Patch Analysis for May 2010
Last week Microsoft alerted us to a possible vulnerability in Sharepoint sites (specifically cross-site scripting or XSS). No patch was released for that today so we expect something in the future-perhaps an out-of-band release.
Otherwise, the two bulletins this month are rated critical. One is for VBA and Office and the other the Windows platform.
The VBA related patch (MS10-031) is an unusual situation. Because VBA is part of Office products but also a separate product that ISV developers can build into their applicaitons to allow their users ability to customize their application. The developer tool version of Microsoft VBA is sold through Summit Software. If your company develops software and uses Microsoft VBA you will want to read this one carefully - otherwise just pay attention to bits about Office and VBA. MS10-030 is for a vulnerability in Outlook Express and Windows Mail. The “workaround” suggests using web-based mail instead. For corporations this shouldn't be an issue anyway since you are probably using Outlook or someother mail client. You should still patch though incase users are using Windows Mail or Outlook Express to connect to personal accounts.
|System Types Affected||Exploit|
/ Being exploited?
|MS severity rating||Products Affected||Notes||Randy's recommendation|
|Arbitrary code |
/ Visual Basic for Applications
|No/No||Yes||Critical ||Office XP |
|Restart may be req'd||Patch after testing|
|Arbitrary code |
/ Windows Outlook Express and Mail
|No/No||No||Critical ||Win2000 |
|Restart Req'd||Patch after testing|
Receive Randy's same-day, independent analysis each Patch Tuesday
We will not share your address. Unsubscribe anytime.
"Thank you. I am very glad I subscribed to this newsletter.
Relevant content clearly and concisely. Finally!!!"
- John K.
"I really like the Fast Facts on this Month's Microsoft
Security Bulletins. Do you keep old copies? If yes, please let me know how I can
"Thanks, Randy. Your regular updates have streamlined my
monthly patching. Much appreciated,"
- Steve T.
"Really appreciate your patch observor. In the corporate
IT world, anything we can get our hands on that speeds the process of analyzing
threats and how they may or may not apply to our environments is a God-send.
Thanks so much for your efforts."
- Tess G.
"Many thanks for this Randy"
- Roger G.
"The chart is a REAAALLY good idea :)"
- Phil J.
"I like the table. Your insight is very valuable. "
"I liked your high level overview of patches in the
table. There are so many sources of patch information which can be very specific
or surrounded by other stuff that it’s refreshing to get everything summarised
like this. The “Randy’s Recommendation” comment is useful starting point too.
Please keep up the good work."
- David A.
"Your Patch Observer is a very good tool in
making the decision whether to patch or not to patch. And also to patch asap or
to wait a while before patching. Also I do think the use of the table is realy
improving the readability of the provided information."
- Gerard T.