BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

May 2013 Patch Tuesday

Post by BeyondTrust Research Team May 14, 2013

In May’s Patch Tuesday, the fixes provided by Microsoft mostly target client-sided applications, along with a fix for a server-sided component. These 10 patches address 33 vulnerabilities in Internet Explorer (including the recent 0day), .NET, Lync, Publisher, Word, Visio, Windows Essentials, Kernel mode drivers, and the HTTP.sys component.

Two patches were released this month for Internet Explorer. The first bulletin, MS13-037, affects every version of Internet Explorer, 6 through 10, and therefore affects every version of Windows. 10 use after free vulnerabilities were addressed, along with an information disclosure vulnerability. Three of the CVEs, CVE-2013-1308, CVE-2013-1309, and CVE-2013-2551, affect every version as well, so attackers will likely be focusing on those CVEs in an attempt to target as broad of an audience as possible with the least amount of effort as is needed. The second bulletin, MS13-038, addresses the Internet Explorer 0day that was publicly disclosed on May 3rd. Take note that while no known attack vectors exist for Internet Explorer 9 in the default configuration, the vulnerable component still exists and is therefore receiving an update.

The next bulletin, MS13-039, addresses a privately reported denial of service vulnerability in Windows 8, Server 2012, and RT. This is possible by simply sending a specially crafted HTTP header to a vulnerable server, causing it to go into an infinite loop. Attackers will be interested in this vulnerability because it affects the latest versions of Windows Server and can trivially be exploited by attackers. Even though this bulletin is only rated as important, it should be patched immediately, since attackers will likely start to leverage this vulnerability as soon as possible.

And what’s a good Patch Tuesday without a little bit of .NET sprinkled in? Microsoft’s got you covered with that in MS13-040, fixing two vulnerabilities: an XML digital signature spoofing vulnerability and an authentication bypass vulnerability. The signature spoofing vulnerability affects multiple versions of .NET (2.0 SP2, 3.5, 3.5.1, 4.0, and 4.5), while the authentication bypass vulnerability only affects version 4.5.

This month’s patch cycle addresses many Office-related vulnerabilities. MS13-041 addresses a privately reported use after free vulnerability in Lync. MS13-042 addresses 11 privately reported remote code execution vulnerabilities in Publisher 2003, 2007, and 2010 (2013 is unaffected). MS13-043 fixes a vulnerability in Word 2003 that is triggered when parsing certain shape data in a specially crafted Word file. MS13-044 addresses an information disclosure vulnerability in Visio 2003, 2007, and 2010 (2013 is unaffected), which could be used to read files from the targeted system.

Windows Essentials received a patch this month in MS13-045, fixing an information disclosure that could allow an attacker to override Windows Writer proxy settings and overwrite any files the user has access to on the system. While both Windows Essentials 2011 and 2012 are affected, only Windows Essentials 2012 is receiving updates. Therefore, if you are using Windows Essentials 2011, it is very highly recommended that you upgrade to Windows Essentials 2012, so that you can continue receiving security updates.

Lastly, MS13-046 closes out the month with a fix for three privately reported local elevation of privilege vulnerabilities in Windows Kernel mode drivers. The most severe of these vulnerabilities, CVE-2013-1334, only affects Windows XP, allowing an attacker to run processes in an elevated context.

Be sure to patch Internet Explorer (MS13-037 and MS13-038) as soon as possible, along with MS13-039 on internet-facing web servers, followed by the rest of the patches. Also, be sure to join us for the Vulnerability Expert Forum tomorrow, Wednesday, April 15 at 1pm PT, where we cover these patches, as well as other security news. Sign up here.

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,