Patch Analysis for January 2015

Happy New Year and to bring it in we have patches that address 4 elevation of privilege vulnerabilities, 2 security feature bypass vulnerabilities, a denial of service and an arbitrary code execution vulnerability.  Start this month with MS14-002 which fixes an arbitrary code execution vulnerability in Telnet.  The good news is there is only one critical patch so it may be a good month to assess the patch testing process.  This doesn't mean that we can take it easy as there are 4 elevation of privelege vulnerabilities that can very important to the post exploitation process of an attack.  Once attackers have a foothold in the network they may need Admin level privileges so I would patch these next. Take a look at MS15-001, MS15-003, MS15-004, and MS15-008 and patch them as soon as you can after testing.  Finally review MS15-005, MS15-006, and MS15-007.  MS15-007 is a denial of service vulnerability in Internet Authentication Service (IAS) or Network Policy Server (NPS), if these services are not in use then go ahead and apply MS15-005  and MS15-006 first.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now »

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS15-006

3004365
Security feature bypass

/ Windows Error Reporting
Workstations
Terminal Servers
Servers
No/NoNoImportant Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate after testing
MS15-007

3014029
Denial of service

/ Microsoft Windows
Servers
No/NoNoImportant Server 2003
Server 2008
Server 2008 R2
Server 2012
Server 2012 R2
May require restartUpdate after testing
MS15-008

3019215
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoYesImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate after testing
MS15-002

3020393
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Server 2012 R2
Windows 8.1
May require restartUpdate immediately
MS15-003

3021674
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate after testing
MS15-005

3022777
Security feature bypass

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Server 2012 R2
Windows 8.1
Requires restartUpdate after testing
MS15-001

3023266
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate after tsting
MS15-004

3025421
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoYesImportant Vista
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.