Patch Analysis for February 2014

Microsoft released 7 bulletins for this month’s Patch Tuesday Analysis.  There are 4 critical bulletins that may allow arbitrary code execution.  Look into the patch for MS14-010 that fixes 24 vulnerabilities in Internet Explorer.  One of the vulnerabilities was publically disclosed and may allow arbitrary code execution.    MS14-007 addresses a vulnerability in Direct2d and MS14-011 addresses a vulnerability in VBScript both of which could leverage Internet Explorer as an attack path.  The last critical bulletin for this month is MS14-008 that fixes a vulnerability in Forefront Protection for Exchange.  This was a privately reported vulnerability that could allow arbitrary code execution when a maliciously crafted email is scanned.   There are several interesting important bulletins that should be noted.  MS14-009 patches a publically disclosed flaw in the .NET Framework that may allow an attacker to bypass security mechanisms.  This vulnerability has also been used in attacks.  MS14-005 is an information disclosure vulnerability that has been observed in the wild and publically disclosed.  MS14-006 is a denial of service vulnerability that requires an attacker to be on the same subnet and send large quantities of maliciously crafted IPv6 packets.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS14-006

2904659
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
Servers
Yes/NoYesImportant Windows 8
Server 2012
Windows RT
Restart Req'dPatch after testing
MS14-010

2909921
Arbitrary code
Privilege elevation
Denial of service
Information disclosure

/ Internet Explorer
Workstations
Terminal Servers
Yes/NoNoCritical Internet Explorer
Restart Req'd; Multiple VulnerabilitiesPatch after testing
MS14-007

2912390
Arbitrary code

/ Direct2D
Workstations
Terminal Servers
No/NoNoCritical Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart Req'dPatch after testing
MS14-005

2916036
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
Yes/YesYesImportant XML Core Services
  
MS14-009

2916607
Privilege elevation

/ .Net Framework
Workstations
Terminal Servers
Yes/YesYesImportant .NET Framework 1.0 SP3
.NET Framework 1.1 SP1
.NET Framework 2.0 SP2
.NET Framework 3.5
.NET Framework 3.5.1
.NET Framework 4
.NET Framework 4.5
.NET Framework 4.5.1
Restart Req'd; Multiple VulnerabilitiesPatch after testing
MS14-008

2927022
Arbitrary code

/ Microsoft Forefront Protection 2010 for Exchange
Exchange Servers
No/NoNoCritical Forefront Protection 2010
Restart Req'dPatch after testing
MS14-011

2928390
Arbitrary code

/ VBScript Scripting Engine
Workstations
Terminal Servers
No/NoYesCritical VBScript 5.6
VBScript 5.7
VBScript 5.8
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources