Thursday 10 October 2013

Microsoft Patch Tuesday: October 2013

Executive Summary

With this October Microsoft Patch Tuesday update, we see a set of 8 updates; 4 of which are marked as “Critical” and 4 rated as “Important”.

The Patch Tuesday Security Update analysis was performed by the Dell ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.

Of the eight patches, 3 "require a restart to load correctly",  and 4 "may require a restart", leaving only one which claims it doesn't need a restart -  so the usual advice is that it is probably best to assume all require a restart to be installed correctly.


Sample Results 

Here are two sample results showing amber warnings generated as a result of patches MS13-080 and MS13-083.





Here is a Sample Summary report:


Testing Summary






Security Update Detailed Summary


MS13-080
Cumulative Security Update for Internet Explorer (KB2879017)
Description
This security update resolves one publicly disclosed vulnerability and nine privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
Browseui.dll, Html.iec, Ieencode.dll, Iepeers.dll, Mshtml.dll, Mshtmled.dll, Mstime.dll, Shdocvw.dll, Tdc.ocx, Url.dll, Urlmon.dll, Vgx.dll, Wininet.dll
Impact
Critical - Remote Code Execution

MS13-081
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (KB2870008)
Description
This security update resolves seven privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user views shared content that embeds OpenType or TrueType font files. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system.
Payload
Atmfd.dll
Impact
Critical - Remote Code Execution

MS13-082
Vulnerabilities in .NET Framework Could Allow Remote Code Execution (KB2878890)
Description
This security update resolves two privately reported vulnerabilities and one publicly disclosed vulnerability in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if a user visits a website containing a specially crafted OpenType font (OTF) file using a browser capable of instantiating XBAP applications.
Payload
No specific file payload
Impact
Critical - Remote Code Execution

MS13-083
Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (KB2864058)
Description
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted web request to an ASP.NET web application running on an affected system. An attacker could exploit this vulnerability without authentication to run arbitrary code.
Payload
Comctl32.dll, Controls.man, Wcomctl32.dll
Impact
Critical - Remote Code Execution

MS13-084
Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (KB2885089)
Description
This security update resolves two privately reported vulnerabilities in Microsoft Office server software. The most severe vulnerability could allow remote code execution if a user opens a specially crafted Office file in an affected version of Microsoft SharePoint Server, Microsoft Office Services, or Web Apps.
Payload
Svrsetup.exe, Wsssetup.dll, Bform.js_1025, Form.js_1025, Rgnlstng.xml_1025, Bform.js_1026, Form.js_1026, Rgnlstng.xml_1026, Bform.js_1027, Form.js_1027, Rgnlstng.xml_1027, Bform.js_1029, Form.js_1029, Rgnlstng.xml_1029, Rgnlstng.xml_1106, Bform.js_1030, Form.js_1030, Rgnlstng.xml_1030, Stsomr.dll_1030, Bform.js_1031, Form.js_1031, Rgnlstng.xml_1031, Bform.js_1032, Form.js_1032, Rgnlstng.xml_1032, Bform.js_1033, Form.js_1033, Rgnlstng.xml_1033, Bform.js_3082, Form.js_3082, Rgnlstng.xml_3082, Bform.js_1061, Form.js_1061, Rgnlstng.xml_1061, Bform.js_1035, Form.js_1035, Rgnlstng.xml_1035, Bform.js_1036, Form.js_1036, Rgnlstng.xml_1036, Avreport.htm_2108, Bpstd.asx_2108, Calendar.css_2108, Core.css_2108, Core.rsx_2108, Datepick.css_2108, Error.htm_2108, Filedlg.htm_0011_2108, Fontdlg.htm_2108, Help.css_2108, Iframe.htm_2108, Instable.htm_2108, Irmrept.htm_2108, Isswfresources_llcc.resx_2108, Menu.css_2108, Mssmsg.dll_0001.x86.2108, Owsnocr.css_2108, Rgnlstng.xml_2108, Selcolor.htm_2108, Spadminlcid.rsx_2108, Spmsg.dll_2108, Spstd1.asx_0001_2108, Spstd2.asx_0001_2108, Spstd3.asx_2108, Spstd4.asx_2108, Spstd5.asx_2108, Spstd6.asx_2108, Spstd7.asx_2108, Spstd8.asx_2108, Spthemes.xml_2108, Stsomr.dll_2108, Workflowactions_intl_resources.dll_2108, Workflows_intl_resources.dll_2108, Wsetupui.dll_2108, Wss.intl.res.dll.x86.2108, Wss.search.oob.sql.x86.2108, Wss.srchadm.rsx.x86.2108, Wsslcid.rsx_2108, _basicpg.htm_2108, _wppage.htm_2108, Bform.js_1037, Form.js_1037, Rgnlstng.xml_1037, Bform.js_1081, Form.js_1081, Rgnlstng.xml_1081, Bform.js_1050, Form.js_1050, Rgnlstng.xml_1050, Bform.js_1038, Form.js_1038, Rgnlstng.xml_1038, Stsomr.dll_1038, Bform.js_1040, Form.js_1040, Rgnlstng.xml_1040, Bform.js_1041, Form.js_1041, Rgnlstng.xml_1041, Bform.js_1087, Form.js_1087, Rgnlstng.xml_1087, Bform.js_1042, Form.js_1042, Rgnlstng.xml_1042, Bform.js_1063, Form.js_1063, Rgnlstng.xml_1063, Bform.js_1062, Form.js_1062, Rgnlstng.xml_1062, Rgnlstng.xml_1071, Rgnlstng.xml_1086, Bform.js_1044, Form.js_1044, Rgnlstng.xml_1044, Bform.js_1043, Form.js_1043, Rgnlstng.xml_1043, Bform.js_1045, Form.js_1045, Rgnlstng.xml_1045, Bform.js_1046, Form.js_1046, Rgnlstng.xml_1046, Stsomr.dll_1046, Bform.js_2070, Form.js_2070, Rgnlstng.xml_2070, Bform.js_1048, Form.js_1048, Rgnlstng.xml_1048, Bform.js_1049, Form.js_1049, Rgnlstng.xml_1049, Bform.js_1051, Form.js_1051, Rgnlstng.xml_1051, Bform.js_1060, Form.js_1060, Rgnlstng.xml_1060, Bform.js_2074, Form.js_2074, Rgnlstng.xml_2074, Bform.js_1053, Form.js_1053, Rgnlstng.xml_1053, Bform.js_1054, Form.js_1054, Rgnlstng.xml_1054, Bform.js_1055, Form.js_1055, Rgnlstng.xml_1055, Stsomr.dll_1055, Bform.js_1058, Form.js_1058, Rgnlstng.xml_1058, Bform.js_1066, Form.js_1066, Rgnlstng.xml_1066, Bform.js_2052, Form.js_2052, Rgnlstng.xml_2052, Bform.js_1028, Form.js_1028, Rgnlstng.xml_1028
Impact
Important - Remote Code Execution

MS13-085
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (KB2885080)
Description
This security update resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file with an affected version of Microsoft Excel or other affected Microsoft Office software. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
Excel.exe
Impact
Important - Remote Code Execution

MS13-086
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (KB2885084)
Description
This security update resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file is opened in an affected version of Microsoft Word or other affected Microsoft Office software. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
Winword.exe, Wwlib.dll
Impact
Important - Remote Code Execution

MS13-087
Vulnerability in Silverlight Could Allow Information Disclosure (KB2890788)
Description
This security update resolves a privately reported vulnerability in Microsoft Silverlight. The vulnerability could allow information disclosure if an attacker hosts a website that contains a specially crafted Silverlight application that could exploit this vulnerability and then convinces a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. Such websites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit a website. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. It could also be possible to display specially crafted web content by using banner advertisements or by using other methods to deliver web content to affected systems.
Payload
Silverlight_developer_x64.exe, Silverlight_x64.exe
Impact
Important - Information Disclosure

* All results are based on the ChangeBASE Application Compatibility Lab’s test portfolio of over 3,000 applications


No comments: