Jan 092013
 

A variety of servers will need to get attention this month to correct vulnerabilities. Two are rated critical. MS13-001 corrects a print Spooler vulnerability. The remote attacker does not need to be authenticated. The workaround involves disabling the print spooler. Best practice is to disable all unnecessary services.

Vulnerabilities have been noted in XML Core Services with MS13-002 (the other bulletin for critical updates).

Microsoft indicates that SCOM 2007 servers are vulnerable to XSS attacks. It seems if users with access to the SCOM go to a malicious web site, the exploit is possible. It should be noted that SCOM 2007 SP1 has not patch at this time but there is a patch for SCOM 2007 R2.

MS13-004 will affect servers that run untrusted .net applications.

MS13-006 involves a security feature bypass vulnerability in which SSL version 3 or TLS which silently downgrades to SSL version 2 (a weak encryption technology).   The next two affect primarily workstations and Terminal servers .

MS13-005 indicates a vulnerability in the Windows kernel mode driver.

MS13-007 indicates a denial of service attack is possible but not likely with some versions of .net framework in the Open Data Protocol.

Bulletin Exploit Types
/Technologies Affected
System Types Affected Exploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity rating Products Affected Notes Randy’s recommendation
MS13-0032748552 Privilege elevation Servers No/No No Important System Center Config Mgr 2007 Patch after testing
MS13-0022756145 Arbitrary code/ XML Core Services Workstations
Terminal Servers
No/No No Critical XP
Vista
Office 2003
Office 2007
Server 2003
Office Compatibility Pack
Server 2008
Expression Web
XML Core Services
Server 2008 R2
Windows 7
SharePoint Server 2007
Windows 8
Server 2012
Patch after testing
MS13-0042769324 Privilege elevation/ .Net Framework Workstations
Terminal Servers
Servers
No/No No Important XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Patch after testing
MS13-0072769327 Denial of service/ Open Data Protocol Workstations
Servers
No/No No Important XP
Vista
Server 2003
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
MS13-0012769369 Arbitrary code/ Print Spooler Workstations
Servers
No/No Yes Critical Server 2008 R2
Windows 7
Restart Req’d Patch after testing
MS13-0052778930 Privilege elevation/ Windows kernel mode drivers Workstations
Terminal Servers
No/No No Important Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req’d Patch after testing
MS13-0062785220 Security feature bypass/ SSL and TLS Workstations
Servers
No/No No Important Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Restart Req’d Patch after testing

 

Want something better than WSUS, try Lumension Patch and Remediation