Updated Exploit Index for Microsoft
Last Updated: 2011-05-06 15:30:32 UTC
by Richard Porter (Version: 1)
We have received early notification that Microsoft is updating the method of guidance for patching. In 2008 Microsoft published its first Exploit Index to better guide customers on likelihood of getting "Sploited." This new notification reflects a change in the index ratings.
|1||Consistent exploit code likely|
|2||Inconsistent exploit code likely|
|3||Functioning exploit code unlikely|
Reviewing the publication by Microsoft, I think they are saying:
1 - Code easy to create and or already created.
2 - Moderate to create or maybe a DoS and or that results are not consistent.
3 - They don't feel the risk is high.
As always, the Storm Center Handlers will continue to independently evaluate "Microsoft Patch Tuesday" for "Reboot Wednesday" and provide our guidance :) On their site, if you recall MS08-021 (Vulnerability in GDI Could (Did and does :) Allow Remote Code Execution)? MSFT rates that with an EIA of 1.
Also, in the notification they included early warning of a light patch month that includes a set of Office patches and 2003-2008 R2 set of server patches.
Finally, MSFT will be aggregating their Index into Current Software and older software.
"As of this month, we are making some changes to the rating system to make vulnerability assessment more clear and digestible for customers. Specifically, we will be publishing two Exploit-ability Index ratings per vulnerability- one for the most recent platform, the other as an aggregate rating for all older versions of the software. " -- technet.microsoft.com
http : // technet.microsoft.com/en-us/security/cc998259.aspx <-- Index Definition
http : // tinyurl.com/6fygchn <-- Original Notice
http : / /www.microsoft.com/technet/security/bulletin/ms11-may.mspx <-- Advanced Notice
--- ISC Handler on Duty
...but that they're 1) going to start giving different scores for "new" vs. "older" software, e.g. Windows Vista / Office 2007 and newer mitigates many vulns via wider DEP enrollment, ASLR etc., whereas XP products are more easily exploited.
And 2) I think they're adding a new DoS Exploitability Assessment of Temporary vs. Permanent.
May 8th 2011
1 decade ago