Patch Analysis for April 2013

Two critical bulletins and seven rated important have been released this April by Microsoft. Here is an overview: MS13-028 is a cumulative updated for Internet Explorer. MS13-29 is the other critical update and is for RDP.

For MS13-032, the vulnerability affects primarily Windows servers such as domain controllers.  So why include workstations like XP? In short, any Windows machine can act like a server. Specifically, the LDAP Service is at risk and can be installed on XP or the other operating systems listed. This could be used for the ADAM (Active Directory Application Mode), AD LDS (Lightweight Directory Service), Active Directory, or Active Directory Services components.

Two bulletins involve SharePoint. The vulnerability in MS13-030 is with the SharePoint servers. In MS13-035 clients who connect to servers with the affected SharePoint products are at risk. Although Microsoft reports exploit code is unlikely there are limited, targeted attacks attempting it.

The multiple vulnerabilities reported in MS13-036 indicated that one of these is publicly disclosed but exploit code for that one is unlikely. However exploit code for at least one of the other vulnerabilities is likely to be successful.

The Windows anti-malware software for Windows 8 and RT is to be patched with MS13-031.
MS13-033 and MS13-031 offer patches for the heart of the Windows OS, the kernel and user mode.


Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • discover all applications and executables in your endpoint environment
  • validate the integrity of applications and files against known vendor provenance; and
  • identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now »

 Patch Tuesday Coverage Made Possible By: Lumension:  IT Secured.  Success Optimized.™

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-031

2813170
Privilege elevation

/ Windows kernel
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-028

2817183
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-033

2820917
Privilege elevation

/ CSRSS
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Restart Req'dPatch after testing
MS13-035

2821818
Privilege elevation

/ HTML Sanitization
Workstations
Terminal Servers
No/YesNoImportant SharePoint Foundation 2010
Groove Server 2010
Office Web Apps 2010
Office SharePoint Server 2010
SharePoint Server 2010
InfoPath 2010
 Patch after testing
MS13-034

2823482
Privilege elevation

/ Anti-Malware
Workstations
No/NoYesImportant Windows 8
Windows RT
Restart Req'dPatch after testing
MS13-030

2827663
Information disclosure

/ SharePoint
Sharepoint Servers
Yes/NoNoImportant SharePoint Server 2013
 Patch after testing
MS13-029

2828223
Arbitrary code

/ Remote Desktop
Workstations
Terminal Servers
No/NoYesCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
 Patch after testing
MS13-036

2829996
Privilege elevation

/ Windows kernel mode drivers
Workstations
Terminal Servers
Yes/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-032

2830914
Denial of service

/ Active Directory
Servers
Domain Controllers
No/NoNoImportant XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources