Thursday 5 November 2009

MS09-054: IE8 Security Update - Updated

    October 2009 saw the biggest Microsoft security update - both in terms of breadth and depth of patches delivered  and bugs fixed.
    However, we have seen three updates to this October Security update over the past few weeks.
    On October 14, Microsoft offered up a workaround for a problem with MS09-056, then corrected several errors in MS09-062 last week.
    The company also revised an August update, MS09-043, last week to correct a patch-detection error that may have left some corporate users who receive updates via Windows Server Update Services (WSUS) un-patched.
    Now, the Internet Explorer (IE) 8 Patch MS09-054 was updated on November 3rd with a binary level revision of the security files.
    From our last AOK Patch Tuesday assessment, here are the details for this patch.
    MS09-054
    Cumulative Security Update for Internet Explorer (974455)
    Description
    This security update resolves three privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
    Payload
    Iecustom.dll, Browseui.dll, Cdfview.dll, Danim.dll, Dxtmsft.dll, Dxtrans.dll, Iepeers.dll, Inseng.dll, Jsproxy.dll, Mshtml.dll, Msrating.dll, Mstime.dll, Pngfilt.dll, Shdocvw.dll, Shlwapi.dll, Urlmon.dll, Wininet.dll, Browseui.dll, Cdfview.dll, Danim.dll, Dxtmsft.dll, Dxtrans.dll, Iepeers.dll, Inseng.dll, Jsproxy.dll, Mshtml.dll, Msrating.dll, Mstime.dll, Pngfilt.dll, Shdocvw.dll, Shlwapi.dll, Urlmon.dll, Wininet.dll, Iecustom.dll
    Impact
    Critical – Remote Code Execution
    We at the AOK Patch team were pretty concerned about this patch and rated it an AMBER due to the number of application overlaps and the potential for impacts on the target Operating system. We have re-run the reports for this patch and the updated BITS do not materially impact the results. However, the AOK team still recommends that this patch requires extensive testing prior to deployment.
    For reference, I have included the RAG status for all of these patches in this blog posting;
    Patch Name
    Total
    Issues
    Matches
    Affected
    Reboot
    Rating
    RAG
    Security Bulletin MS09-050
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-051
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-052
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-053
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-054
    1%
    1%
    YES
    Critical
    Amber
    Security Bulletin MS09-055
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-056
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-057
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-058
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-059
    <1%
    <1%
    YES
    Critical
    Green
    Security Bulletin MS09-060
    1%
    1%
    YES
    Critical
    Amber
    Security Bulletin MS09-061
    1%
    1%
    YES
    Critical
    Amber
    Security Bulletin MS09-062
    11%
    <1%
    YES
    Critical
    Red

    And, for all those not rabidly following the AOK "Language of Life", we use Red,  Amber and Green to colour our world. So, here is a legend for these results.
    Legend:
    No Issue
    No Issues Detected
    Fixable
    Potentially fixable application Impact
    Serious
    Serious Compatibility Issue

No comments: