Patch Analysis for August 2013

Today we have a mix of patches affecting Workstations as usual but also Exchange, ADFS and generic servers.  The Exchange patch (MS013-61) is scary because it allows someone to send your organization an email and get arbitrary code to run on your Exchange server itself.  On top of that it's already publicly disclosed so expect the bad guys to jump on this quick.

The other patch related to OpenType fonts (MS13-060), and the usual patches for Internet Explorer (MS13-059) are the ones you Workstation admins need to pay particular attention to; both allow attackers to run arbitrary code in the context of the user.  

The rest are less dangerous denial of service and privilege elevation attacks.  One of them (MS13-063) affects the Kernel and is publicly disclosed.   

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS13-062

2849470
Privilege elevation

Workstations
Servers
No/NoNoImportant XP
Win2003
Win2008
Windows 7
Win2008 R2
Windows 8
Server 2012
Windows RT
 Patch after testing
MS13-064

2849568
Denial of service

/ Network Address Translation (NAT)
Servers
No/NoNoImportant Server 2012
 Patch NAT servers
MS13-060

2850869
Arbitrary code

/ Unicode Scripts Processor
Workstations
Terminal Servers
No/NoYesCritical XP
Win2003
related to OpenType fontsPatch after testing
MS13-063

2859537
Privilege elevation
Security feature bypass

/ Kernel
Workstations
Terminal Servers
Yes/NoNoImportant XP
Win2003
Win2008
Windows 7
Win2008 R2
 Patch after testing
MS13-059

2862772
Arbitrary code

Workstations
No/NoNoCritical XP
Win2003
Vista
Win2008
Internet Explorer
Windows 7
Win2008 R2
Windows 8
Server 2012
Windows RT
  
MS13-065

2868623
Denial of service

/ ICMPv6
Workstations
Servers
No/NoNoImportant Win2008
Windows 7
Win2008 R2
Server 2012
Windows RT
 Patch systems exposed to Internet
MS13-066

2873872
Information disclosure

/ ADFS
Servers
No/NoNoImportant Win2003
Win2008
Win2008 R2
Server 2012
Active Directory Federation ServicesPatch after limited time
MS13-061

2876063
Arbitrary code

/ WebReady Document Viewing and Data Loss Prevention features of Exchange
Exchange Servers
Yes/NoNoCritical Exchange 2007
Exchange 2010
Exchange 2013
Exchange uses Oracle Outside In to display attachmentsPatch ASAP

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources