Patch Analysis for November 2013

It is November and there are a number of critical updates that should be applied.  Special attention should be paid to MS13-090 affecting Internet Explorer since targeted attacks are known.  We recommend patching this vulnerability as soon as possible.  Two additional critical vulnerabilities are being patched in Internet Explorer as well as WordPad.  Vulnerability details for these patches have not been published and there are no known attacks observed in the wild.  An arbitrary code execution vulnerability in most versions of Microsoft Office is fixed with MS13-091.  This is a flaw that requires a user to open a specially crafted Word Perfect document and is rated Important. 

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-095

2868626
Denial of service

/ Windows
Workstations
Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-093

2875783
Information disclosure

/ Windows Kernel
Workstations
Terminal Servers
Servers
No/NoNoImportant XP
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req'dPatch after testing
MS13-089

2876331
Arbitrary code

/ WordPad
Workstations
Terminal Servers
Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-091

2885093
Arbitrary code

/ Microsoft Word
Workstations
Terminal Servers
No/NoNoImportant Office 2003
Office 2007
Microsoft Antigen
Office 2010
Office 2013 RT
Office 2013
Restart Req'dPatch after testing
MS13-088

2888505
Arbitrary code
Information disclosure

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical Internet Explorer
Multiple Vulnerabilities; Restart Req'dPatch after testing
MS13-092

2893986
Privilege elevation
Denial of service

/ Hyper-V
Workstations
Virtual Servers
No/NoNoImportant Server 2008
Windows 8
Restart Req'dPatch after testing
MS13-094

2894514
Information disclosure

/ Outlook
Workstations
Terminal Servers
Yes/NoNoImportant Office 2007
Office 2010
Office 2013 RT
Office 2013
Restart Req'dPatch after testing
MS13-090

2900986
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/YesNoCritical XP
Vista
Windows 7
Windows 8
Windows RT
Restart Req'dPatch workstations ASAP

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources