![]() ![]() It will be the 13th of January 2015, then in February and so on. The next Patch Tuesday, Microsoft’s usual day to issue security updates for its software, is looming again. ![]() Questions need to be asked of Patch Tuesday and Microsoft’s approach to it, says Robert Brown. Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365) Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3019215) Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777) Vulnerability in Network Policy Server RADIUS Implementation Could Cause Denial of Service (3014029) Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege (3021674) Vulnerability in Windows Application Compatibility Cache Could Allow Elevation of Privilege (3023266) Vulnerability in Windows Components Could Allow Elevation of Privilege (3025421) ![]() Vulnerability in Windows Telnet Service Could Allow Remote Code Execution (3020393) If, like Verismic, you want to take into account the CVSS scores, then the table below is listed in order of most serious to least – use this to prioritise your patch roll outs as we will for our customers. Get the Critical update done first, and then work through the list. It’s such a light Patch Tuesday this month that working out which patches to prioritise is fairly straightforward. ![]() Whilst these are vulnerabilities that need to be patched, US-CERT has identified that the chances of the vulnerability being exploited are probably quite low and having assessed the potential impact (again likely to be low), have given the vulnerabilities a low risk score. Attackers can exploit this vulnerability by sending specially crafted telnet packets to a Windows server that could then enable the attacker to run arbitrary code on a target server.Īmazingly, the other seven updates are all rated Critical by Microsoft’s standard, but if we take a look at the table below, US-CERT thinks that only three are actually quite serious (MS15-001, MS15-003, MS15-004), whereas the other four updates are rated as 5.0 and below. It’s a buffer overflow vulnerability that could allow remote code execution, which is caused by the Microsoft Telnet service improperly validating memory location. The only Critical patch update this month, MS15-002 has a CVSS score of 9.3, this is a relatively serious patch and definitely one that needs to be the top priority to patch. I’m in a good position to say that there appears to be nothing special or particularly significant about January’s updates – it’s especially rare to be in a position to say that as there are usually at least one or two updates that deserve special attention due to the seriousness or uniqueness of the vulnerability.Īs ever, we have broken down the patch updates for you to give you a better understanding of what systems could be affected and have included the independently assessed Common Vulnerability Scoring System (CVSS) score from US-CERT. This month’s Patch Tuesday is fairly light with only eight patch updates, with only one rated Critical. We’ve all enjoyed our Christmas break and so, it would seem, have security researchers. However, it could be argued that for smaller businesses that can’t afford a service like this, it could have an impact on how they deploy patches.įear not however, all of Verismic’s customers will still have all patches fully tested and rolled out as per agreed schedules via Verismic Syxsense. The reasons, according to Microsoft, are that customers no longer use ANS with many simply waiting until Patch Tuesday. They haven’t scrapped it altogether though, they are still offering ANS to paying users. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |