With this November Microsoft Patch Tuesday update, we see a set of 6 updates; 4 of which are marked as "Critical", 1 rated "Important" and 1 being a "Moderate" vulnerability.
The Patch Tuesday Security Update analysis was performed by the Quest ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed an Amber issue.
Of the six patches, 3 "require a restart to load correctly", and 3 "may require a restart", so it is probably best to assume all require a restart to be installed correctly
Here is a sample of the results for one package against the patch Tuesday updates:
MS12-071 - Cumulative Security Update for Internet Explorer (2761451)
Quest\ChangeBASE RAG Status Report Summary
Security Update Detailed Summary
| 
MS12-071 | 
Cumulative
  Security Update for Internet Explorer (2761451) | 
| 
Description | 
This security update resolves three
  privately reported vulnerabilities in Internet Explorer. The vulnerabilities
  could allow remote code execution if a user views a specially crafted webpage
  using Internet Explorer. An attacker who successfully exploited these
  vulnerabilities could gain the same user rights as the current user. Users
  whose accounts are configured to have fewer user rights on the system could
  be less impacted than users who operate with administrative user rights. | 
| 
Payload | 
Urlmon.dll, Iexplore.exe, Inetcpl.cpl,
  Jsproxy.dll, Wininet.dll, Wininetplugin.dll, Iedvtool.dll, Msfeeds.dll,
  Msfeeds.mof, Mshtmled.dll, Mshtmled.dll, Mshtml.dll, Mshtml.tlb, Ieproxy.dll,
  Ieshims.dll, Ieunatt.exe, Jsdbgui.dll, Iertutil.dll, Sqmapi.dll,
  Mshtmled.dll, Mshtml.dll, Mshtml.tlb, Ieproxy.dll, Ieshims.dll, Url.dll,
  Ieui.dll, Ieframe.dll, Jscript.dll, Jscript9.dll, Vbscript.dll | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS12-072 | 
Vulnerabilities
  in Windows Shell Could Allow Remote Code Execution (2727528)  | 
| 
Description | 
This security update resolves two
  privately reported vulnerabilities in Microsoft Windows. The vulnerabilities
  could allow remote code execution if a user browses to a specially crafted
  briefcase in Windows Explorer. An attacker who successfully exploited this
  vulnerability could run arbitrary code as the current user. If the current
  user is logged on with administrative user rights, an attacker could take
  complete control of the affected system. An attacker could then install
  programs; view, change, or delete data; or create new accounts with full user
  rights. Users whose accounts are configured to have fewer user rights on the
  system could be less impacted than users who operate with administrative user
  rights. | 
| 
Payload | 
Synceng.dll,
  Wsynceng.dll | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS12-073 | 
Vulnerabilities
  in Microsoft Internet Information Services (IIS) Could Allow Information
  Disclosure (2733829) | 
| 
Description | 
This security update resolves one
  publicly disclosed vulnerability and one privately reported vulnerability in
  Microsoft Internet Information Services (IIS). The more severe vulnerability
  could allow information disclosure if an attacker sends specially crafted FTP
  commands to the server. | 
| 
Payload | 
Ftpconfigext.dll, Ftpctrlps.dll,
  Ftpmib.dll, Ftpres.dll, Ftpsvc.dll, Ftpsvc.mof | 
| 
Impact | 
Moderate - Information Disclosure | 
| 
MS12-074 | 
Vulnerabilities
  in .NET Framework Could Allow Remote Code Execution (2745030)  | 
| 
Description | 
This security update resolves five
  privately reported vulnerabilities in the .NET Framework. The most severe of
  these vulnerabilities could allow remote code execution if an attacker
  convinces the user of a target system to use a malicious proxy auto
  configuration file and then injects code into the currently running
  application. | 
| 
Payload | 
No Specific File Information | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS12-075 | 
Vulnerabilities
  in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
  (2761226)  | 
| 
Description | 
This security update resolves three
  privately reported vulnerabilities in Microsoft Windows. The most severe of
  these vulnerabilities could allow remote code execution if a user opens a
  specially crafted document or visits a malicious webpage that embeds TrueType
  font files. An attacker would have to convince users to visit the website,
  typically by getting them to click a link in an email message that takes them
  to the attacker's website. | 
| 
Payload | 
Win32k.sys | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS12-076 | 
Vulnerabilities
  in Microsoft Excel Could Allow Remote Code Execution (2720184)  | 
| 
Description | 
This security update resolves four
  privately reported vulnerabilities in Microsoft Office. The vulnerabilities
  could allow remote code execution if a user opens a specially crafted Excel
  file with an affected version of Microsoft Excel. An attacker who
  successfully exploited the vulnerabilities could gain the same user rights as
  the current user. Users whose accounts are configured to have fewer user
  rights on the system could be less impacted than users who operate with
  administrative user rights. | 
| 
Payload | 
Excel.Exe | 
| 
Impact | 
Important - Remote Code Execution | 
*All results are based on an AOK
Application Compatibility Lab’s test portfolio of over 1,000 applications. 




 
 
No comments:
Post a Comment