Wednesday 28 July 2010

IE Browser Compatibility Webinar

Late last week we announced the imminent launch of our web browser compatibility and rendering solution, read the release here. The fact that in 2010 we’re now seeing a ratio of 1.2 web applications to one native application as opposed to the 1 web application for every 10 native applications in 2003, illustrates the rapid increase of web-based applications into the corporate environment.

What we see as the key compatibility challenges facing organisations migrating to IE8 are:
  • Compatibility of web-based applications that need to integrate with the browser to enable functionality – for example where services have been deprecated or restricted within IE that are required by the application, such as DEP/NX
  • Rendering issues where  a website, rather than an application, may not render or display correctly or certain buttons or links may not work
I should say that we have been able to deal with application compatibility issues for web-applications for over a few years but this new plug-in also covers all the pertinent issues of web application compatibility with this latest enhancement also catering for websites, intranets and extranets. And that’s the key to a successful migration.

I’m doing a webinar on Thursday 5th August at 5pm BST. If you’re interested in hearing and seeing more, simply click here.

Or use the link here: 





Wednesday 14 July 2010

Microsoft Patch Tuesday: July 2010


With this July Microsoft Patch Tuesday Security Update, we see a moderate number of security updates with 4 updates to Windows XP, Windows 7 and Office including 3 updates rated as Critical, 1 rated as Important. Unfortunately, all patches released this month will most likely require a reboot of the target system. In addition, all of these Microsoft Security Updates relate to Remote Code Execution vulnerabilities.

The ChangeBase AOK Patch Impact team has updated the sample application database to now more than 2000 unique application packages. All of the applications in this large sample application portfolio are analyzed for application level conflicts with Microsoft Security Updates and potential dependencies.
Based on the results of our AOK Application Compatibility Lab only one of the July Patch Tuesday updates is likely to require significant application level testing;


  • MS10-044 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege

We have included a brief snap-shot of some of the results from our AOK Software that demonstrates some of the potential impacts on the OSP application package with the following image. In addition, this high level summary, we have also included a small sample of one of the AOK Summary reports from a smaller sample database (second image).









Testing Summary
  • MS10-042 : "MS10-042 Cumulative Security Update of ActiveX Kill Bits "
  • MS10-043 : "MS10-043 Cumulative Security Update for Internet Explorer "
  • MS10-044 : "MS10-044 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege "
  • MS10-045 : "MS10-045 Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege "


Patch NameTotal
Issues
Matches
Affected
RebootRatingRAG
Microsoft Security Bulletin MS10-042<1%<1%YESGreen
Microsoft Security Bulletin MS10-043<1%<1%YESGreen
Microsoft Security Bulletin MS10-044<0.15%<1%YESAmber
Microsoft Security Bulletin MS10-045<1%<1%YESGreen

Legend:
No IssueNo Issues Detected
FixablePotentially fixable application Impact
SeriousSerious Compatibility Issue

Security Update Detailed Summary
MS10-042Vulnerability in Help and Support Center Could Allow Remote Code Execution
DescriptionThis security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message.
PayloadHelpsvc.exe
ImpactCritical – Remote Code Execution

MS10-043Vulnerability in Canonical Display Driver Could Allow Remote Code Execution
DescriptionThis security update resolves a publicly disclosed vulnerability in the Canonical Display Driver (cdd.dll). Although it is possible that the vulnerability could allow code execution, successful code execution is unlikely due to memory randomization. In most scenarios, it is much more likely that an attacker who successfully exploited this vulnerability could cause the affected system to stop responding and automatically restart.
PayloadCdd.dll, Dxgkrnl.sys, Dxgmms1.sys, Lddmcore.ptxml, Cdd.dll, Dxgkrnl.sys, Dxgmms1.sys
ImpactCritical – Remote Code Execution

MS10-044Vulnerabilities in Microsoft Office Access ActiveX Controls Could Allow Remote Code Execution
DescriptionThis security update resolves two privately reported vulnerabilities in Microsoft Office Access ActiveX Controls. The vulnerabilities could allow remote code execution if a user opened a specially crafted Office file or viewed a Web page that instantiated Access ActiveX controls. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadAccwiz.dll, Acwzlib.accde, Msaccess.exe, Soa.dll, Acwzdat12.accdu, Acwzmain.accde, Acwztool.accde, Acwzusr12.accdu, Utility.accda
ImpactCritical – Remote Code Execution

MS10-045Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution
DescriptionThis security update resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened an attachment in a specially crafted e-mail message using an affected version of Microsoft Office Outlook. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadCnfnot32.exe_0004, Contab32.dll, Dlgsetp.dll, Dumpster.dll, Emablt32.dll, Emsmdb32.dll_0005, Envelope.dll, Exsec32.dll_0001, Impmail.dll, Mimedir.dll, Mlcfg32.cpl_0001, Mlshext.dll, Mspst32.dll_0004, Oladd.fae, Olappt.fae, Oljrnl.fae, Olkfstub.dll, Olmail.fae, Olmapi32.dll, Olnote.fae, Oltask.fae, Omsmain.dll, Omsxp32.dll, Outlctl.dll, Outlmime.dll, Outlook.exe, Outlph.dll, Outlrpc.dll, Outlvba.dll, Outlvbs.dll_0001, Pstprx32.dll, Recall.dll, Rm.dll, Rtfhtml.dll, Scanost.exe, Scanpst.exe_0002, Scnpst32.dll, Scnpst64.dll
ImpactImportant - Remote Code Execution


*All results are based on an AOK Application Compatibility Lab’s test portfolio of over 1,000 applications.

Monday 12 July 2010

July Patch Tuesday - Advance Notice Comments

Tomorrow's Patch Tuesday update from Microsoft contains just four bug fixes - significantly however, it also marks the end of Microsoft’s support for Windows 2000 and Windows XP SP2 - potentially posing a huge hidden challenge for organisations currently running on the two operating systems.

The end of this automated process for the OSs could potentially leave many businesses at serious risk of future security vulnerabilities. Greg Keizer of IT PRO offers some sound words of advice here for organisations wishing to stay safe with XP now the SP 2 updates have been discontinued. However, businesses still running Windows 2000 face a more complex challenge, with no more security updates, non-security hotfixes, or options to engage Microsoft product development resources. Access to free and paid support has also come to an end. Whilst issues are unlikely to surface immediately, the only way to guarantee secure IT continuity is to migrate to a supported platform.

For many organisations, especially those with large application portfolios, the process of a major OS migration may seem like a daunting undertaking. However, there is support out there to simplify the process and ensure a smooth, efficient transition.

Ultimately, for these organisations to ensure their business-critical infrastructure and data is future-proofed, they should be actively looking to migrate to a supported OS such as Windows 7 – and sooner rather than later. With Microsoft’s support for XP SP2 and 2000 now coming to end – and Windows 7 SP1 expected shortly – there has never been a better time to put the wheels in motion.

As soon as we get the Patch Update information from Microsoft, we will update our ChangeBase website and this blog with the latest results.