Patch Analysis for July 2015

Welcome to this huge July Patch Tuesday Bulletin. This month delivers 14 total patches, 4 critical, and 3 being used in attacks. Start this month off with MS15-065 since there are multiple vulnerabilities fixed and some are being actively attacked. Follow up with MS15-066, MS15-067, and MS15-068 since they are all critical patches for common technologies. MS15-070 and MS15-077 should be applied next since they are important patches fixing privilege elevation vulnerabilities that are being attacked in the wild. Patching MS15-069 and MS15-058 will finish up patches for arbitrary code execution vulnerabilities. The remaining patches fix privilege elevation vulnerabilities and should be prioritized and applied according to your environment.

When it comes to endpoint security, the best first line of defense is patch management. Take the first step to quantifying your IT risk and enhancing your endpoint security posture with the Lumension® Patch Scanner you can:

  • Scan for OS and 3rd party application patches
  • Prioritize remediation to improve security stance
  • Gain visibility into apps being used in your environment
  • Generate web-based reports

Click here assess your vulnerabilities now

Visit the Lumension Patch Tuesday Center

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS15-058

3065718
Arbitrary code

/ SQL Server
SQL Servers
No/NoYesImportant SQL Server 2008
SQL Server 2008 R2
SQL Server 2012
SQL Server 2014
May require restart, multiple vulnerabilitiesUpdate after testing
MS15-076

3067505
Privilege elevation

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart requiredUpdate after testing
MS15-071

3068457
Privilege elevation

/ Windows
Domain Controllers
No/NoNoImportant Server 2003
Server 2008
Server 2008 R2
Server 2012
Server 2012 R2
Restart requiredUpdate after testing
MS15-072

3069392
Privilege elevation

/ Windows
Workstations
Terminal Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart requiredUpdate after testing
MS15-073

3070102
Privilege elevation

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart requiredUpdate after testing
MS15-068

3072000
Arbitrary code

/ Windows
Workstations
Terminal Servers
Servers
Virtual Servers
No/NoNoCritical Server 2008
Server 2008 R2
Windows 8
Server 2012
Server 2012 R2
Windows 8.1
Restart required, multiple vulnerabilitiesUpdate immediately
MS15-066

3072604
Arbitrary code

/ Windows
Workstations
Terminal Servers
Servers
No/NoYesCritical Vista
Server 2003
Server 2008
May require restartUpdate immediately
MS15-070

3072620
Arbitrary code

/ Office
Workstations
Terminal Servers
Sharepoint Servers
No/YesNoImportant Office 2000
Office 2007
SharePoint Server 2007
Office 2010
Office 2011 for MAC
SharePoint Server 2010
SharePoint Server 2013
Office 2013 RT
Office 2013
May require restart, multiple vulnerabilitiesUpdate after testing
MS15-074

3072630
Privilege elevation

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart requiredUpdate after testing
MS15-069

3072631
Arbitrary code

/ Windows
Workstations
Terminal Servers
No/NoYesImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restart, multiple vulnerabilitiesUpdate after testing
MS15-075

3072633
Privilege elevation

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
May require restart, multiple vulnerabilitiesUpdate after testing
MS15-067

3073094
Arbitrary code

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoCritical Server 2008
Windows 7
Server 2012
May require restartUpdate immediately
MS15-065

3076321
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/YesYesCritical Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Restart required, multiple vulnerabilitiesUpdate immediately
MS15-077

3077657
Privilege elevation

/ Windows
Workstations
Terminal Servers
Servers
No/YesNoImportant Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Restart requiredUpdate after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources