Microsoft
today shipped six bulletins with patches for a total of 12 documented
security vulnerabilities in a wide range of widely deployed software
products. Three of the six bulletins are rated “critical,” Microsoft’s
highest severity rating.
The most serious issues affect the company’s Internet Explorer browser, including the newest IE 8 on Windows 7.
The Internet Explorer bulletin (MS09-072) covers five documented vulnerabilities that affect all supported versions of the browser (IE 5, 6, 7 and 8). As previously reported, there is public exploit code available for one of the IE vulnerabilities.
Here’s why this is considered a high-priority update for all affected Windows users:
The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.
An interesting sidebar: All five of the IE vulnerabilities were
purchased by a third-party company that buys software flaw information
in exchange for the exclusive rights to broker the disclosure process
with affected vendors.
This month’s Patch Tuesday batch also covers two potential worm
holes in Microsoft Windows (Internet Authentication Service). The
update (MS09-071)
patches critical flaws that could allow remote code execution if
messages received by the Internet Authentication Service server are
copied incorrectly into memory when handling PEAP authentication
attempts.
An
attacker who successfully exploited either of these vulnerabilities
could take complete control of an affected system. Servers using
Internet Authentication Service are only affected when using PEAP with
MS-CHAP v2 authentication.
The third critical bulletin (MS09-074)
addresses a security flaw in the Microsoft Office Project software. The
vulnerability could allow remote code execution if a user opens a
specially crafted Project file.
Microsoft also shipped three “important” bulletins to cover the following:
Microsoft’s Security Research & Defense blog offers this nifty chart to help Windows suers prioritize the deployment of the other updates appropriately.
Bulletin | Most likely attack vector | Bulletin severity | Max Exploit- ability Index | Likely first 30 days impact | Platform mitigations |
---|---|---|---|---|---|
MS09-072 (IE) | Attacker hosts a malicious webpage, lures victim to it. | Critical | 1 | Public exploit code already exists for CVE-2009-3672 affecting IE6 | |
and IE7. We expect to see exploits for other vulnerabilities that | |||||
affect other IE versions within 30 days. | DEP is enabled by default for IE8 on Windows XP SP3, Windows Vista SP1 and later, Windows Server 2008, and Windows 7. |
DEP makes exploiting the public vulnerability significantly more difficult.
MS09-073 (Wordpad converter) | Attacker sends malicious .doc file (saved in legacy Word version 8 format) to victim who opens it in Wordpad. | Critical | 2 | Less likely to be exploited in first 30 days. | Affects only older platforms.
MS09-071 (IAS) | Attacker on a wireless LAN attacks the Microsoft IAS server
providing the 802.1x authentication and encryption via PEAP. Attack
would be via the RADIUS protocol. | Critical | 2 | Less likely to be exploited in first 30 days. |
MS09-074 (Project) | Attacker sends a malicious Project file (MPP) to victim who opens it with Project 2003 or earlier. | Critical (Critical on Project 2000 only) | 2 | Less likely to be exploited in first 30 days. | Affects only older versions of Project.
MS09-070 (ADFS) | Attacker able to authenticate to ADFS running in IIS can execute code within the IIS worker process. | Important | 1 | While an exploit may be developed in the first 30 days, the risk to
most organizations is low because attack surface is only exposed to
authenticated attackers. |
MS09-069 (LSASS) | Attacker on enterprise network authenticates to a server and remotely causes CPU exhaustion. | Important | 3 | Unlikely to be exploited in first 30 days. | No chance of code execution
blogs.technet.com/srd/archive/2009/12/08/assessing-the-risk-of-the-december-security-bulletins.aspx
www.microsoft.com/technet/security/bulletin/MS09-069.mspx
www.microsoft.com/technet/security/bulletin/MS09-070.mspx
www.microsoft.com/technet/security/bulletin/MS09-071.mspx
www.microsoft.com/technet/security/bulletin/MS09-072.mspx
www.microsoft.com/technet/security/bulletin/MS09-073.mspx
www.microsoft.com/technet/security/bulletin/MS09-074.mspx
threatpost.com/microsoft-patches-critical-ie-windows-vulnerabilities-120809/