Patch Analysis for July 2013

Seven bulletins this month from Microsoft address 34 vulnerabilities. Workstations and Terminal Servers are most at risk this time as long as best practices are followed. MS13-053 addresses multiple vulnerabilities in kernel-mode drivers. Two of these have been publicly disclosed.

MS13-052 also includes multiple vulnerabilities and two are publicly disclosed. The target for these is .net framework and Silverlight.

Another priority for workstations should be MS13-055. There are 17 vulnerabilities and a larger target of nearly all supported Windows systems (except server core installations)

See the chart below for other components affected this month.

In this unprecedented time of cyber attacks, information about attacker methods is difficult to obtain unless you are the victim, and that is too late.  I recently had the privilege of having extensive interviews with security analysts at Bit9, Bit9 customers, and others.  A common thread that emerged was the difficulty of preventing the delivery of APT malware to systems or of quickly detecting the attack once the malware was active. Click here to download and read the whitepaper titled “APT Confidential: 14 Lessons Learned from Real Attacks”.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-056

2845187
Arbitrary code

/ DirectShow
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
 Patch after testing
MS13-055

2846071
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Cumulative Update; Restart Req'dPatch after testing
MS13-057

2847883
Arbitrary code

/ Media format runtime
Workstations
Terminal Servers
No/NoYesCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
 Patch after testing
MS13-058

2847927
Privilege elevation

/ Defender
Workstations
No/NoNoImportant Server 2008 R2
Windows 7
 Patch after testing
MS13-054

2848295
Arbitrary code

/ GDI+
Workstations
Terminal Servers
No/NoYesCritical XP
Vista
Office 2003
Office 2007
Visual Studio .NET 2003
Server 2003
Server 2008
Server 2008 R2
Windows 7
Office 2010
Lync 2010
Windows 8
Server 2012
Windows RT
Lync 2013
 Patch after testing
MS13-053

2850851
Arbitrary code

/ Kernel Mode Drivers
Workstations
Terminal Servers
Yes/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS13-052

2861561
Arbitrary code

/ .Net Framework; Silverlight
Workstations
Terminal Servers
Yes/NoNoCritical XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Silverlight 5
Windows 8
Server 2012
Windows RT
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources