Patch Analysis for October 2013

This month a number of vulnerabilities have to do with memory corruption and the way memory is handled in Office products.  We have recommended accelerated deployment of the cumulative update for Internet Explorer (MS13-080) because some exploits are already public and being used in targeted attacks. One of the vulnerabilities in MS13-082 affecting .Net Framework is also publicly disclosed but Microsoft suggests that successful code is unlikely for this. MS13-084 is of interest for those administering SharePoint servers. The exploit affecting servers is a particular type of cross-site scripting using "click-jacking" Applying the update will protect the SharePoint server and the user accessing it. The update for kernel-mode drivers (MS13-081) will require a restart to be applied. Microsoft points out that the servers are less at risk because best practices prevent most users from logging on to a server. Therefore admins can plan when these servers will updated without too much risk. The chart below is for Microsoft products, but don't forget third-party software.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-083

2864058
Arbitrary code

/ Windows Common Controls
Web Servers
No/NoNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-081

2870008
Arbitrary code

/ Kernel Mode Drivers
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Multiple vulnerabilities; Restart Req'dPatch after testing
MS13-082

2878890
Arbitrary code

/ .Net Framework
Workstations
Servers
Yes/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Multiple vulnerabilitiesPatch after testing
MS13-080

2879017
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
Yes/YesNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Multiple vulnerabilities; Restart Req'dPatch after minimal testing
MS13-085

2885080
Arbitrary code

/ Excel
Workstations
Terminal Servers
No/NoNoImportant Office 2007
Excel Viewer
Office Compatibility Pack
Office 2010
Office 2011 for MAC
Office 2013 RT
Office 2013
Multiple vulnerabilitiesPatch after testing
MS13-086

2885084
Arbitrary code

/ Office Word
Workstations
Terminal Servers
No/NoNoImportant Office 2003
Office 2007
Office Compatibility Pack
Multiple vulnerabilitiesPatch after testing
MS13-084

2885089
Arbitrary code

/ SharePoint
Workstations
Terminal Servers
No/NoNoImportant SharePoint Server 2007
Web Apps
SharePoint Server 2010
SharePoint Server 2013
Multiple vulnerabilitiesPatch after testing
MS13-087

2890788
Information disclosure

/ Silverlight
Workstations
Terminal Servers
No/NoNoImportant Silverlight 5
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources