Patch Analysis for October 2014

This October Patch Tuesday Bulletin is a very active one.  There are active attacks, exploit code, and links to potential espionage groups. First up this month should be Internet Explorer MS14-056 since multiple actively targeted vulnerabilities are fixed in this bulletin.  Next up should be MS14-058 due to active attacks and the wide array of supported operating systems that are affected by this vulnerability in TrueType fonts.  Delivery mechanisms may include documents, webpages, or even advertisements so this vulnerability could be a good candidate for a watering hole attack.  Although MS14-060 is only rated important it should be followed up next if users are especially susceptible to phishing attacks.  This bulletin fixes an actively attacked vulnerability in Microsoft Office OLE objects that may be used in a targeted espionage campaign.  MS14-057 remediates an arbitrary code execution vulnerability in .NET web applications and should be applied if your organization uses this technology.  MS14-061 remediated yet another Microsoft Office vulnerability.  This bulletin is rated important but should be looked at due to the arbitrary code execution impact of vulnerability.  The remaining bulletins MS14-059,MS14-062, MS14-063 should be examined to determine if they are deemed critical or even applicable to the organization.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now »

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS14-056

2987107
Arbitrary code
Privilege elevation

/ Internet Explorer
Workstations
Terminal Servers
No/YesNoCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Requires restart, multiple vulnerabilitiesUpdate immediately
MS14-059

2990942
Security feature bypass

/ Microsoft Developer Tools
Workstations
Terminal Servers
No/NoYesImportant ASP.NET MVC 2.0
ASP.NET MVC 3.0
ASP.NET MVC 4.0
ASP.NET MVC 5.0
ASP.NET MVC 5.1
May require restartUpdate after testing
MS14-062

2993254
Privilege elevation

/ Microsoft Windows
Servers
Yes/NoYesImportant Server 2003
Requires restartUpdate after testing
MS14-063

2998579
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Requires restartUpdate after testing
MS14-058

3000061
Arbitrary code
Privilege elevation

/ Windows
Workstations
Terminal Servers
No/YesNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate immediately
MS14-057

3000414
Arbitrary code
Privilege elevation
Security feature bypass

/ .NET Framework
Workstations
Terminal Servers
Servers
No/NoYesCritical .NET Framework 2.0 SP2
.NET Framework 3.5
.NET Framework 3.5.1
.NET Framework 4
.NET Framework 4.5
.NET Framework 4.5.1
.NET Framework 4.5.2
May require restartUpdate immediately
MS14-061

3000434
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoYesImportant Office 2007
Office 2010
Office 2011 for MAC
SharePoint Server 2010
Office 2010 Web Apps
May require restartUpdate after testing
MS14-060

3000869
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
No/YesYesImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.