BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Microsoft Patch Tuesday – December 2010

Posted December 15, 2010    Chris Silva

To make up for a relaxing November, Microsoft unleashed 17 security bulletins today. That puts their 2010 total at 106 bulletins (unless they release an emergency out of band patch before the end of the year). This is a record for Microsoft – their previous high was 100 bulletins way back in 2000.

It is safe to say that the DLL preloading vulnerability outlined in KB2269637 is one if the causes for the high quantity of patches for the year. In addition to MS10-087 which was released in November, MS10-093, MS10-094, MS10-095, MS10-096 and MS10-097 were released this month to fix the DLL preloading vulnerability in additional Microsoft products. Even though Microsoft has been actively releasing fixes for their affected products, it is still recommended to implement the mitigation steps outlined in KB2269637 as numerous other third-party software products are affected and unpatched.

The second reason for the high yearly total is the Stuxnet worm and its associated vulnerabilities. To date, Microsoft has released MS10-043, MS10-61, MS10-073 and now MS10-092, all related to the Stuxnet worm. The latest bulletin, MS10-092, covers a privilege escalation within Windows Task Manager, and is rated as important.

Another of today’s bulletins (MS10-103) covers five vulnerabilities within Microsoft Publisher. Of the five vulnerabilities, four of them can be mitigated by disabling the Publisher Converter DLL. This is the same mitigation that Microsoft recommended last year for MS09-030. It is also the same mitigation that was recommended back in 2007 for the MS07-037, a similar flaw in Microsoft Publisher discovered by the eEye Research Team. As always, if you don’t require the functionality, it is always best to deploy mitigations to cover not only current vulnerabilities, but also the potential for future vulnerabilities as well.

Also note that document and format converters are prime targets for attack, and are often fuzzed to discover new vulnerabilities. MS10-104, while not a vulnerability within a format converter, is related in that it resides within a service that is utilized to process conversion requests.

If you have no need for this functionality, install the patch and follow the mitigation steps. Or you can play it really safe, and stick to plain text for your next corporate presentation:

    _                                        _                 _
 _ |_   _   \  /   |._  _ ._ _.|_ o|o_|_    |_  ._  _ ._ _|_  |_ _ ._   ._ _
(/_|_\/(/_   \/ |_||| |(/_| (_||_)||| |_\/  |_><|_)(/_|   |_  | (_)| |_|| | |
     /                                  /       |

You can find full details on all 17 security bulletins in newsletter format here. Retina Network Security Scanner customers can view the list of audits associated with these bulletins.

As usual, eEye Digital Security will be hosting the vulnerability expert forum (VEF) on Wednesday, December 15th at 11AM PST. The vulnerability expert forum is a live webcast where the eEye research team will discuss these patches and additional security landscape topics. Be sure to sign up in advance. Marc Maiffret will be making a guest appearance, so be sure to tune in.

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,