Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Microsoft Patch Tuesday Roundup - July 2010 - "Jedi Mind Trick Edition"

Which Vulnerabilities Are You Looking For?

When Microsoft releases their patches each month, I find it interesting to review the criticality of each vulnerability. Microsoft has, in their typical fashion, used some very interesting wording to describe the latest batch of vulnerabilities. When reading each security bulletin, I try to imagine the worst-case scenario and look at the glass as half empty. Microsoft seems to paint a picture and believes the glass to be half full by using phrases such as:

In MS10-042: "The vulnerability cannot be exploited automatically through e-mail." - I believe what they are stating here is that the user can't just open up an email to have the exploit trigger. Instead, the user has to either open an attachment or click on a link. I can tell you from first-hand experience that it’s not difficult to get someone to click on a link. Typically, you just need to tell them that they've qualified for a free iPad. Getting the user to open an attachment is a little bit trickier, and usually requires more research about the target audience and/or organization. However, this does not mean the attack can't scale to trick thousands of people, as did an email appearing to come from the World Cup with an Excel document attached. The Excel document posed as a schedule for the World Cup, but really contained malware that attempted to infect the end-user's computer.

ob1-mind.jpg

"These aren't the vulnerabilities you're looking for. You can go about your business."


In MS10-043: "successful code execution is unlikely due to memory randomization" - Attackers will usually find a way to get around or defeat built-in operating system protections (for example, "Flaw In Microsoft's Hypervisor Lets Attackers Bypass DEP, ASLR"). Don't let your guard down when there seems to be protections in place. Correct the problem at its root and patch the vulnerability.

In MS10-044 " an attacker would have no way to force users to visit these Web sites", I disagree with this statement and believe that attackers have several ways of forcing a user to load content in a web browser. In order to exploit vulnerabilities the user does not have to "visit a web site", but their browser must process the code. Hidden iFrames are just one example where code can be loaded in your browser and perform evil things - all without the knowledge of the user. Persistent XSS is another example of a place where attackers can hide malicious code inside web sites that you "trust" (as was the case with the recent flaw in YouTube).

In MS10-045: "Do not open e-mail attachments from untrusted sources or that you receive unexpectedly from trusted sources" - As stated above, tricking users into clicking on links, opening attachments or accepting bogus certificates is not difficult. For some great examples of how this can be accomplished check out "SET", the "Social Engineering Toolkit". It’s a suite of tools that helps you clone web sites, create fake certificates for Java applets and send attacks to end-users.

The SANS Internet Storm center puts out a list each month that contains their own ranking system. It’s a great reference for those looking to gain more insight into the threats posed by vulnerabilities each month. To further aid in your efforts to evaluate the dangers of the Microsoft Patch Tuesday mayhem, Tenable's research team has published plugins for each of the security bulletins issued this month (they are available in the feed as of Tuesday July 13, 2010 at 11:00PM):

Windows XP SP2 is now at end of life and Microsoft will no longer be issuing patches (including security related ones) for it. Tenable has updated the Nessus plugin titled "Windows Service Pack Out of Date" (plugin id 26921) to include Windows XP SP2 in the list of unsupported operating systems.

Resources

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable Vulnerability Management trials created everywhere except UAE will also include Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable Vulnerability Management trials created everywhere except UAE will also include Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now