Patch Analysis for November 2014

Happy mega patch Tuesday!  This November bulletin delivers 14 patches, two of which (MS14-075 and MS14-068) still have a release date that is being determined. Months like this remind us of how important a solid patching strategy and deployment process is.   MS14-064 and MS14-078 are known to have limited attacks in the wild so these patches should be the first to be applied if they are applicable.  Internet Explorer (MS14-065) should be the next patch to be applied this month since 17 vulnerabilities, including remote code execution vulnerabilities, are fixed this month.  Apply MS14-066 and MS14-067 in short order following Internet Explorer.  These are both remote code execution vulnerabilities that could be prime targets for attackers due to a popular target like XML Core Services or the remote nature of the Schannel vulnerability in windows servers.  'Important' rated vulnerabilities of note include MS14-069 due to the prevelance of Microsoft Office, MS14-072 due to the wide range of .Net versions affected.  Review these two patches and determine the priority based on your environment.  The remaining updates should be reviewed, tested, and applied in a fashion that makes sense to your organization.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now »

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS14-076

2982998
Security feature bypass

/ Microsoft IIS
IIS Servers
No/NoYesImportant Windows 8
Server 2012
Server 2012 R2
Windows 8.1
May require restartUpdate after testing
MS14-070

2989935
Privilege elevation

/ Microsoft Windows
Servers
No/NoNoImportant Server 2003
May require restartUpdate after testing
MS14-066

2992611
Arbitrary code

/ Microsoft Windows
Servers
No/NoNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate immediately
MS14-078

2992719
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/YesYesModerate Vista
Office 2007
Server 2003
Server 2008
Server 2008 R2
Windows 7
May require restartUpdate after testing
MS14-067

2993958
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
No/NoYesCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate immediately
MS14-073

3000431
Privilege elevation

/ Microsoft Server Software
Sharepoint Servers
No/NoNoImportant SharePoint Server 2010
May require restartUpdate after testing
MS14-079

3002885
Denial of service

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoYesModerate Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate after testing
MS14-065

3003057
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical IIS 5.0
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Requires restart, multiple vulnerabilitiesUpdate immediately
MS14-077

3003381
Information disclosure

/ Active Directory Federated Services
Servers
No/NoNoImportant Server 2008
Server 2008 R2
Server 2012
Server 2012 R2
May require restartUpdate after testing
MS14-074

3003743
Security feature bypass

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate after testing
MS14-072

3005210
Privilege elevation

/ .NET Framework
Workstations
Terminal Servers
Servers
No/NoYesImportant .NET Framework 1.1 SP1
.NET Framework 2.0 SP2
.NET Framework 3.5
.NET Framework 3.5.1
.NET Framework 4
.NET Framework 4.5
.NET Framework 4.5.1
.NET Framework 4.5.2
May require restartUpdate after testing
MS14-071

3005607
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate after testing
MS14-069

3009710
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoNoImportant Office 2007
Word Viewer
May require restart, multiple vulnerabilitiesUpdate after testing
MS14-064

3011443
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
No/YesYesCritical Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.