Tuesday, December 11, 2007

Patch Tuesday Observer: Tough month for workstation admins; server admins get off easy unless you use MSMQ or Windows Media Servers

If you are a server only admin you can rest easy this month except for any servers that have MS Message Queuing installed or Windows Media Servers – those are the only 2 patches that really apply to servers and since neither patch is public you can take your time testing.

If you secure workstations your month is very different. Six of the patches are targeted directly at workstations and 2 are public meaning you need to immediately implement available workarounds or push the patch out with little or no testing. 

Don’t forget that you can use group policy for automating many workarounds. For instance this month you could use group policy to:

  1. Disable the MSMQ service (MS07-65)
  2. Disable SMBv2 via a custom administrative template (MS07-063)
  3. Set deny permissions on quartz.dll (MS07-064, 067 and 068)
  4. Disable Active Scripting and ActiveX (MS07-069)

Other notes:

-          Take my survey and get a free Security Log Mini-Seminar of your choice

-          Register for “Filtering Out the Noise in the Security Log

-          Get $100 of my new Security Log Resource Kit. Use coupon code UWSGOLD.

KB #

Exploit Type

Product

Principle type of systems exposed

Exploit details public? / Being exploited?

Comprehensive, practical workaround available?

MS severity rating

Vulnerable
Windows or
Office versions

Notes

Randy’s recommendation

2000

XP

2003

Vista/ 2008

MS07-063

(KB942624)

Arbitrary code

Vista only

Workstations

No/No

Yes

Important

No

No

No

Yes

SMBv2 signing

Temporarily disable SMBv2; Patch after testing. Create a custom administrative template to implement the workaround automatically via group policy. Use http://www.ultimatewindowssecurity.com/killbit.asp as a guide

MS07-064

(KB941568)

Arbitrary code

Windows

Workstations & Terminal Servers

No/No

Yes

Critical

Yes

Yes

Yes

Yes

DirectX; restart may be required when patching; workaround reduces functionality

Patch after testing or implement workaround permissions change with group policy

MS07-065

(KB937894)

Arbitrary code

Windows

Servers

No/No

Yes

Important

Yes

Yes

No

No

MSMQ is not installed by default; Restart required

Disable Message Queuing via group policy; Patch after testing

MS07-066

(KB943078)

Privilege Elevation

Vista only

Workstations

No/No

No

Important

No

No

No

Yes

Restart required

Patch after testing – if your end users are not already local administrators

MS07-067

(KB944653)

Privilege Elevation

Windows

Workstations & Terminal Servers

Yes/Yes

Yes

Important

No

Yes

Yes

No

Macrovision Driver

Disable secdrv.sys; Patch after testing

MS07-068

(KB941569)
(KB944275)

Arbitrary code

Windows

Workstations & Terminal Servers

No/No

Workstations: yes

Critical

Yes

Yes

Yes

Yes

Windows Media Format; no workaround for servers; restart not required if service can be stopped

Patch after testing or, in case of workstations, implement workaround permissions change with group policy

MS07-069

(KB942615)

Arbitrary code

Windows

Workstations & Terminal Servers

No/Yes

Not unless your users will let you get away with disabling Active Scripting and ActiveX in IE J

Critical

Yes

Yes

Yes

Yes

Internet Explorer 6 & 7 multiple vulnerabilities; restart required

Patch immediately or disable Active Scripting and ActiveX except for trusted sites

______________________________________________________________________________
______________________________________________________________________________
To foward this to a friend please click here
 
http://www.ultimatewindowssecurity.com/enews/members.aspx?Task=FF&SI=12379&E=security.world%40gmail.com&S=1&N=29&Format=HTML
 
To opt out please click here
 
http://www.ultimatewindowssecurity.com/enews/members.aspx?Task=OO&SI=12379&E=security.world%40gmail.com&S=1
________________________________________________________________________________
Ultimate Windows Security is a division of Monterey Technology Group, Inc. ©2006-2007 Monterey Technology Group, All rights reserved.
Disclaimer: We do our best to provide quality information and expert commentary but use all information at your own risk.
 
You may forward this email in its entirety but all other rights reserved.

No comments:

Post a Comment