Patch Analysis for July 2012

Many of the vulnerabilities addressed in July’s bulletins have been publicly disclosed. Both servers and workstations will need to be patched. However for all of this month’s bulletins, workstations and possibly Terminal Servers are primarily at risk as long as best practices are followed. In most cases the attack vector comes through web browsing or email.
MS12-043 is an MSXML Core Services vulnerability that is both publicly disclosed and being exploited. Although Servers could be vulnerable, the primary vector would be through workstations and terminal servers when a logged on user visits a malicious web site. Best practices would preclude doing this from a server.
SharePoint has 6 vulnerabilities, one publicly disclosed and these are addressed in MS12-050.
MS12-047 indicates two vulnerabilities. According to Microsoft, the one that is publicly disclosed would be difficult to build.
MS12-044 is a cumulative update for Internet Explorer 9. Two vulnerabilities are addressed.
MS12-045 MDAC is vulnerable. The Microsoft Data Access Components allow access to databases either locally or on a server. Since the vector is through Internet Explorer, it is again Workstations and Terminal Servers that are primarily vulnerable.
A design flaw in Transport Layer Security TLS had been publicly disclosed at the time of the release of MS12-049 but there are no known attacks and Microsoft indicates that successful exploit code is unlikely.
SharePoint has 6 vulnerabilities, one publicly disclosed and these are addressed in MS12-050.
MS12-049 mentions a vulnerability if a user opens a file or folder with a “specially crafted name” It probably won’t take a rocket scientist to use it once it becomes known.

Patch Tuesday Coverage Made Possible By: Lumension:  IT Secured.  Success Optimized.™

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS12-049

2655992
Information disclosure

/ TLS
Workstations
Terminal Servers
Yes/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-048

2691442
Arbitrary code

/ Windows Shell
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-050

2695502
Privilege elevation

/ Sharepoint
Workstations
Terminal Servers
Yes/NoNoImportant SharePoint Services 3.0
SharePoint Foundation 2010
SharePoint Server 2007
Groove Server 2010
Office Web Apps 2010
SharePoint Server 2010
InfoPath 2010
InfoPath 2007
Multiple vulnerabilitiesPatch after testing
MS12-045

2698365
Arbitrary code

/ MDAC
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
 Patch after testing
MS12-046

2707960
Arbitrary code

/ Visual Basic for Applications
Workstations
Terminal Servers
Yes/YesNoImportant Office 2003
Office 2007
Office 2010
Visual Basic for Applications
 Patch after testing
MS12-047

2718523
Privilege elevation

/ Windows kernel mode drivers
Workstations
Terminal Servers
Yes/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-044

2719177
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-051

2721015
Privilege elevation

/ Office
Workstations
Yes/NoYesImportant Office 2011 for MAC
Shared workstations at riskPatch after testing
MS12-043

2722479
Arbitrary code

/ XML Core Services
Workstations
Terminal Servers
Yes/YesNoCritical XP
Vista
Office 2003
Office 2007
Word Viewer
Office Sharepoint Server 2007
Server 2003
Office Compatability Pack
Server 2008
Expression Web
Groove Server 2007
Server 2008 R2
Windows 7
SharePoint Server 2007
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources