Patch Tuesday Analysis for August 2010

None of the vulnerabilities addressed today are currently being exploited but a couple are publicly disclosed. Also don’t miss the out-of-band bulletin MS10-046 from August 2.  Notes on some of the more interesting ones and then the full chart of Fast Facts.

  • MS10-047 addresses 3 vulnerabilities in the Windows Kernel. It can only be exploited by a user logging on locally so only workstations and terminal servers would be affected.
  •  MS10-048 also addresses multiple vulnerabilities, this time in the Windows Kernel mode drivers. One of the five vulnerabilities has been publicly disclosed. Again the attacker would have to be able to log on locally.
  •  MS10-049 covers two schannel vulnerabilities.
  •  MS10-050 patches a vulnerability in Movie Maker can lead to remote code. It is noted that Movie Maker can be installed on Windows 7 but it is not supported. Live Movie Maker is recommended instead. No patch is available for Windows 7.
  • With MS10-051 it should be noted the vulnerability is with XML Core Services 3.0 (MSXML). Software other that windows may install this. Newer versions are not affected and older versions are not supported.
  • MS10-052 handles a vulnerability in an MPEG Codec used for streaming media in Microsoft XP and Win2003.
  • MS10-053 is a cumulative update for Internet Explorer that addresses multiple vulnerabilities.
  • MS10-054 is an SMB Server vulnerability. It affects any computer that does file or print sharing. Domain Controllers are at risk because they always have a share open to all users.
  • MS10-055 addresses a vulnerability in a codec used by Windows Media Player. Therefore workstations and terminal servers would be most likely affected.
  • MS10-056 deals with 4 vulnerabilities in Microsoft Office Word. The workarounds don’t cover every vector and require a shrewd user (of course all of us are). Even viewing an RTF message can lead to trouble.  I always view my Outlook mail first in plain text and only open it further if I trust the sender. But that’s only one of the workarounds. It’s like driving an old truck so I don’t mess up my nice car.
  • MS10-057 is for Office Excel.
  • MS10-058 addresses two networking vulnerabilities in the TCP/IP stack of Windows.
  • Most of us are not familiar with the Tracing Feature for Services in Windows. It’s used for diagnostic traces. MS10-059 indicates there are a couple of vulnerabilities one of which is publicly disclosed.
  • MS10-060 indicates that browsers using Silverlight are at risk. In addition web hosting sites that allow users to upload custom ASP.NET applications can cause the server to be compromised.
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS10-051

2079403
Arbitrary code

/ Windows
Workstations
Terminal Servers
No/NoNoCritical XP
Win2003
Vista
Win2008
XML Core Services
Windows 7
Win2008 R2
XML Core Services 4.0, 5.0 and 6.0 not affected. Restart Req'dPatch after testing
MS10-052

2115168
Arbitrary code

/ MPEG Layer-3 codecs
Workstations
Terminal Servers
No/NoYesCritical XP
Win2003
Restart may be req'dPatch after testing
MS10-048

2160329
Privilege elevation
Denial of service

/ Windows kernal mode drivers
Workstations
Terminal Servers
Yes/NoNoImportant XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing
MS10-053

2183461
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Cumulative Update; Restart Req'dPatch after testing
MS10-060

2265906
Arbitrary code

/ .Net Framework
Workstations
Terminal Servers
Web Servers
No/NoYesCritical XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Silverlight 2
Silverlight 3
Restart may be req'dPatch after testing
MS10-056

2269638
Arbitrary code

/ Office Word
Workstations
Terminal Servers
No/NoNoCritical Office XP
Office 2003
Office 2007
Word Viewer
Office 2004 for Mac
Office 2008 for Mac
Open XML Format Converter Mac
Office Converter Pack
Works 9
 Patch after testing
MS10-057

2269707
Arbitrary code

/ Office Excel
Workstations
Terminal Servers
No/NoNoImportant Office 2003
Office 2004 for Mac
Office 2008 for Mac
Open XML Format Converter Mac
 Patch after testing
MS10-046

2286198
Arbitrary code

/ Windows Shell
Workstations
Terminal Servers
Yes/YesYesCritical XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after minimal testing
MS10-058

978886
Privilege elevation

/ Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing
MS10-049

980436
Arbitrary code
Spoofing

/ Windows
Workstations
Terminal Servers
Web Servers
Yes/NoNoCritical XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing
MS10-047

981852
Privilege elevation
Denial of service

/ Windows
Workstations
Terminal Servers
No/NoNoImportant XP
Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing
MS10-050

981997
Arbitrary code

/ Movie Maker
Workstations
No/NoYesImportant XP
Vista
Restart may be req'dPatch after testing
MS10-054

982214
Arbitrary code

/ SMB Server
Servers
Domain Controllers
No/NoNoCritical XP
Win2003
Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing
MS10-055

982665
Arbitrary code

/ Windows Media Player
Workstations
No/NoYesCritical XP
Vista
Windows 7
 Patch after testing
MS10-059

982799
Privilege elevation

/ Windows
Workstations
Terminal Servers
Yes/NoNoImportant Vista
Win2008
Windows 7
Win2008 R2
Restart Req'dPatch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Tuesday Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.