Patch Analysis for June 2014

This month was a relatively easy month for Microsoft updates.  There were no patches released out of band or actively exploited in the wild at this point.  There were two critical patches released which should be the top priority.  MS14-035 provides a security update for Internet Explorer that addresses fifty-seven privately reported vulnerabilities including a remote code execution vulnerability and should be handled first since Internet explorer is a prime target.  Another remote code execution vulnerability (MS14-036) was found in Microsoft Lync that could be exploited by opening a malicious file or webpage.  Apply these patches at the earliest opportunity and then follow up with the bulletins rated Important for this month.  Rounding out the remote code execution trifecta is MS14-034 that fixes vulnerability in Microsoft Office.  This bulletin is only rated important but should be looked at this month.  The remaining updates should be patched after testing and address vulnerabilities such as information disclosure, denial of service, and tampering.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now » 

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS14-031

2962478
Denial of service

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart Req'dUpdate at the earliest convenience
MS14-033

2966061
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
No/NoYesImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May Require RestartUpdate at the earliest convenience
MS14-036

2967487
Arbitrary code

/ Microsoft Office/Lync
Workstations
Terminal Servers
No/NoYesCritical Office 2007
Office 2010
Lync 2010
Lync 2013
Restart Req'dUpgrade Immediately
MS14-032

2969258
Information disclosure

/ Microsoft Lync Server
Servers
No/NoNoImportant Lync 2010
Lync 2013
Lync Server 2010
Lync Server 2013
May Require RestartUpdate at the earliest convenience
MS14-030

2969259
Tampering

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoYesImportant Windows 7
Windows 8
Server 2012
Server 2012 R2
Windows 8.1
May Require RestartUpdate at the earliest convenience
MS14-034

2969261
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoNoImportant Office 2007
May Require RestartUpdate at the earliest convenience
MS14-035

2969262
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Restart Req'd; Multiple VulnerabilitiesUpgrade Immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources