Patch Analysis for May 2014

This was an interesting month for Microsoft patches.  There were two critical Internet Explorer vulnerabilities (MS14-021, MS14-029) that were being actively exploited in the wild.  MS14-021 was released out-of-band earlier this month and was publically disclosed.  Updating Internet Explorer should be the top priority this month.  Sharepoint suffers from multiple vulnerabilities (MS14-022) that may allow remote code execution from an authenticated attacker and should be looked at this month since critical data often resides in Sharepoint.  The remaining 6 patches are rated important but pay close attention to MS14-025 and MS14-027 because they are being actively used in attacks that may result in privilege elevation.  MS14-024 fixes a security feature bypass vulnerability that will not allow arbitrary code execution in itself but may be used to in conjunction with another vulnerability to allow arbitrary code execution on a user’s workstation.  This vulnerability is being exploited in the wild as well.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS14-022

2952166
Arbitrary code
Privilege elevation

/ Sharepoint
Sharepoint Servers
No/NoNoCritical SharePoint Server 2007
SharePoint Server 2010
SharePoint Server 2013
Office 2013 Web Apps
Office 2010 Web Apps
SharePoint Designer 2007
SharePoint Designer 2010
SharePoint Designer 2013
Restart Req'd; Multiple VulnerabilitiesPatch after testing
MS14-026

2958732
Privilege elevation

/ .NET Framework
Workstations
Terminal Servers
Servers
No/NoYesImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart Req'dPatch at admin's discretion
MS14-024

2961033
Security feature bypass

/ Microsoft Common Control
Terminal Servers
No/YesNoImportant Office 2007
Office 2010
Office 2013 RT
Office 2013
Restart Req'dPatch after testing
MS14-023

2961037
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoYesImportant Office 2007
Office 2010
Office 2013 RT
Office 2013
Restart Req'd; Multiple VulnerabilitiesPatch after testing
MS14-029

2962482
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/YesNoCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Restart Req'd; Multiple VulnerabilitiesPatch immediately
MS14-028

2962485
Denial of service

/ iSCSI
Servers
No/NoYesImportant Server 2008
Server 2008 R2
Server 2012
Server 2012 R2
Restart Req'dPatch at admin's discretion
MS14-025

2962486
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/YesNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Server 2012 R2
Windows 8.1
Restart Req'dPatch after testing
MS14-027

2962488
Privilege elevation

/ Windows Shell
Workstations
Terminal Servers
Servers
No/YesNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart Req'dPatch after testing
MS14-021

2965111
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/YesYesCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 11
Released out of band, Restart Req'dPatch immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources