Patch Analysis for December 2014

Happy December Patch Tuesday! This month delivers 3 critical patches and 4 important patches. Start this month off by applying patches for Internet Explorer (MS14-080). Instead of just applying patches, take this month to start measuring how long until IE is deployed to the environment. IE is a regular critical patch and reducing exposure time is one of the best things that an organization can do to enhance security. Follow up IE with applicable Office patches (MS14-081, MS14-082, MS14-083). There are 3 this month so there can be some efficiency gains if these patches are planned and tested correctly. The last critical patch is a VBScript update (MS14-084). Finally apply MS14-075 for Exchange and MS14-085 to the environment.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now »

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS14-080

3008923
Arbitrary code
Security feature bypass

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Requires restart, multiple vulnerabilitiesUpdate immediately
MS14-075

3009712
Privilege elevation

/ Microsoft Exchange
Workstations
Exchange Servers
No/NoNoImportant Exchange 2007
Exchange 2010
Exchange 2013
May require restart, multiple vulnerabilitiesUpdate after testing
MS14-085

3013126
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Windows RT
Windows 8.1
Windows RT 8.1
May require restartUpdate after testing
MS14-084

3016711
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
No/NoNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
VBScript 5.6
VBScript 5.7
VBScript 5.8
May require restartUpdate immediately
MS14-081

3017301
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
Sharepoint Servers
No/NoNoCritical Office 2007
Office 2010
Office 2011 for MAC
SharePoint Server 2010
SharePoint Server 2013
Office 2013 RT
Office 2013
Office 2013 Web Apps
Office 2010 Web Apps
May require restart, multiple vulnerabilitiesUpdate immediately
MS14-083

3017347
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoNoImportant Exchange 2007
Exchange 2010
Exchange 2013
May require restart, multiple vulnerabilitiesUpdate after testing
MS14-082

3017349
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoNoImportant Office 2007
Office 2010
Office 2013 RT
Office 2013
May require restartUpdate after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources