Application Compatibility Update with Quest® Workspace™ ChangeBASE
Executive Summary
With this May Microsoft Patch Tuesday update, we see a set of 10 updates; 2 of which are marked as “Critical” and 8 rated as “Important”.
The Patch Tuesday Security Update analysis was performed by the Quest ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.
Of the ten patches, 3 "require a restart to load correctly", and 7 "may require a restart", so as usual, it is probably best to assume all require a restart to be installed correctly.
Sample Results
Here is a sample of an application found to be vulnerable to the issue fixed in the security patch for Microsoft Visio.
Executive Summary
With this May Microsoft Patch Tuesday update, we see a set of 10 updates; 2 of which are marked as “Critical” and 8 rated as “Important”.
The Patch Tuesday Security Update analysis was performed by the Quest ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.
Of the ten patches, 3 "require a restart to load correctly", and 7 "may require a restart", so as usual, it is probably best to assume all require a restart to be installed correctly.
Sample Results
Here is a sample of an application found to be vulnerable to the issue fixed in the security patch for Microsoft Visio.
And, here is the ChangeBASE Patch Tuesday Red, Amber, Green (RAG) status for May 2013
Security Update Detailed Summary
MS13-037
|
Cumulative
Security Update for Internet Explorer (2829530)
|
Description
|
This security update resolves eleven
privately reported vulnerabilities in Internet Explorer. The most severe
vulnerabilities could allow remote code execution if a user views a specially
crafted webpage using Internet Explorer. An attacker who successfully
exploited the most severe of these vulnerabilities could gain the same user
rights as the current user. Users whose accounts are configured to have fewer
user rights on the system could be less impacted than users who operate with
administrative user rights.
|
Payload
|
Browseui.dll, Html.iec, Ieencode.dll, Iepeers.dll,
Mshtml.dll, Mshtmled.dll, Mstime.dll, Shdocvw.dll, Tdc.ocx, Url.dll,
Urlmon.dll, Vgx.dll, Wininet.dll, W03a3409.dll, Wbrowseui.dll, Wdxtmsft.dll,
Wdxtrans.dll, Whtml.iec, Wieencode.dll, Wiepeers.dll, Wmshtml.dll,
Wmshtmled.dll, Wmstime.dll, Wpngfilt.dll, Wshdocvw.dll, Wtdc.ocx, Wurl.dll,
Wurlmon.dll, Wvgx.dll, Advpack.dll, Corpol.dll, Dxtmsft.dll, Dxtrans.dll,
Extmgr.dll, Icardie.dll, e4uinit.exe, Ieakeng.dll, Ieaksie.dll, Ieakui.dll,
Ieapfltr.dat, Ieapfltr.dll, Iedkcs32.dll, Ieencode.dll, Ieframe.dll,
Iepeers.dll, Iernonce.dll, Iertutil.dll, Ieudinit.exe, Iexplore.exe,
Inetcpl.cpl, Jsproxy.dll, Msfeeds.dll, Msfeedsbs.dll, Mshtml.dll,
Mshtmled.dll, Msrating.dll, Mstime.dll, Occache.dll, Pngfilt.dll, Url.dll,
Urlmon.dll, Vgx.dll, Webcheck.dll, Wininet.dll
|
Impact
|
Critical - Remote Code Execution
|
MS13-038
|
Security
Update for Internet Explorer (2847204)
|
Description
|
This security update resolves one
publicly disclosed vulnerability in Internet Explorer. The vulnerability
could allow remote code execution if a user views a specially crafted webpage
using Internet Explorer. An attacker who successfully exploited this
vulnerability could gain the same user rights as the current user. Users
whose accounts are configured to have fewer user rights on the system could
be less impacted than users who operate with administrative user rights.
|
Payload
|
Spuninst.exe, Mshtml.dll, Mshtml.tlb
|
Impact
|
Critical - Remote Code Execution
|
MS13-039
|
Vulnerability
in HTTP.sys Could Allow Denial of Service (2829254)
|
Description
|
This security update resolves a privately
reported vulnerability in Microsoft Windows. The vulnerability could allow
denial of service if an attacker sends a specially crafted HTTP packet to an
affected Windows server or client.
|
Payload
|
No specific payload
|
Impact
|
Important - Denial of Service
|
MS13-040
|
Vulnerabilities
in .NET Framework Could Allow Spoofing (2836440)This security update resolves
one privately reported vulnerability and one publicly disclosed vulnerability
|
Description
|
in the .NET Framework. The more severe of
the vulnerabilities could allow spoofing if a .NET application receives a
specially crafted XML file. An attacker who successfully exploited the vulnerabilities
could modify the contents of an XML file without invalidating the file's
signature and could gain access to endpoint functions as if they were an
authenticated user.
|
Payload
|
No specific payload
|
Impact
|
Important – Spoofing
|
MS13-041
|
Vulnerability
in Lync Could Allow Remote Code Execution (2834695)
|
Description
|
This security update resolves a privately
reported vulnerability in Microsoft Lync. The vulnerability could allow
remote code execution if an attacker shares specially crafted content, such
as a file or program, as a presentation in Lync or Communicator and then
convinces a user to accept an invitation to view or share the presentable content.
In all cases, an attacker would have no way to force users to view or share
the attacker-controlled file or program. Instead, an attacker would have to
convince users to take action, typically by getting them to accept an
invitation in Lync or Communicator to view or share the presentable content.
|
Payload
|
Appshapi.dll, Appshcom.dll, Appshvw.dll,
Communicator.exe, Lcwabext.dll, Ocapi.dll, Ocoffice.dll, Privacypolicy.rtf,
Rtmpltfm.dll, Uccp.dll, Uc.dll
|
Impact
|
Important - Remote Code Execution
|
MS13-042
|
Vulnerabilities
in Microsoft Publisher Could Allow Remote Code Execution (2830397)
|
Description
|
This security update resolves eleven
privately reported vulnerabilities in Microsoft Office. The vulnerabilities
could allow remote code execution if a user open a specially crafted
Publisher file with an affected version of Microsoft Publisher. An attacker
who successfully exploited these vulnerabilities could gain the same user
rights as the current user. Users whose accounts are configured to have fewer
user rights on the system could be less impacted than users who operate with
administrative user rights.
|
Payload
|
Mspub.exe, Prtf9.dll, Pubconv.dll
|
Impact
|
Important - Remote Code Execution
|
MS13-043
|
Vulnerability
in Microsoft Word Could Allow Remote Code Execution (2830399)
|
Description
|
This security update resolves one
privately reported vulnerability in Microsoft Office. The vulnerability could
allow code execution if a user opens a specially crafted file or previews a
specially crafted email message in an affected version of Microsoft Office
software. An attacker who successfully exploited this vulnerability could
gain the same user rights as the current user. Users whose accounts are
configured to have fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
|
Payload
|
Winword.exe, Wordview.Exe, Wdvprtid.Xml
|
Impact
|
Important - Remote Code Execution
|
MS13-044
|
Vulnerability
in Microsoft Visio Could Allow Information Disclosure (2834692)
|
Description
|
This security update resolves a privately
reported vulnerability in Microsoft Office. The vulnerability could allow
information disclosure if a user opens a specially crafted Visio file. Note
that this vulnerability would not allow an attacker to execute code or to
elevate their user rights directly, but it could be used to produce
information that could be used to try to further compromise an affected
system.
|
Payload
|
No specific payload
|
Impact
|
Important - Information Disclosure
|
MS13-045
|
Vulnerability
in Windows Essentials Could Allow Information Disclosure (2813707)
|
Description
|
This security update resolves a privately
reported vulnerability in Windows Essentials. The vulnerability could allow information
disclosure if a user opens Windows Writer using a specially crafted URL. An
attacker who successfully exploited the vulnerability could override Windows
Writer proxy settings and overwrite files accessible to the user on the
target system. In a web-based attack scenario, a website could contain a
specially crafted link that is used to exploit this vulnerability. An
attacker would have to convince users to visit the website and open the
specially crafted link.
|
Payload
|
Win32k.sys
|
Impact
|
Important - Information Disclosure
|
MS13-046
|
Vulnerabilities
in Kernel-Mode Drivers Could Allow Elevation Of Privilege (2840221)
|
Description
|
This security update resolves three
privately reported vulnerabilities in Microsoft Windows. The vulnerabilities
could allow elevation of privilege if an attacker logs on to the system and
runs a specially crafted application. An attacker must have valid logon
credentials and be able to log on locally to exploit these vulnerabilities.
|
Payload
|
Cdd.dll, Dxgkrnl.sys, Dxgmms1.sys,
Lddmcore.ptxml
|
Impact
|
Important - Elevation of Privilege
|
*All results are based on an AOK
Application Compatibility Lab’s test portfolio of over 1,000 applications.
No comments:
Post a Comment