Wednesday 13 March 2013

Microsoft Patch Tuesday: March 2013


Executive Summary



 With this March Microsoft Patch Tuesday update, we see a set of 7 updates; 4 of which are marked as “Critical” and 3 rated as “Important”.

The Patch Tuesday Security Update analysis was performed by the Quest ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.

Of the seven patches, 2 "require a restart to load correctly",  3 "may require a restart", and 2 do not need a restart so, as usual, it is probably best to assume all require a restart to be installed correctly.

Sample Results

Here is a sample of the results for two packages, seen in ChangeBASE having reported against the patch Tuesday updates:




And here is a sample ChangeBASE Summary Report generated against our test lab of over 1000 applications;

And here is a sample of the Patch Testing Overview for that same sample application portfolio tested against these latest March Patch Tuesday updates.



Detailed Report on Microsoft Patch Updates for March 2013

MS13-021
Cumulative Security Update for Internet Explorer (2809289)
Description
This security update resolves eight privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
A.     Advpack.dll, Browseui.dll, Corpol.dll, Desktop.ini, Dxtmsft.dll, Dxtrans.dll, Extmgr.dll, Html.iec, Icardie.dll, Ie4uinit.exe, Ie9props.propdesc, Ieakeng.dll, Ieaksie.dll, Ieakui.dll, Ieapfltr.dat, Ieapfltr.dll, Iedkcs32.dll, Iedvtool.dll, Ieencode.dll, Ieframe.dll, Ieframe.dll.mui, Iepeers.dll, Ieproxy.dll, Iernonce.dll, Iertutil.dll, Iesetup.dll, Ieshims.dll, Iesysprep.dll, Ieudinit.exe, Ieui.dll, Ieunatt.exe, Iexplore.exe, Inetcpl.cpl, Jscript.dll, Jscript9.dll, Jsdbgui.dll, Jsproxy.dll, Licmgr10.dll,  Msfeeds.dll, Msfeeds.mof, Msfeedsbs.dll, Msfeedsbs.mof, Msfeedssync.exe, Mshtml.dll, Mshtml.tlb, Mshtmled.dll, Msrating.dll, Mstime.dll, Occache.dll, Pngfilt.dll, Shdocvw.dll, Spuninst.exe, Sqmapi.dll, Tdc.ocx, Url.dll, Urlmon.dll, Uxinit.dll, Uxtheme.dll, Vbscript.dll, Vgx.dll, W03a3409.dll, Wadvpack.dll, Wbrowseui.dll, Wcorpol.dll, Wdxtmsft.dll, Wdxtrans.dll, Webcheck.dll, Wextmgr.dll, Whtml.iec, Wicardie.dll, Wie4uinit.exe, Wieakeng.dll, Wieaksie.dll, Wieakui.dll, Wieapfltr.dat, Wieapfltr.dll, Wiedkcs32.dll, Wiedvtool.dll, Wieencode.dll, Wieframe.dll, Wieframe.dll.mui, Wiepeers.dll, Wieproxy.dll, Wiernonce.dll, Wiertutil.dll, Wieudinit.exe, Wiexplore.exe, Winetcpl.cpl, Wininet.dll, Wininetplugin.dll, Wjsdbgui.dll, Wjsproxy.dll, Wlicmgr10.dll, Wmsfeeds.dll, Wmsfeedsbs.dll, Wmshtml.dll, Wmshtmled.dll, Wmsrating.dll, Wmstime.dll, Woccache.dll, Wpngfilt.dll, Wshdocvw.dll, Wtdc.ocx, Wurl.dll, Wurlmon.dll, Ww03a3409.dll, Wwebcheck.dll, Wwininet.dll, Wxpshims.dll, Xpshims.dll
Impact
Critical - Remote Code Execution


MS13-022
Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)
Description
This security update resolves a privately reported vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if an attacker hosts a website that contains a specially crafted Silverlight application that could exploit this vulnerability and then convinces a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. Such websites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit a website. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website. It could also be possible to display specially crafted web content by using banner advertisements or by using other methods to deliver web content to affected systems.
Payload
No specific payload
Impact
Critical - Remote Code Execution

MS13-023
Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2801261)
Description
This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
A.     Saext.dll_0001, Seqchk10.dll, Vpreview.exe, Vviewdwg.dll.x64, Vviewdwg.dll.x86, Vviewer.dll.x64, Vviewer.dll.x86, Dwgdp.dll, Savasweb.dll, Sg.dll, Uml.dll, Visbrgr.dll, Visicon.exe,  Visio.exe, Vislib.dll, Msgfilt.dll.x64, Nlhtml.dll_0002.x64, Odffilt.dll.x64, Offfilt.dll_0002.x64
B.     Offfiltx.dll.x64
C.     Onifiltr.dll.x64
D.     Visfilt.dll.x64
Impact
Critical - Remote Code Execution

MS13-024
Vulnerabilities in SharePoint Could Allow Elevation of Privilege (2780176)
Description
This security update resolves four privately reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. The most severe vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes the user to a targeted SharePoint site.
Payload
A.     Microsoft.office.server.webanalytics.dll, Microsoft.office.server.webanalytics.ui.dll, Webanalyticspowershell.format.ps1xml
Impact
Critical - Elevation of Privilege

MS13-025
Vulnerability in Microsoft OneNote Could Allow Information Disclosure (2816264)
Description
This security update resolves a privately reported vulnerability in Microsoft OneNote. The vulnerability could allow information disclosure if an attacker convinces a user to open a specially crafted OneNote file.
Payload
I.         Iecontentservice.Exe, Onbttnie.Dll.X64, Onbttnie.Dll.X86, Onbttnol.Dll, Onbttnppt.Dll, Onbttnwd.Dll, Onenote.Exe, Onenote.Exe.Config, Onenotem.Exe, Onenotemanaged.Dll, Onmain.Dll, Onpptaddin.Dll, Onwordaddin.Dll
Impact
Important - Information Disclosure

MS13-026
Vulnerability in Office Outlook for Mac Could Allow Information Disclosure (2813682)
Description
This security update resolves one privately reported vulnerability in Microsoft Office for Mac. The vulnerability could allow information disclosure if a user opens a specially crafted email message.
Payload
No specific payload
Impact
Important - Information Disclosure

MS13-027
Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege (2807986)
Description
This security update resolves three privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow elevation of privilege if an attacker gains access to a system.
Payload
Usb8023.sys,  Usb8023.sys, Usb8023.sys, Usb8023.sys, Wlaninst.dll, Rndismp6.sys, Rndismpx.sys, Usb80236.sys, Usb8023x.sys, Rndismp6.sys, Rndismpx.sys, Usb80236.sys, Usb8023x.sys, Rndismp6.sys, Rndismpx.sys, Usb80236.sys, Usb8023x.sys, Rndismp6.sys, Rndismpx.sys, Usb80236.sys, Usb8023x.sys
Impact
Important - Elevation of Privilege

* All results are based on the ChangeBASE Application Compatibility Lab’s test portfolio of over 1,000 applications.





No comments: