Patch Analysis for December 2013

The December Patch Tuesday Bulletin contains 5 critical and 6 important patches.  Watch out because most enterprises will be using many of these products which include Office, Lync, Windows, Internet Explorer, and ASP.NET.  Targeted attacks for MS13-096 have been seen in the wild so try to patch this one since arbitrary code execution is possible when viewing a maliciously crafted TIFF.  MS13-105 is a critical patch for Exchange which may allow for arbitrary code execution on the Exchange server with privileges of the LocalService account.  MS13-097 patches a vulnerability in Internet Explorer 6, 7, 8, 9, 10, and 11 that could allow arbitrary code execution as well.  MS13-098 Fixes a vulnerability that could allow an attacker to maliciously modify a trusted portable executable without breaking the signature.  Finally we have one last critical arbitrary code execution vulnerability fixed in MS13-099.  The vulnerability involves Windows Script 5.6, 5.7, and 5.8 which may allow attacker to take control of  system after a user has visited a malicious website.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-101

2880430
Privilege elevation
Denial of service

/ Windows
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Multiple Vulnerabilities; Restart Req'dPatch after testing
MS13-098

2893294
Arbitrary code

/ Windows
Workstations
Terminal Servers
Servers
No/YesNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart Req'dPatch Immediately after
MS13-102

2898715
Privilege elevation

/ Windows
Workstations
No/NoNoImportant XP
Server 2003
Restart Req'dPatch after testing
MS13-097

2898785
Arbitrary code
Privilege elevation

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Internet Explorer
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Multiple vulnerabilities, Restart Req'dPatch Immediately
MS13-100

2904244
Arbitrary code

/ Sharepoint
Sharepoint Servers
No/NoNoImportant SharePoint Server 2010
SharePoint Server 2013
Office 2013 Web Apps
Restart Req'dPatch after testing
MS13-106

2905238
Security feature bypass

/ Office
Workstations
Terminal Servers
No/YesNoImportant Office 2007
Office 2013 RT
Office 2013
Restart Req'dPatch after testing
MS13-103

2905244
Privilege elevation

/ ASP.NET
Web Servers
No/NoNoImportant ASP.NET SignalR
Visual Studio TFS 2013
Anything hosting ASP.NET SignalIR is affectedPatch after testing
MS13-096

2908005
Arbitrary code

/ GDI+
Workstations
Terminal Servers
Servers
No/YesYesCritical Vista
Office 2003
Office 2007
Word Viewer
Excel Viewer
Office Compatibility Pack
Server 2008
Office 2010
Lync 2010
Lync 2013
Powerpoint Viewer 2010
Restart required in some casesPatch after minimal testing
MS13-099

2909158
Arbitrary code

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart Req'dPatch Workstations after minimal testing
MS13-104

2909976
Information disclosure

/ Office
Workstations
Terminal Servers
No/YesNoImportant Office 2013 RT
Office 2013
Restart Req'dPatch after testing
MS13-105

2915705
Arbitrary code
Privilege elevation

/ Exchange
Exchange Servers
No/NoNoCritical Exchange 2007
Exchange 2010
Exchange 2013
Multiple VulnerabilitiesPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.