With this April Microsoft Patch Tuesday update, we see a set of 9 updates; 2 of which are marked as “Critical” and 7 rated as “Important”.
The Patch Tuesday Security Update analysis was performed by the Quest ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.
The Patch Tuesday Security Update analysis was performed by the Quest ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.
Of the nine patches, 6 "require a restart to load correctly", 3 "may require a restart", so as usual, it is probably best to assume all require a restart to be installed correctly.
Sample Results
Here is a sample of the results for two packages, seen in ChangeBASE having reported against the patch Tuesday updates:
And, here is another sample output from the ChangeBASE Patch Impact Analysis
And, here is another sample output from the ChangeBASE Patch Impact Analysis
Here is a sample summary report generated.
And, here is the overview of the patches and updates from this Microsoft Patch Tuesday on April 2013
And, here is the overview of the patches and updates from this Microsoft Patch Tuesday on April 2013
Security
Update Detailed Summary
MS13-028
|
Cumulative
Security Update for Internet Explorer (2817183)
|
Description
|
This security update resolves two
privately reported vulnerabilities in Internet Explorer. These
vulnerabilities could allow remote code execution if a user views a specially
crafted webpage using Internet Explorer. An attacker who successfully
exploited these vulnerabilities could gain the same user rights as the
current user. Users whose accounts are configured to have fewer user rights
on the system could be less impacted than users who operate with
administrative user rights.
|
Payload
|
Browseui.dll, Html.iec, Ie4uinit.exe,
Ie9props.propdesc, Ieencode.dll,
Ieframe.dll, Ieframe.ptxml, Iepeers.dll, Ieproxy.dll, Iernonce.dll,
Iertutil.dll, Iesetup.dll, Ieshims.dll, Iesysprep.dll, Iexplore.exe,
Jscript.dll, Jscript9.dll, Jsproxy.dll,
Microsoft-windows-ie-htmlrendering.ptxml, Msfeeds.dll, Msfeeds.mof,
Mshtml.dll, Mshtml.tlb, Mshtmled.dll, Mstime.dll, Shdocvw.dll, Spuninst.exe,
Tdc.ocx, Url.dll, Urlmon.dll, Uxinit.dll, Uxtheme.dll, Vgx.dll, Wininet.dll,
Wow64_ieframe.ptxml, Wow64_microsoft-windows-ie-htmlrendering.ptxml
|
Impact
|
Critical - Remote Code Execution
|
MS13-029
|
Vulnerability
in Remote Desktop Client Could Allow Remote Code Execution (2828223)
|
Description
|
This security update resolves a privately
reported vulnerability in Windows Remote Desktop Client. The vulnerability
could allow remote code execution if a user views a specially crafted
webpage. An attacker who successfully exploited the vulnerability could gain
the same user rights as the current user. Users whose accounts are configured
to have fewer user rights on the system could be less impacted than users who
operate with administrative user rights.
|
Payload
|
Aaclient.dll, Lhmstscx.dll, Spuninst.exe,
Tsgqec.dll, Waaclient.dll, Wlhmstscx.dll, Wtsgqec.dll
|
Impact
|
Critical - Remote Code Execution
|
MS13-030
|
Vulnerability
in SharePoint Could Allow Information Disclosure (2827663)
|
Description
|
This security update resolves a publicly
disclosed vulnerability in Microsoft SharePoint Server. The vulnerability
could allow information disclosure if an attacker determined the address or
location of a specific SharePoint list and gained access to the SharePoint
site where the list is maintained. The attacker would need to be able to
satisfy the SharePoint site's authentication requests to exploit this
vulnerability.
|
Payload
|
No specific file information
|
Impact
|
Important - Information Disclosure
|
MS13-031
|
Vulnerabilities
in Windows Kernel Could Allow Elevation of Privilege (2813170)
|
Description
|
This security update resolves two
privately reported vulnerabilities in Microsoft Windows. The vulnerabilities
could allow elevation of privilege if an attacker logs on to the system and
runs a specially crafted application. An attacker must have valid logon
credentials and be able to log on locally to exploit these vulnerabilities.
|
Payload
|
Spuninst.exe, Ntkrnlmp.exe, Ntkrnlpa.exe,
Ntkrpamp.exe, Ntoskrnl.exe, Fltmgr.sys, Hal.dll, Mpsyschk.dll, Ntdll.dll,
Wntdll.dll
|
Impact
|
Important - Elevation of Privilege
|
MS13-032
|
Vulnerability
in Active Directory Could Lead to Denial of Service (2830914)
|
Description
|
This security update resolves a privately
reported vulnerability in Active Directory. The vulnerability could allow
denial of service if an attacker sends a specially crafted query to the
Lightweight Directory Access Protocol (LDAP) service.
|
Payload
|
Spuninst.exe, Adambsrv_xp.dll,
Adamdsa.dll, Ntdsatq.dll, Xpsp4res.dll
|
Impact
|
Important - Denial of Service
|
MS13-033
|
Vulnerability
in Windows Client/Server Run-time Subsystem (CSRSS) Could Allow Elevation of
Privilege (2820917)
|
Description
|
This security update resolves a privately
reported vulnerability in all supported editions of Windows XP, Windows
Vista, Windows Server 2003, and Windows Server 2008. The vulnerability could
allow elevation of privilege if an attacker logs on to a system and runs a
specially crafted application. An attacker must have valid logon credentials
and be able to log on locally to exploit this vulnerability.
|
Payload
|
Spuninst.exe, Winsrv.dll
|
Impact
|
Important - Elevation of Privilege
|
MS13-034
|
Vulnerability
in Microsoft Antimalware Client Could Allow Elevation of Privilege
(2823482)
|
Description
|
This security update resolves a privately
reported vulnerability in the Microsoft Antimalware Client. The vulnerability
could allow elevation of privilege due to the pathnames used by the Microsoft
Antimalware Client. An attacker who successfully exploited this vulnerability
could execute arbitrary code and take complete control of an affected system.
The attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights. An attacker must have valid logon
credentials to exploit this vulnerability. The vulnerability could not be
exploited by anonymous users.
|
Payload
|
No specific file information
|
Impact
|
Important - Elevation of Privilege
|
MS13-035
|
Vulnerability
in HTML Sanitization Component Could Allow Elevation of Privilege
(2821818)
|
Description
|
This security update resolves a privately
reported vulnerability in Microsoft Office. The vulnerability could allow
elevation of privilege if an attacker sends specially crafted content to a
user.
|
Payload
|
Infopath.exe, Ipdesign.dll, Ipolk.dll,
Ipeditor.dll
|
Impact
|
Important - Elevation of Privilege
|
MS13-036
|
Vulnerabilities
in Kernel-Mode Driver Could Allow Elevation Of Privilege (2829996)
|
Description
|
This security update resolves three
privately reported vulnerabilities and one publicly disclosed vulnerability
in Microsoft Windows. The most severe of these vulnerabilities could allow
elevation of privilege if an attacker logs on to the system and runs a
specially crafted application. An attacker must have valid logon credentials
and be able to log on locally to exploit the most severe vulnerabilities.
|
Payload
|
Spuninst.exe, Win32k.sys
|
Impact
|
Important - Elevation of Privilege
|
*All results are based on an AOK
Application Compatibility Lab’s test portfolio of over 1,000 applications.
No comments:
Post a Comment