Last Updated: 2011-01-24 23:29:52 UTC
by Adrien de Beaupre (Version: 2)
Overview of the October 2010 Microsoft Patches and their status.
|#||Affected||Contra Indications||Known Exploits||Microsoft rating||ISC rating(*)|
|MS10-071||Cumulative Security Update for Internet Explorer (Replaces MS10-053 )|
|KB 2360131||CVE-2010-3325 and CVE-2010-3324 have been disclosed publicly.||Severity:Critical
|MS10-072||Vulnerabilities in SafeHTML (Replaces MS10-039 )|
|KB 2412048||CVE-2010-3324 has been disclosed publicly.||Severity:Important
|MS10-073||Vulnerabilities in Windows Kernel-Mode Drivers (Replaces MS10-048 )|
|Kernel Mode Drivers
|KB 981957||CVE-2010-2743 has been disclosed publicly and is currently being exploited in the Internet ecosystem. CVE-2010-2544 and CVE-2010-2749 have also been disclosed publicly.||Severity:Important
|MS10-074||Vulnerability in Microsoft Foundation Classes (Replaces MS07-012 )|
|KB 2387149||No known exploits.||Severity:Moderate
|MS10-075||Vulnerability Media Player Network Sharing Service|
|Media Player Network Sharing Service
|KB 2281679||no known exploits.||Severity:Critical
|MS10-076||Vulnerability in the Embedded OpenType Font Engine|
|OpenType Font Engine
|KB 982132||No known exploits.||Severity:Critical
|MS10-077||Vulnerability in .NET Framework Could Allow Remote Code Execution|
|KB 2160841||No known exploits.||Severity:Critical
|MS10-078||Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Elevation of Privilege (Replaces MS10-037 )|
|OpenType Font (OTF)
|KB 2279986||No known exploits.||Severity:Important
|MS10-079||Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (Replaces MS09-068 MS10-056 )|
|KB 2293194||No known exploits.||Severity:Important
|MS10-080||Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (Replaces MS10-038 MS10-057 )|
|KB 2293211||No known exploits.||Severity:Important
|MS10-081||Comctl32 Heap Overflow Vulnerability|
|KB 2296011||No known exploits.||Severity:Important
|MS10-082||Vulnerability in Windows Media Player Could Allow Remote Code Execution (Replaces MS10-027 )|
|KB 2378111||No known exploits.||Severity:Important
|MS10-083||Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution|
|KB 2405882||No known exploits.||Severity:Important
|MS10-084||Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (Replaces MS10-066 )|
|KB 2360937||This vulnerability has been disclosed publicly.||Severity:Important
|MS10-085||Vulnerability in SChannel Could Allow Denial of Service (Replaces MS10-049 )|
|Microsoft Windows, IIS
|KB 2183461||No known exploits.||Severity:Important
|MS10-086||Vulnerability in Windows Shared Cluster Disks Could Allow Tampering|
|Microsoft Windows||KB 2294255||No known exploits.||Severity:Moderate
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
- We use 4 levels:
- PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
- Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
- Important: Things where more testing and other measures can help.
- Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.
- The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
- The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
- Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
- All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them
Thanks to fellow handlers Johannes, Scott, and Guy!
Adrien de Beaupré
Cyber Security Awareness Month - Day 12 - Protecting and Managing Your Digital Identity On Social Media Sites
Last Updated: 2010-10-12 20:45:08 UTC
by Scott Fendley (Version: 2)
As we all know, social media sites are designed to share information such as who and where you are and what you are doing. This can be a great way to connect to close friends and family, or even re-connect with old classmates and old co-workers. And it can be a great way to find and connect to new groups with interests common to your own.
However, there is a fine line with what and how much information to share with these different subsections of your life. Think about this. Every public message you post on your Twitter account can be spread around the world in a matter of seconds and possibly will be indexed and found in real-time searches 24/7. These messages have the power to compromise your safety or your identity, jeopardize your future employment, or just embarrass yourself to the world.
First, review and use privacy settings. Most every major social media site such as Facebook, Twitter, and LinkedIn have the ability to control how visible your information and pictures are on the site as well as any search engines who parses that data. You need to decide how visible you want your contact and profile information, videos, photos, and other posts need to be, and take the time to set the appropriate controls within the media site in question.
Second, don't share information that can help people steal your identity or locate you. It is quite possible for someone to look up your name in a phone book (digital or dead tree version) and find your physical address if it is not already known. The combination of that publicly available information and your public post about hanging out with friends watching Monday Night Football across town could be enough for someone to take advantage of the situation and break into your house. This would likely require that someone be targeting you or your family specifically.
Third, in most social media sites, you have the ability to limit who can see photos or video tagged with your name. It is probably best that you do not upload photos or video showing you or your friends doing illegal or inappropriate things in the first place. But you need to take advantage of any settings that allow you to control how visible this content could be if your friends not exercise good common sense. Is it really all that smart to post an x-ray image of your broken arm while you are in high school, if your dream is to play baseball professionally?
Fourth, no matter if it is a tweet, a Facebook status update, or something else, it is recommended that you restrict the delivery of this information to your circle of friends only.
Fifth, online interactions between coaches and potential student athletes must be managed cautiously. Coaches are under even heavier scrutiny than many other people due to NCAA regulations. Wishing a recruit "Happy Birthday" on their public wall may be considered inappropriate in some circles. It is even possible that re-tweeting a media post by the coaching staff about a recruit visitation could be construed into something that could be a minor violation.
Sixth, be especially careful of malicious links sent via social media accounts. There are many URL shortening services on the Internet that help when you only have 140 characters in a particular tweet. Some third party clients to social media sites have the ability to show you the full URL which was masked in the update. Enabling this will give you some confidence that you are actually going to a known and more-trusted site. In general resist the urge to click on items sent to you no matter the source.
Seventh, like all computer accounts, you must protect social media accounts from being hijacked. Using strong passwords on your social media accounts is a must. And you must be careful to not disclose your credentials to would-be attackers. Using your credentials, attackers could use your account to lure your circle of friends into clicking a malicious link sent from your account.
Last but not least, think twice before posting or even clicking on a post. Consider what could happen if a post becomes widely known and how that may reflect both on you (as the poster) or your school or workplace.
There are likely other ideas of how to better protect and manage your digital identity when it comes to social media. Share these with us via the contact form or comment on this article.
co-ISC Handler on Duty
Thanks to Nathan for the great comment to refine the attack vector regarding "don't share information that can help people steal your identity or locate you".
Last Updated: 2010-10-12 20:34:40 UTC
by Scott Fendley (Version: 1)
A short while ago, Oracle released the notes for their Critical Patch Update for a number of applications such as database, middleware, business suites, Sun products and Java. Due to the threats posed by successful attack, Oracle strongly recommends that users apply the CPU fixes for installed applications as soon as possible. As always, it is recommended that you review the content available at the below URLs and test the updates prior to deploying these to your production environment.
More information is available at