Patch Analysis for August 2012

Exchange Server administrators will want to give attention to MS12-058. MS12-054 reports 4 vulnerabilities in Windows networking components with virtually every supported Windows operation system. Server admins should give particular attention to these two bulletins. The rest of the updates this month target primarily workstations and Terminal Servers. Others will be offered the updates but are safe as long as best pratices are followed, such as not allowing users to log on locally and not allowing web browsing, etc. on a server.

As you will note in the chart MS12-060 a wide variety of software is involved. The patch installation would probably be less obtrusive that the workaround in this case.
 
MS12-052 is a cumulative update for Internet Explorer. Kernel Mode drivers again have attention on MS12-055
 
MS12-053 has a patch for RDP on Windows XP SP3. Other operating systems are not affected. Also this version will not be affected if RDP is disabled. We recommend disabling all unnecessary services as it reduces the size of the attack target.
 
I’ll be presenting a session entitled “Everything Matters: Every Setting, Every Component, Every Technology” at SecuritySCAPE 2012 which is a really cool IT security virtual event, bringing together industry analysts, thought leaders and IT professionals into an online forum to share real-world experiences, best practices, and identify future trends and challenges that we will all face. In addition to me you’ll hear from Neil MacDonald from Gartner Group, speakers from Aberdeen Group, Securosis, Forrester Research and security experts like Richard Stiennon. Get the full details and sign up here: SecuritySCAPE 2012. You might get an iPad 3, too!

Patch Tuesday Coverage Made Possible By: Lumension:  IT Secured.  Success Optimized.™

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS12-056

2706045
Arbitrary code

/ JScript and VBScript Scripting Engine
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
 Patch after testing
MS12-060

2720573
Arbitrary code

/ Windows Common Controls
Workstations
Terminal Servers
No/YesYesCritical Office 2003
Office 2007
SQL Server 2000
SQL Server 2005
SQL Server 2008
Visual FoxPro 9.0
Host Integration Server 2004
Office 2010
Commerce Server 2002
Commerce Server 2007
Commerce Server 2009
Commerce Server 2009 R2
Visual FoxPro 8.0
Visual Basic 6.0 Runtime
SQL Server 2008 R2
Restart may be req'dPatch after testing
MS12-052

2722913
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Cumulative Update; Restart Req'dPatch after testing
MS12-053

2723135
Arbitrary code

/ RDP
Workstations
No/NoYesCritical XP
Restart Req'dPatch after testing
MS12-055

2731847
Privilege elevation

/ Windows kernel mode drivers
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-057

2731879
Arbitrary code

/ Office
Workstations
Terminal Servers
No/NoNoImportant Office 2007
Office 2010
 Patch after testing
MS12-054

2733594
Arbitrary code

/ Windows Networking
Workstations
Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS12-059

2733918
Arbitrary code

/ Office Visio
Workstations
Terminal Servers
No/NoNoImportant Visio 2010
 Patch after testing
MS12-058

2740358
Arbitrary code

/ Exchange
Exchange Servers
No/NoYesCritical Exchange 2007
Exchange 2010
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.