Patch Analysis for January 2013

 

A variety of servers will need to get attention this month to correct vulnerabilities. Two are rated critical. MS13-001 corrects a print Spooler vulnerability. The remote attacker does not need to be authenticated. The workaround involves disabling the print spooler. Best practice is to disable all unnecessary services.
 
Vulnerabilities have been noted in XML Core Services with MS13-002 (the other bulletin for critical updates). 
 
Microsoft indicates that SCOM 2007 servers are vulnerable to XSS attacks. It seems if users with access to the SCOM go to a malicious web site, the exploit is possible. It should be noted that SCOM 2007 SP1 has no patch at this time but there is a patch for SCOM 2007 R2.
 
MS13-004 will affect servers that run untrusted .net applications.
 
MS13-006 involves a security feature bypass vulnerability in which SSL version 3 or TLS which silently downgrades to SSL version 2 (a weak encryption technology).
 
The next two affect primarily workstations and Terminal servers . MS13-005 indicates a vulnerability in the Windows kernel mode driver.
 
MS13-007 indicates a denial of service attack is possible but not likely with some versions of .net framework in the Open Data Protocol.
 
Break away from WSUS and get centralized enterprise patch for Microsoft AND Flash, Acrobat, Java, and even for other platforms – all on one pane of glass with Lumension Patch and Remediation. But patch is just one slice of the pie. Add full endpoint security (AV, patch, encryption, device control, app control) to that same pane of glass with the Lumension® Endpoint Management and Security Suite. One agent, one console to address all risk vectors.
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-003

2748552
Privilege elevation

Servers
No/NoNoImportant System Center Config Mgr 2007
 Patch after testing
MS13-002

2756145
Arbitrary code

/ XML Core Services
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Office 2003
Office 2007
Server 2003
Office Compatibility Pack
Server 2008
Expression Web
XML Core Services
Server 2008 R2
Windows 7
SharePoint Server 2007
Windows 8
Server 2012
 Patch after testing
MS13-004

2769324
Privilege elevation

/ .Net Framework
Workstations
Terminal Servers
Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
 Patch after testing
MS13-007

2769327
Denial of service

/ Open Data Protocol
Workstations
Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
  
MS13-001

2769369
Arbitrary code

/ Print Spooler
Workstations
Servers
No/NoYesCritical Server 2008 R2
Windows 7
Restart Req'dPatch after testing
MS13-005

2778930
Privilege elevation

/ Windows kernel mode drivers
Workstations
Terminal Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req'dPatch after testing
MS13-006

2785220
Security feature bypass

/ SSL and TLS
Workstations
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.