Virtual Administrator’s February 2015 Patch ...

Virtual Administrator’s February 2015 Patch Recommendations

9 Security Bulletins were released – 3 Critical, 6 Important, and 0 Moderate

This Month In Brief

We are releasing all security patches this month, however many of these have known issues that you should be aware of and are documented below. These known issues have workarounds and/or can be corrected by uninstalling the given patch.

MS15-009, MS15-010 and MS15-011 are rated Critical. After your next patch cycle completes you should follow up and make sure this is installed.

There were a few out-of-band patches released to address Adobe Flash Player vulnerabilities. We released them as they became available – KB3021953, KB3035034, KB3033408
Microsoft Security Advisory (2755801)
– Title: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
https://technet.microsoft.com/library/security/2755801

Known issues and considerations

Security Bulletins

MS11-009
KB3023607 Some AnyConnect clients give the “Failed to initialize connection subsystem” error.
Updates 3036197 and 3023607 are installed automatically and transparently together with security update 3021952.
http://www.infoworld.com/article/2883756/security/microsoft-s-ssl-3-0-poodle-busting-patch-kb-3023607-breaks-cisco-s-popular-vpn-client-anyconnect.html
Known Issues per MS: https://support.microsoft.com/kb/3023607

These updates may require a second reboot to complete. KB3021952 must be installed before installing updates 3023607 and 3036197. Kaseya should take care of this automatically as patches are installed in order form lowest to highest KB number.

MS15-010
KB3013455 May cause font corruption. The problem only occurs on systems that are running Windows Vista SP2 or Windows Server 2003 SP2.
Known Issues per MS: https://support.microsoft.com/kb/3036220
Microsoft Community:http://answers.microsoft.com/en-us/windows/forum/windows_7-windows_update/kb3013455-ms15-010-causes-font-corruption/8640d38d-19bd-46b6-9af0-6213c05107d3

MS15-011 & MS15-014
Hardening Group Policy – This update provides the ability to harden group policy but steps must be taken by the administrator to enabled the additional protection. Please review the links below
https://support.microsoft.com/kb/3000483
http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx
https://www.jasadvisors.com/about-jas/jasbug-security-vulnerability-fact-sheet/
Note This security update includes some files that are in security update 3031432. See below MS15-011 and MS15-015

MS15-015
KB3031432 “This security update may cause some programs or games to fail if they rely on undocumented APIs or if they access operating system components in unsupported ways. Please contact the manufacturer of your program or game for more information. ”
Known Issues per MS: https://support.microsoft.com/kb/3031432

MS15-011 and MS15-015
These two share a common known issue
Child package behavior
Customers who install this security update may face a known issue in which error 1108 is generated in the Security event log instead of the usual 4688 audit event. To address this issue, update 3004375 must be installed together with this update (update 3031432).
Known Issues per MS: https://support.microsoft.com/kb/3031432

Non-security updates
Critical Updates (High Priority)

KB3001652 Update for Microsoft Visual Studio 2010 Tools for Office Runtime
Microsoft pulled this patch the day after it was released but has since rereleased it. The new patch is considered safe to install

KB2920732 Update for PowerPoint 2013
Microsoft has pulled this patch
http://support.microsoft.com/KB/2920732

Exploitability

Requires Restart

  • Servers:True
  • Workstations:True

New Security Bulletins

(MS#/Affected Software/Type)

CRITICAL

MS15-009 Security Update for Internet Explorer (3034682) (Internet Explorer) The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
Details
MS15-010 Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution (3036220) (Microsoft Windows) The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or visit an untrusted website that contains embedded TrueType fonts.
Details
MS15-011 Vulnerability in Group Policy Could Allow Remote Code Execution (3000483) (Microsoft Windows) The vulnerability could allow remote code execution if an attacker convinces a user with a domain-configured system to connect to an attacker-controlled network.
Details

IMPORTANT

MS15-012 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3032328) (Microsoft Office) The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.
Details
MS15-013 Vulnerability in Microsoft Office Could Allow Security Feature Bypass (3033857) (Microsoft Office) The vulnerability could allow security feature bypass if a user opens a specially crafted Microsoft Office file.
Details
MS15-014 Vulnerability in Group Policy Could Allow Security Feature Bypass (3004361) (Microsoft Windows) The vulnerability could allow security feature bypass if an attacker, by way of a man-in-the-middle attack, causes the Group Policy Security Configuration Engine policy file on a targeted system to become corrupted or otherwise unreadable.
Details
MS15-015 Vulnerability in Microsoft Windows Could Allow Elevation of Privilege (3031432) (Microsoft Windows) The vulnerability could allow an attacker to leverage the lack of impersonation-level security checks to elevate privileges during process creation.
Details
MS15-016 Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure (3029944) (Microsoft Windows) The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted TIFF image.
Details
MS15-017 Vulnerability in Virtual Machine Manager Could Allow Elevation of Privilege (3035898) (Microsoft Server Software) The vulnerability could allow elevation of privilege if an attacker logs on an affected system.
Details

4 Responses to Virtual Administrator’s February 2015 Patch Recommendations

  1. I don’t see anything in here about the February 10 patch, KB2956128, but it’s been breaking Outlook 2010 clients for us left and right. So far, 3 companies under our watch have run into a variety of bad issues with their Outlook clients because of it. I’ve blocked it from our patching.

    Just a heads’ up!

  2. Hey Joseph,

    Thanks for the heads up! We had heard rumors but hadn’t been able to substantiate anything. We’re penning a quick addendum to this posting along with a patch uninstall script :).

Leave a reply

Copyright © 2007-2017 Network Depot LLC DBA Virtual Administrator. All Rights Reserved.