrary code

/ Office Word
Workstations
Terminal Servers
Sharepoint Servers
No/NoNoCritical Office 2003
Office 2007
Word Viewer
Office Compatibility Pack
Office 2010
Office Web Apps 2010
SharePoint Server 2010
 Patch after testing
MS12-078

2783534
Arbitrary code

/ Windows kernel mode drivers
Workstations
Terminal Servers
Yes/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req'dPatch after testing
MS12-080

2784126
Arbitrary code

/ Exchange
Exchange Servers
Yes/NoNoCritical Exchange 2007
Exchange 2010
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources