Patch Analysis for January 2011

Just 2 Bulletins today both affecting workstations.

MS11-001 addresses a vulnerability in Windows Backup Manager only on Vista workstations.  It is publicly disclosed and proof-of-concepts have been made public.  To exploit this on the Internet, a user would have to be convinced that backing up on to the attacker's site is OK.  But you know losers - ahem - users!
MS11-002 is about 2 vulnerabilities with MDAC or WDAC (Data Access Components). We recommend giving first attention to this as it involves all supported versions of Windows and MDAC/WDAC. In the default Windows configuration with no third-party ODBC applications workstations are safe from the first vulnerability. For the second vulnerability as a workaround you can disable the ADO DLL but this will break MDAC.  
Ever wonder what the difference is between WSUS and enterprise, cross platform patch management systems like Lumension Patch and Remediation?  There's a big difference and you need the extra functionality more than ever as non MS vulnerabilities like those with Adobe products and Java overtake MS in terms of patch quantity and effort.  Check out this whitepaper: Lumension VMS vs Microsoft WSUS.
BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
MS severity ratingProducts AffectedNotesRandy's recommendation

Arbitrary code

Terminal Servers
No/NoNoCritical XP
Server 2003
Server 2008
MS Data Access Components
Server 2008 R2
Windows 7
 Patch after testing

Arbitrary code

/ Backup Manager
Yes/NoNoImportant Vista
 Patch after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.


Additional Resources