BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Microsoft Patch Tuesday – July 2011

Post by Chris Silva July 12, 2011

I’m really starting to enjoy the “odd” months, Microsoft kept to their pattern and released only four security bulletins today. A welcome reprieve from last month’s sixteen bulletins.

The only “Critical” rated vulnerability released today affects the Windows Bluetooth 2.1 stack. This particular vulnerability is somewhat interesting due to the attack vector. As you know, Bluetooth is mostly used to connect peripherals over a short range, creating a “Personal Area Network”. As such, an attacker would need to be in relatively close proximity to the victim, even if using a Bluetooth sniffing antenna.

The good news is that by default Windows doesn’t broadcast your 48-bit Bluetooth address, so your computer is not normally “discoverable”. This address is required to connect to your computer and exploit the vulnerability. While there are ways of obtaining this address from communication intercepted between two devices, they are both expensive and time consuming. As such, the chances of a “walk-by” attack while you are drinking your Frappuccino at Starbucks is relatively low.

Even so, it is recommend that you disable Bluetooth (Uncheck “Allow Bluetooth devices to connect to this computer”) if you do not have any essential devices that require it. At a minimum, make sure that “Allow Bluetooth devices to find this computer” is unchecked in your Bluetooth Settings dialog.

For more details, remember to sign up for tomorrow’s Vulnerability Expert Forum (VEF). As there are only a handful of Microsoft bulletins to cover, there should be ample time to touch on other topics and answer your questions.

As for the security updates, here are our recommendations. Retina Network Security Scanner customers can view the list of audits associated with these bulletins.

Deploy As Soon As Possible

MS11-053 – Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (2566220)
Recommendation: Deploy patches as soon as possible. Until the patch can be applied, open the Bluetooth Settings dialog box. Uncheck the box next to the “Allow Bluetooth devices to connect to this computer” setting. Note: this will prevent all Bluetooth devices from connecting to affected systems, which will mean Bluetooth mice and keyboards will be affected, as well.

MS11-054 – Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917)
Recommendation: Deploy patches as soon as possible as no mitigation is currently available.

MS11-055 – Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2560847)
Recommendation: Deploy patches as soon as possible. Until the patch can be applied, block ports 139 and 445 using a firewall, prevent the WebClient service from running, and prevent DLLs from being loaded from WebDAV and remote shares.

MS11-056 – Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2507938)
Recommendation: Deploy patches as soon as possible as no mitigation is currently available.

Leave a Reply

Additional articles

smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,
BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,