Application Compatibility Update with Dell Software's ChangeBASE
Executive Summary
With this December Microsoft Patch Tuesday update, there are 11 updates; 5 of which are marked as “Critical” and 6 rated as “Important”.
The Patch Tuesday Security Update analysis was performed by the Dell ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.
Of the eleven patches, 4 "require a restart to load correctly", and 5 "may require a restart", and 2 indicate they "do not need a re-start" so until we see all patches in the "do not require a restart" our advice is that it is probably best to assume all require a restart to be installed correctly.
Sample Results
Here are two sample results showing amber warnings generated as a result of patches MS-096 & MS-099.


With this December Microsoft Patch Tuesday update, there are 11 updates; 5 of which are marked as “Critical” and 6 rated as “Important”.
The Patch Tuesday Security Update analysis was performed by the Dell ChangeBASE Patch Impact team and identified a small percentage of applications from the thousands of applications included in testing for this release which showed amber issues.
Of the eleven patches, 4 "require a restart to load correctly", and 5 "may require a restart", and 2 indicate they "do not need a re-start" so until we see all patches in the "do not require a restart" our advice is that it is probably best to assume all require a restart to be installed correctly.
Sample Results
Here are two sample results showing amber warnings generated as a result of patches MS-096 & MS-099.
Here is a Sample Summary report

Testing Summary
 

 
 
 
 
 
 
 
 
 
 
 
Testing Summary
| 
MS13-096 | 
Vulnerability in Microsoft Graphics Component Could allow Remote
  Code Execution(KB2908005) | 
| 
MS13-097 | 
Cumulative Security Update for Internet Explorer (KB2898785) | 
| 
MS13-098 | 
Vulnerability in Windows Could Allow Remote Code Execution (KB2893294) | 
| 
MS13-099 | 
Vulnerability in Microsoft Scripting Runtime Object Library
  Could Allow Remote Code Execution (KB2909158) | 
| 
MS13-100 | 
Vulnerabilities in Microsoft SharePoint Server Could Allow
  Remote Code Execution(KB2904244) | 
| 
MS13-101 | 
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow
  Elevation of Privilege(KB2880430) | 
| 
MS13-102 | 
Vulnerability in LRPC Client Could Allow Elevation of Privilege (KB2898715) | 
| 
MS13-103 | 
Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (KB2905244) | 
| 
MS13-104 | 
Vulnerability in Microsoft Office Could Allow Information
  Disclosure (KB2909976) | 
| 
MS13-105 | 
Vulnerabilities in Microsoft Exchange Server Could Allow Remote
  Code Execution(KB2915705) | 
| 
MS13-106 | 
Vulnerability in a Microsoft Office Shared Component Could Allow
  Security Feature Bypass (KB2905238) | 
Security Update Detailed Summary
| 
MS13-096 | 
Vulnerability in Microsoft Graphics
  Component Could allow Remote Code Execution(KB2908005) | 
| 
Description | 
This security update resolves a publicly disclosed vulnerability in
  Microsoft Windows, Microsoft Office, and Microsoft Lync. The vulnerability
  could allow remote code execution if a user views content that contains
  specially crafted TIFF files. | 
| 
Payload | 
Gdiplus.dll | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS13-097 | 
Cumulative Security Update for Internet
  Explorer (KB2898785) | 
| 
Description | 
This security update resolves seven
  privately reported vulnerabilities in Internet Explorer. The most severe
  vulnerabilities could allow remote code execution if a user views a specially
  crafted webpage using Internet Explorer. An attacker who successfully
  exploited the most severe of these vulnerabilities could gain the same user
  rights as the current user. Users whose accounts are configured to have fewer
  user rights on the system could be less impacted than users who operate with
  administrative user rights. | 
| 
Payload | 
Browseui.dll, Html.iec, Ieencode.dll,
  Iepeers.dll, Mshtml.dll, Mshtmled.dll, Mstime.dll, Shdocvw.dll, Tdc.ocx,
  Url.dll, Urlmon.dll, Vgx.dll, Wininet.dll | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS13-098 | 
Vulnerability in Windows Could Allow Remote Code Execution (KB2893294) | 
| 
Description | 
This security update resolves a privately reported vulnerability in
  Microsoft Windows. The vulnerability could allow remote code execution if a
  user or application runs or installs a specially crafted, signed portable
  executable (PE) file on an affected system. | 
| 
Payload | 
Imagehlp.dll | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS13-099 | 
Vulnerability in Microsoft Scripting Runtime
  Object Library Could Allow Remote Code Execution (KB2909158) | 
| 
Description | 
This security update resolves a
  privately reported vulnerability in Microsoft Windows. The vulnerability
  could allow remote code execution if an attacker convinces a user to visit a
  specially crafted website or a website that hosts specially crafted content.
  An attacker who successfully exploited this vulnerability could gain the same
  user rights as the local user. Users whose accounts are configured to have
  fewer user rights on the system could be less impacted than users who operate
  with administrative user rights. | 
| 
Payload | 
Cscript.exe, Dispex.dll, Scrobj.dll,
  Scrrun.dll, Wscript.exe, Wshcon.dll, Wshom.ocx | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS13-100 | 
Vulnerabilities in Microsoft SharePoint
  Server Could Allow Remote Code Execution (KB2904244) | 
| 
Description | 
This security update resolves multiple
  privately reported vulnerabilities in Microsoft Office server software. These
  vulnerabilities could allow remote code execution if an authenticated
  attacker sends specially crafted page content to a SharePoint server. An
  attacker who successfully exploited these vulnerabilities could run arbitrary
  code in the security context of the W3WP service account on the target
  SharePoint site. | 
| 
Payload | 
No specific file payload | 
| 
Impact | 
Important - Remote Code Execution | 
| 
MS13-101 | 
Vulnerabilities in Windows Kernel-Mode
  Drivers Could Allow Elevation of Privilege (KB2880430) | 
| 
Description | 
This security update resolves five privately reported vulnerabilities
  in Microsoft Windows. The more severe of these vulnerabilities could allow
  elevation of privilege if an attacker logs on to a system and runs a
  specially crafted application. An attacker must have valid logon credentials
  and be able to log on locally to exploit this vulnerability. | 
| 
Payload | 
Win32k.sys | 
| 
Impact | 
Important - Elevation of Privilege | 
| 
MS13-102 | 
Vulnerability in LRPC Client Could Allow
  Elevation of Privilege (KB2898715) | 
| 
Description | 
This security update resolves a privately reported vulnerability in
  Microsoft Windows. The vulnerability could allow elevation of privilege if an
  attacker spoofs an LRPC server and sends a specially crafted LPC port message
  to any LRPC client. An attacker who successfully exploited the vulnerability
  could then install programs; view, change, or delete data; or create new
  accounts with full administrator rights. An attacker must have valid logon
  credentials and be able to log on locally to exploit this vulnerability. | 
| 
Payload | 
Rpcrt4.dll, W03a3409.dll, Wrpcrt4.dll,
  Ww03a3409.dll | 
| 
Impact | 
Important - Elevation of Privilege | 
| 
MS13-103 | 
Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (KB2905244) | 
| 
Description | 
This security update resolves a privately reported vulnerability in
  ASP.NET SignalR. The vulnerability could allow elevation of privilege if an
  attacker reflects specially crafted JavaScript back to the browser of a
  targeted user. | 
| 
Payload | 
Microsoft.AspNet.SignalR.Core.dll | 
| 
Impact | 
Important - Elevation of Privilege | 
| 
MS13-104 | 
Vulnerability in Microsoft Office Could
  Allow Information Disclosure (KB2909976) | 
| 
Description | 
This
  security update resolves one privately reported vulnerability in Microsoft
  Office that could allow information disclosure if a user attempts to open an
  Office file hosted on a malicious website. An attacker who successfully
  exploited this vulnerability could ascertain access tokens used to
  authenticate the current user on a targeted SharePoint or other Microsoft
  Office server site. | 
| 
Payload | 
Mso.dll.x86, Msores.dll, Msosqm.exe,
  Office.dll, Msointl.dll.x86.1025, Msointl.rest.idx_dll.x86.1025, Msointl.dll.idx_dll.x86.1026,
  Msointl.dll.x86.1026, Msointl.rest.idx_dll.x86.1026,
  Msointl.dll.idx_dll.x86.1027, Msointl.dll.x86.1027,
  Msointl.rest.idx_dll.x86.1027, Msointl.dll.idx_dll.x86.1029,
  Msointl.dll.x86.1029, Msointl.rest.idx_dll.x86.1029, Msointl.dll.idx_dll.x86.1030,
  Msointl.dll.x86.1030, Msointl.rest.idx_dll.x86.1030, Msointl.dll.x86.1031,
  Msointl.rest.idx_dll.x86.1031, Msointl.dll.idx_dll.x86.1032,
  Msointl.dll.x86.1032, Msointl.rest.idx_dll.x86.1032, Msointl.dll.x86.1033,
  Msointl.rest.idx_dll.x86.1033, Msointl.dll.x86.3082,
  Msointl.rest.idx_dll.x86.3082, Msointl.dll.idx_dll.x86.1061,
  Msointl.dll.x86.1061, Msointl.rest.idx_dll.x86.1061,
  Msointl.dll.idx_dll.x86.1069, Msointl.dll.x86.1069,
  Msointl.rest.idx_dll.x86.1069, Msointl.dll.idx_dll.x86.1035, Msointl.dll.x86.1035,
  Msointl.rest.idx_dll.x86.1035, Msointl.dll.x86.1036,
  Msointl.rest.idx_dll.x86.1036, Msointl.dll.idx_dll.x86.1110,
  Msointl.dll.x86.1110, Msointl.rest.idx_dll.x86.1110,
  Msointl.dll.idx_dll.x86.1095, Msointl.dll.x86.1095, Msointl.rest.idx_dll.x86.1095,
  Msointl.dll.x86.1037, Msointl.rest.idx_dll.x86.1037,
  Msointl.dll.idx_dll.x86.1081, Msointl.dll.x86.1081,
  Msointl.rest.idx_dll.x86.1081, Msointl.dll.idx_dll.x86.1050,
  Msointl.dll.x86.1050, Msointl.rest.idx_dll.x86.1050, Msointl.dll.idx_dll.x86.1038,
  Msointl.dll.x86.1038, Msointl.rest.idx_dll.x86.1038,
  Msointl.dll.idx_dll.x86.1057, Msointl.dll.x86.1057,
  Msointl.rest.idx_dll.x86.1057, Msointl.dll.x86.1040,
  Msointl.rest.idx_dll.x86.1040, Msointl.dll.x86.1041,
  Msointl.rest.idx_dll.x86.1041, Msointl.dll.idx_dll.x86.1087,
  Msointl.dll.x86.1087, Msointl.rest.idx_dll.x86.1087,
  Msointl.dll.idx_dll.x86.1099, Msointl.dll.x86.1099,
  Msointl.rest.idx_dll.x86.1099, Msointl.dll.x86.1042,
  Msointl.rest.idx_dll.x86.1042, Msointl.dll.idx_dll.x86.1063, Msointl.dll.x86.1063,
  Msointl.rest.idx_dll.x86.1063, Msointl.dll.idx_dll.x86.1062,
  Msointl.dll.x86.1062, Msointl.rest.idx_dll.x86.1062,
  Msointl.dll.idx_dll.x86.1086, Msointl.dll.x86.1086,
  Msointl.rest.idx_dll.x86.1086, Msointl.dll.idx_dll.x86.1044,
  Msointl.dll.x86.1044, Msointl.rest.idx_dll.x86.1044, Msointl.dll.x86.1043,
  Msointl.rest.idx_dll.x86.1043, Msointl.dll.idx_dll.x86.1045,
  Msointl.dll.x86.1045, Msointl.rest.idx_dll.x86.1045, Msointl.dll.x86.1046,
  Msointl.rest.idx_dll.x86.1046, Msointl.dll.idx_dll.x86.2070, Msointl.dll.x86.2070,
  Msointl.rest.idx_dll.x86.2070, Msointl.dll.idx_dll.x86.1048,
  Msointl.dll.x86.1048, Msointl.rest.idx_dll.x86.1048, Msointl.dll.x86.1049,
  Msointl.rest.idx_dll.x86.1049, Msointl.dll.idx_dll.x86.1051,
  Msointl.dll.x86.1051, Msointl.rest.idx_dll.x86.1051,
  Msointl.dll.idx_dll.x86.1060, Msointl.dll.x86.1060,
  Msointl.rest.idx_dll.x86.1060, Msointl.dll.idx_dll.x86.2074,
  Msointl.dll.x86.2074, Msointl.rest.idx_dll.x86.2074,
  Msointl.dll.idx_dll.x86.1053, Msointl.dll.x86.1053,
  Msointl.rest.idx_dll.x86.1053, Msointl.dll.idx_dll.x86.1054,
  Msointl.dll.x86.1054, Msointl.rest.idx_dll.x86.1054,
  Msointl.dll.idx_dll.x86.1055, Msointl.dll.x86.1055,
  Msointl.rest.idx_dll.x86.1055, Msointl.dll.idx_dll.x86.1058,
  Msointl.dll.x86.1058, Msointl.rest.idx_dll.x86.1058, Msointl.dll.idx_dll.x86.1066,
  Msointl.dll.x86.1066, Msointl.rest.idx_dll.x86.1066, Msointl.dll.x86.2052,
  Msointl.rest.idx_dll.x86.2052, Msointl.dll.x86.1028,
  Msointl.rest.idx_dll.x86.1028 | 
| 
Impact | 
Important - Information Disclosure | 
| 
MS13-105 | 
Vulnerabilities in Microsoft Exchange Server
  Could Allow Remote Code Execution (KB2915705) | 
| 
Description | 
This security update resolves three
  publicly disclosed vulnerabilities and one privately reported vulnerability
  in Microsoft Exchange Server. The most severe of these vulnerabilities exist
  in the WebReady Document Viewing and Data Loss Prevention features of
  Microsoft Exchange Server. These vulnerabilities could allow remote code
  execution in the security context of the LocalService account if an attacker
  sends an email message containing a specially crafted file to a user on an
  affected Exchange server. The LocalService account has minimum privileges on
  the local system and presents anonymous credentials on the network. | 
| 
Payload | 
No specific file payload | 
| 
Impact | 
Critical - Remote Code Execution | 
| 
MS13-106 | 
Vulnerability in a Microsoft Office Shared
  Component Could Allow Security Feature (KB2905238) | 
| 
Description | 
This security update resolves one
  publicly disclosed vulnerability in a Microsoft Office shared component that
  is currently being exploited. The vulnerability could allow security feature
  bypass if a user views a specially crafted webpage in a web browser capable
  of instantiating COM components, such as Internet Explorer. In a web-browsing
  attack scenario, an attacker who successfully exploited this vulnerability
  could bypass the Address Space Layout Randomization (ASLR) security feature,
  which helps protect users from a broad class of vulnerabilities. The security
  feature bypass by itself does not allow arbitrary code execution. However, an
  attacker could use this ASLR bypass vulnerability in conjunction with another
  vulnerability, such as a remote code execution vulnerability that could take
  advantage of the ASLR bypass to run arbitrary code. | 
| 
Payload | 
No specific file payload | 
| 
Impact | 
Important - Security Feature Bypass | 
* All results are based on the
ChangeBASE Application Compatibility Lab's test portfolio of over 3000
applications.
 
