Wednesday 15 October 2008

Microsoft Patch Tuesday: October 14 2008




Executive Summary - Massive breadth/depth of changes.
Microsoft's October "Patch Tuesday" Security Update brings us a massive wave of patches with 6 Critical, 4 Important and 1 Moderate update. These are significant updates with one patch (MS08-057) updating more than 50 core files and most of the patches updating key system files, therefore requiring system restarts. The good news is that only one of the patches has wide scale issues for application compatibility. The major concern for this October release is the Internet Explorer Update MS08-058. As in the case with the September updates, updating Internet Explorer components affects a large number of applications in our test portfolio for all Windows desktop/server operating systems including XP and VISTA. Again as in September it is likely that some applications will have performance issues as a result of this update. Here is a sample snippet from the AOK Workbench report on one application. 

This example illustrates how the JAVA application package includes file level dependencies that have been updated by the MS08-085 Security Update 



These three items are critical dependencies with Java. If you have a Java application that uses the IE7 internet control you will need to thoroughly test this application. 

Examples of other applications affected include Oracle 9, several HP printer drivers and some IBM AS400 client access tools. 

We recommend organisations test their key applications affected by this patch before deploying the update and look carefully at the small number of applications affected more widely by these updates. 

Vendors supplying applications in widespead use should have the resource to quickly resolve any issues identified and are likely to have more resiliance in their code to minimize problems with MS08-057. In house developed applications are likely to be more at risk. Without a product like AOK it can takes days per application to identify the code affected by these patches. Many corporates have to 10% to 30% of their applications developed in house so this could run to hundreds of even thousands of individual packages that will need testing. 

Coprorates will be under extreme pressure to release this these new patches to the live environment but proper testing can takes months. 

Testing Summary
  • MS08-56: Marginal impact with low numbers of applications affected
  • MS08-57: Marginal impact with low numbers of applications affected
  • MS08-58: High impact with significant numbers of applications affected
  • MS08-59: Marginal impact with low numbers of applications affected
  • MS08-60: Marginal impact with low numbers of applications affected
  • MS08-61: Medium impact with low numbers of applications affected
  • MS08-62: Medium impact with low numbers of applications affected
  • MS08-63: Medium impact with low numbers of applications affected
  • MS08-64: Medium impact with low numbers of applications affected
  • MS08-65: Marginal impact with low numbers of applications affected
  • MS08-66: Medium impact with low numbers of applications affected

Patch NameTotal Issues% of apps
Affected
RebootRatingRAG
Microsoft Security Bulletin MS08-056<1%<1%YESMNo Issue
Microsoft Security Bulletin MS08-057<1%<1%YESCNo Issue
Microsoft Security Bulletin MS08-058113033%YESCSerious
Microsoft Security Bulletin MS08-059<1%<1%NOCNo Issue
Microsoft Security Bulletin MS08-060<1%<1%YESCNo Issue
Microsoft Security Bulletin MS08-061146<1%YESIFixable
Microsoft Security Bulletin MS08-062136<1%NOIFixable
Microsoft Security Bulletin MS08-063131<1%YESIFixable
Microsoft Security Bulletin MS08-0641971%YESIFixable
Microsoft Security Bulletin MS08-065<1%<1%YESINo Issue
Microsoft Security Bulletin MS08-066127<1%YESIFixable

Legend: 
No IssueNo Issues Detected
FixablePotentially fixable application Impact
SeriousSerious Compatibility Issue

M = Moderate 
I = Important 
C = Critical 

So in the example of MS08-061 we found only 8 of the c. 800 applications in our sample were affected. However a number of these have widespread dependencies. One example being Microsoft Digital Image version 9 where there were 38 separate recorded dependencies i in this application affected by this patch. 

c. 800 applications were tested against these patches using the ChangeBASE ACL (Application Compatibility Lab) 

Security Update Detailed Summary
MS08-056Vulnerability in Microsoft Office Could Allow Information Disclosure (957699)
DescriptionThis security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow information disclosure if a user clicks a specially crafted CDO URL. An attacker who successfully exploited this vulnerability could inject a client-side script in the user's browser that could spoof content, disclose information, or take any action that the user could take on the affected Web site.
PayloadHKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\cdo
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CDO
HKEY_CLASSES_ROOT\PROTOCOLS\Handler\cdo
ImpactInformation Disclosure

MS08-057Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (956416)
DescriptionThis security update resolves three privately reported vulnerabilities in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadNosxs_mfc80cht.dll, Nosxs_mfc80deu.dll, Nosxs_mfc80enu.dll, Nosxs_mfc80esp.dll,
Nosxs_mfc80fra.dll, Nosxs_mfc80ita.dll, Nosxs_mfc80jpn.dll, Nosxs_mfc80kor.dll, Nosxs_mfc80u.dll,
Nosxs_mfcm80.dll, Nosxs_mfcm80u.dll, Nosxs_msvcm80.dll, Nosxs_msvcp80.dll, Nosxs_msvcr80.dll,
Sql90.xsl, Ul_atl80.dll, Ul_mfc80.dll, Ul_mfc80chs.dll, Ul_mfc80cht.dll,
Ul_mfc80deu.dll, Ul_mfc80enu.dll, Ul_mfc80esp.dll, Ul_mfc80fra.dll, Ul_mfc80ita.dll, Ul_mfc80jpn.dll,
Ul_mfc80kor.dll, Ul_mfc80u.dll, Ul_mfcm80.dll, Ul_mfcm80u.dll, Ul_msvcm80.dll, Ul_msvcp80.dll,
Ul_msvcr80.dll, Xlcall32.dll, Xlsrv.dll, Xlsrv.webservices.api.dll, Xmlrw.dll, Xmlrwbin.dll,
Msmdlocal.dll, Msmdlocal.dll, Msmgdsrv.dll, Msmgdsrv.dll, Msolap90.dll, Msolap90.dll, Msolui90.dll,
Msolui90.dll, Msvcm80.dll, Msvcp80.dll, Msvcr80.dll, Sql90.xsl, Sql90.xsl,
ImpactRemote Code Execution

MS08-058Cumulative Security Update for Internet Explorer (956390)
DescriptionThis security update resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. The vulnerabilities could allow information disclosure or remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadIecustom.dll, Browseui.dll, Cdfview.dll, Danim.dll, Dxtmsft.dll, Dxtrans.dll, Iepeers.dll, Inseng.dll,
Jsproxy.dll, Mshtml.dll, Msrating.dll, Mstime.dll, Pngfilt.dll, Shdocvw.dll, Shlwapi.dll, Urlmon.dll,
Wininet.dll, Browseui.dll, Cdfview.dll, Danim.dll, Dxtmsft.dll, Dxtrans.dll, Iepeers.dll, Inseng.dll,
Jsproxy.dll, Mshtml.dll, Msrating.dll, Mstime.dll, Pngfilt.dll, Shdocvw.dll, Shlwapi.dll, Urlmon.dll,
Wininet.dll, Iecustom.dll,
ImpactRemote Code Execution

MS08-059Vulnerability in Host Integration Server RPC Service Could Allow Remote Code Execution (956695)
DescriptionThis security update resolves a privately reported vulnerability in Microsoft Host Integration Server. The vulnerability could allow remote code execution if an attacker sent a specially crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights.
PayloadHisservicelib.dll
Rpcdetct.dll
Snarpcsv.exe
ImpactRemote Code Execution

MS08-060Vulnerability in Active Directory Could Allow Remote Code Execution (957280)
DescriptionThis security update resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows 2000 Server. The vulnerability could allow remote code execution if an attacker gains access to an affected network. This vulnerability only affects Microsoft Windows 2000 servers configured to be domain controllers. If a Microsoft Windows 2000 server has not been promoted to a domain controller, it will not be listening to Lightweight Directory Access Protocol (LDAP) or LDAP over SSL (LDAPS) queries, and will not be exposed to this vulnerability.
PayloadNtdsa.dll
Sp3res.dll
ImpactRemote Code Execution

MS08-061Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211)
DescriptionThis security update resolves one publicly disclosed and two privately reported vulnerabilities in the Windows kernel. A local attacker who successfully exploited these vulnerabilities could take complete control of an affected system. The vulnerabilities could not be exploited remotely or by anonymous users.
PayloadWin32k.sys
W32ksign.dll
Gdi32.dll
Wgdi32.dll
ImpactElevation of Privilege

MS08-062Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155)
DescriptionThis update resolves a privately reported vulnerability in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadMsw3prt.dll
Win32spl.dll
Printcom.dll
ImpactRemote Code Execution

MS08-063Vulnerability in SMB Could Allow Remote Code Execution (957095)
DescriptionThis security update resolves a privately reported vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights.
PayloadSrv.sys
ImpactRemote Code Execution

MS08-064Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege (956841)
DescriptionThis security update resolves a privately reported vulnerability in Virtual Address Descriptor. The vulnerability could allow elevation of privilege if a user runs a specially crafted application. An authenticated attacker who successfully exploited this vulnerability could gain elevation of privilege on an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
PayloadNtkrnlmp.exe
Ntkrnlpa.exe
Ntkrpamp.exe
Ntoskrnl.exe
Hal.dll
ImpactElevation of Privilege

MS08-065Vulnerability in Message Queuing Could Allow Remote Code Execution (951071)
DescriptionThis security update resolves a privately reported vulnerability in the Message Queuing Service (MSMQ) on Microsoft Windows 2000 systems. The vulnerability could allow remote code execution on Microsoft Windows 2000 systems with the MSMQ service enabled.
PayloadMq1repl.dll, Mq1sync.exe, Mqac.sys, Mqads.dll, Mqbkup.exe, Mqcertui.dll, Mqclus.dll, Mqdbodbc.dll,
Mqdscli.dll, Mqdssrv.dll, Mqlogmgr.dll, Mqmig.exe, Mqmigrat.dll, Mqoa.dll, Mqperf.dll, Mqqm.dll,
Mqrperf.dll, Mqrt.dll, Mqsec.dll, Mqsnap.dll, Mqsvc.exe, Mqupgrd.dll, Mqutil.dll, Msmq.cpl, Msmqocm.dll
ImpactRemote Code Execution

MS08-066Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege (956803)
DescriptionThis security update resolves a privately reported vulnerability in the Microsoft Ancillary Function Driver. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
PayloadAfd.sys
ImpactElevation of Privilege

No comments: