Microsoft Patch Tuesday - September 2014

Published: 2014-09-09. Last Updated: 2014-09-09 19:22:05 UTC
by Alex Stanford (Version: 1)
3 comment(s)

Overview of the September 2014 Microsoft patches and their status.

# Affected Contra Indications - KB Known Exploits Microsoft rating(**) ISC rating(*)
clients servers
MS14-052 Cumulative Security Update for Internet Explorer
Microsoft Windows, Internet Explorer

CVE-2013-7331 CVE-2014-2799 CVE-2014-4059 CVE-2014-4065 CVE-2014-4079 CVE-2014-4080 CVE-2014-4081 CVE-2014-4082 CVE-2014-4083 CVE-2014-4084 CVE-2014-4085 CVE-2014-4086 CVE-2014-4087 CVE-2014-4088 CVE-2014-4089 CVE-2014-4090 CVE-2014-4091 CVE-2014-4092 CVE-2014-4093 CVE-2014-4094 CVE-2014-4095 CVE-2014-4096 CVE-2014-4097 CVE-2014-4098 CVE-2014-4099 CVE-2014-4100 CVE-2014-4101 CVE-2014-4102 CVE-2014-4103 CVE-2014-4104 CVE-2014-4105 CVE-2014-4106 CVE-2014-4107 CVE-2014-4108 CVE-2014-4109 CVE-2014-4110 CVE-2014-4111
KB 2977629 Yes! Severity:Critical
Exploitability: 1
Critical Important
MS14-053 Vulnerability in .NET Framework Could Allow Denial of Service
Microsoft Windows, Microsoft .NET Framework

CVE-2014-4072
KB 2990931 No Severity:Important
Exploitability: 1
Important Important
MS14-054 Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege
Microsoft Windows

CVE-2014-4074
KB 2988948 No Severity:Important
Exploitability: 1
Important Important
MS14-055 Vulnerabilities in Microsoft Lync Server Could Allow Denial of Service
Microsoft Lync Server

CVE-2014-4068
CVE-2014-4070
CVE-2014-4071
KB 2990928 No Severity:Important
Exploitability: 1
Important Important
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urt practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
    • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.

       

-- 
Alex Stanford - GIAC GWEB & GSEC
Research Operations Manager,
SANS Internet Storm Center

Keywords: mspatchday
3 comment(s)
ISC StormCast for Tuesday, September 9th 2014 http://isc.sans.edu/podcastdetail.html?id=4139

Comments


Diary Archives