BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Microsoft Patch Tuesday – December 2010

Posted December 15, 2010    Chris Silva

To make up for a relaxing November, Microsoft unleashed 17 security bulletins today. That puts their 2010 total at 106 bulletins (unless they release an emergency out of band patch before the end of the year). This is a record for Microsoft – their previous high was 100 bulletins way back in 2000.

It is safe to say that the DLL preloading vulnerability outlined in KB2269637 is one if the causes for the high quantity of patches for the year. In addition to MS10-087 which was released in November, MS10-093, MS10-094, MS10-095, MS10-096 and MS10-097 were released this month to fix the DLL preloading vulnerability in additional Microsoft products. Even though Microsoft has been actively releasing fixes for their affected products, it is still recommended to implement the mitigation steps outlined in KB2269637 as numerous other third-party software products are affected and unpatched.

The second reason for the high yearly total is the Stuxnet worm and its associated vulnerabilities. To date, Microsoft has released MS10-043, MS10-61, MS10-073 and now MS10-092, all related to the Stuxnet worm. The latest bulletin, MS10-092, covers a privilege escalation within Windows Task Manager, and is rated as important.

Another of today’s bulletins (MS10-103) covers five vulnerabilities within Microsoft Publisher. Of the five vulnerabilities, four of them can be mitigated by disabling the Publisher Converter DLL. This is the same mitigation that Microsoft recommended last year for MS09-030. It is also the same mitigation that was recommended back in 2007 for the MS07-037, a similar flaw in Microsoft Publisher discovered by the eEye Research Team. As always, if you don’t require the functionality, it is always best to deploy mitigations to cover not only current vulnerabilities, but also the potential for future vulnerabilities as well.

Also note that document and format converters are prime targets for attack, and are often fuzzed to discover new vulnerabilities. MS10-104, while not a vulnerability within a format converter, is related in that it resides within a service that is utilized to process conversion requests.

If you have no need for this functionality, install the patch and follow the mitigation steps. Or you can play it really safe, and stick to plain text for your next corporate presentation:

    _                                        _                 _
 _ |_   _   \  /   |._  _ ._ _.|_ o|o_|_    |_  ._  _ ._ _|_  |_ _ ._   ._ _
(/_|_\/(/_   \/ |_||| |(/_| (_||_)||| |_\/  |_><|_)(/_|   |_  | (_)| |_|| | |
     /                                  /       |

You can find full details on all 17 security bulletins in newsletter format here. Retina Network Security Scanner customers can view the list of audits associated with these bulletins.

As usual, eEye Digital Security will be hosting the vulnerability expert forum (VEF) on Wednesday, December 15th at 11AM PST. The vulnerability expert forum is a live webcast where the eEye research team will discuss these patches and additional security landscape topics. Be sure to sign up in advance. Marc Maiffret will be making a guest appearance, so be sure to tune in.

Leave a Reply

Additional articles

VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,
dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,