Microsoft Patch Tuesday - September 2014
Overview of the September 2014 Microsoft patches and their status.
# | Affected | Contra Indications - KB | Known Exploits | Microsoft rating(**) | ISC rating(*) | |
---|---|---|---|---|---|---|
clients | servers | |||||
MS14-052 | Cumulative Security Update for Internet Explorer | |||||
Microsoft Windows, Internet Explorer CVE-2013-7331 CVE-2014-2799 CVE-2014-4059 CVE-2014-4065 CVE-2014-4079 CVE-2014-4080 CVE-2014-4081 CVE-2014-4082 CVE-2014-4083 CVE-2014-4084 CVE-2014-4085 CVE-2014-4086 CVE-2014-4087 CVE-2014-4088 CVE-2014-4089 CVE-2014-4090 CVE-2014-4091 CVE-2014-4092 CVE-2014-4093 CVE-2014-4094 CVE-2014-4095 CVE-2014-4096 CVE-2014-4097 CVE-2014-4098 CVE-2014-4099 CVE-2014-4100 CVE-2014-4101 CVE-2014-4102 CVE-2014-4103 CVE-2014-4104 CVE-2014-4105 CVE-2014-4106 CVE-2014-4107 CVE-2014-4108 CVE-2014-4109 CVE-2014-4110 CVE-2014-4111 |
KB 2977629 | Yes! | Severity:Critical Exploitability: 1 |
Critical | Important | |
MS14-053 | Vulnerability in .NET Framework Could Allow Denial of Service | |||||
Microsoft Windows, Microsoft .NET Framework CVE-2014-4072 |
KB 2990931 | No | Severity:Important Exploitability: 1 |
Important | Important | |
MS14-054 | Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege | |||||
Microsoft Windows CVE-2014-4074 |
KB 2988948 | No | Severity:Important Exploitability: 1 |
Important | Important | |
MS14-055 | Vulnerabilities in Microsoft Lync Server Could Allow Denial of Service | |||||
Microsoft Lync Server CVE-2014-4068 CVE-2014-4070 CVE-2014-4071 |
KB 2990928 | No | Severity:Important Exploitability: 1 |
Important | Important |
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
- We use 4 levels:
- PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
- Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
- Important: Things where more testing and other measures can help.
- Less Urt practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
- The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.
--
Alex Stanford - GIAC GWEB & GSEC
Research Operations Manager,
SANS Internet Storm Center
Keywords: mspatchday
3 comment(s)ISC StormCast for Tuesday, September 9th 2014 http://isc.sans.edu/podcastdetail.html?id=4139
×
Diary Archives
Comments