Patch Analysis for February 2015

This February Patch Tuesday delivers 9 patches, 3 of which are critical, and 6 rated important. The patch for Internet Explorer MS15-009 remediates a whopping 41 vulnerabilities so it is safe to say this is the patch to start with. Beyond the sheer quantity of vulnerabilities, one vulnerability is actively used in attacks which provides even more reason to patch quickly. MS15-011 fixes a vulnerability in Group Policy that could allow complete control of systems that are part of the domain. This is the first of 2 group policy vulnerabilities which haven't showed up in the bulletin for quite some time. The third critical vulnerability MS15-015 remediates 6 vulnerabilities in Windows and can grant remote code execution by viewing a site or document with certain embedded TrueType fonts. Apply the 2 Micorosoft Office patches (MS15-012, and MS15-013) as soon as they are safely tested. These patches are rated Imporatant but they can have severe impact since users can be very susceptable to client side attacks that use office attachments. MS15-015 looks like a nasty authenticated attack that could allow the classic privilege escalation if it is exploited. Prioritize MS15-014, MS15-016, and MS15-017 based on your environment and thoroughly tested.

Unwanted and unknown applications can introduce malware, decrease PC performance, consume disk space, reduce network bandwidth and ultimately reduce IT and user productivity. With the free Application Scanner Tool from Lumension you can:

  • Discover all applications and executables in your endpoint environment
  • Validate the integrity of applications and files against known vendor provenance; and
  • Identify and report on systems at risk with the most unknown executables and the most prevalent applications and unknown executables in your organization

Click here to download it now »

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS15-011

3000483
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate immediately
MS15-014

3004361
Security feature bypass

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate after testing
MS15-016

3029944
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restartUpdate after testing
MS15-015

3031432
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Requires restartUpdate after testing
MS15-012

3032328
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoNoImportant Office 2000
Office 2007
Office 2010
Office 2013
Multiple vulnerabilities, may require restartUpdate after testing
MS15-013

3033857
Security feature bypass

/ Microsoft Office
Workstations
Terminal Servers
No/NoYesImportant Office 2007
Office 2010
Office 2013
  
MS15-009

3034682
Arbitrary code

/ Internet Explorer
Workstations
Content Management Servers
No/YesNoCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Multiple vulnerabilities, restart requiredUpdate immediately
MS15-017

3035898
Privilege elevation

/ Microsoft Server Software
Servers
No/NoNoImportant Sys Center VM Mgr 2012 R2
Requires restart 
MS15-010

3036220
Arbitrary code

/ Microsoft Windows
Workstations
No/NoYesCritical Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Multiple vulnerabilities, restart requiredUpdate immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.