Microsoft Patch Tuesday - December 2014
Overview of the December 2014 Microsoft patches and their status.
# | Affected | Contra Indications - KB | Known Exploits | Microsoft rating(**) | ISC rating(*) | |
---|---|---|---|---|---|---|
clients | servers | |||||
MS14-075 | Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (Replaces MS13-105) |
|||||
Microsoft Exchange CVE-2014-6319 CVE-2014-6325 CVE-2014-6326 CVE-2014-6336 |
KB 3009712 | . | Severity:Important Exploitability: |
N/A | Important | |
MS14-080 | Cumulative Security Update for Internet Explorer (Replaces MS14-065) |
|||||
Microsoft Windows, Internet Explorer CVE-2014-6327, CVE-2014-6328, CVE-2014-6329, CVE-2014-6330, CVE-2014-6363, CVE-2014-6365, CVE-2014-6366, CVE-2014-6368, CVE-2014-6369, CVE-2014-6373, CVE-2014-6374, CVE-2014-6375, CVE-2014-6376, CVE-2014-8966 |
KB 3008923 | . | Severity:Critical Exploitability: |
Critical | Critical | |
MS14-081 | Vulnerabilities in Microsoft Word and Microsoft Office Web Apps Could Allow Remote Code Execution (Replaces MS14-017 MS14-061 MS14-069) |
|||||
Microsoft Office CVE-2014-6356 CVE-2014-6357 |
KB 3017301 | . | Severity:Critical Exploitability: |
Critical | Important | |
MS14-082 | Vulnerability in Microsoft Office Could Allow Remote Code Execution (Replaces MS09-060) |
|||||
Microsoft Office CVE-2014-6364 |
KB 3017349 | . | Severity:Important Exploitability: |
Critical | Important | |
MS14-083 | Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (Replaces MS13-085) |
|||||
Microsoft Office CVE-2014-6360 CVE-2014-6361 |
KB 3017347 | . | Severity:Important Exploitability: |
Critical | Important | |
MS14-084 | Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (Replaces MS14-011) |
|||||
Microsoft Windows CVE-2014-6363 |
KB 3016711 | . | Severity:Critical Exploitability: |
Critical | Critical | |
MS14-085 | Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure | |||||
Microsoft Windows CVE-2014-6355 |
KB 3013126 | vuln. public. | Severity:Important Exploitability: |
Important | Important |
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
- We use 4 levels:
- PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
- Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
- Important: Things where more testing and other measures can help.
- Less Urt practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
- The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.
--
Alex Stanford - GIAC GWEB & GSEC
Research Operations Manager,
SANS Internet Storm Center
Keywords: mspatchday
18 comment(s)
×
Diary Archives
Comments
Anonymous
Dec 9th 2014
1 decade ago
Also, the key text for the fourth level starts with "Less Urt practices", which probably needs some editing.
Obviously, there's no need to publicly post this comment.
Anonymous
Dec 9th 2014
1 decade ago
Anonymous
Dec 9th 2014
1 decade ago
Anonymous
Dec 9th 2014
1 decade ago
Anonymous
Dec 9th 2014
1 decade ago
Anonymous
Dec 10th 2014
1 decade ago
Anonymous
Dec 10th 2014
1 decade ago
Anonymous
Dec 10th 2014
1 decade ago
http://www.infoworld.com/article/2858014/operating-systems/botched-kb-3004394-triggers-uacs-diagnostic-tool-error-0x8000706f7-amd-catalyst-driver-fail-defende.html
Anonymous
Dec 10th 2014
1 decade ago
Anonymous
Dec 11th 2014
1 decade ago