Patch Analysis for January 2014

The January Microsoft Security Bulletin was a very light one with 4 patches that are all rated as Important.  Remote code execution may be possible by exploiting a vulnerability in Microsoft Word (MS14-001) but attacks have not been observed prior to the patch release.  Pay close attention to MS14-002 that addresses an elevation of privilege vulnerability found in Windows XP SP3 and Windows Server 2003 SP2.  This patch is of note because there have been reports of targeted attacks that exploit a vulnerability that is fixed with this update.  MS14-003 fixes a kernel mode driver vulnerability that may allow Elevation of Privilege.  Finally, MS14-004 addresses a denial of service vulnerability in Microsoft Dynamics AX.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Denial of service

/ Microsoft Dynamics AX
No/NoNoImportant Dynamics AX 2012
Dynamics AX 4.0
Dynamics AX 2009
Dynamics AX 2012 R2
Restart Req'dPatch after testing

Privilege elevation

/ Windows Kernel-Mode Drivers
Terminal Servers
No/NoNoImportant Server 2008 R2
Windows 7
Restart Req'dPatch after testing

Privilege elevation

/ Windows Kernel
Terminal Servers
No/YesYesImportant XP
Server 2003
Restart Req'dPatch after testing

Arbitrary code

/ Word and Office Web Apps
Terminal Servers
Sharepoint Servers
No/NoNoImportant Office 2003
Office 2007
Word Viewer
Office 2010
SharePoint Server 2010
SharePoint Server 2013
Office 2013 RT
Office 2013
Office 2013 Web Apps
Office 2010 Web Apps
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources