Wednesday 11 April 2012

Patch Tuesday Application Compatibility Report - April 10


Application Compatibility Update with Quest ChangeBASE

Executive Summary


With this April Microsoft Patch Tuesday update, we see a set of 6 updates; 4 with the rating of Critical, and 2 with the rating of Important. As seen in March, Microsoft has released another relatively small update, and again, the potential compatibility impact for these updates is likely to be low.

The Patch Tuesday Security Update analysis performed by the ChangeBASE team identified a small number of potential compatibility issues across the thousands of applications included in testing for this release, and these relating only to Update MS12-024, where vulnerability in Windows could allow remote code execution. However, while the issues identified would require manual remediation, the total number of applications in the test sample which could be affected was less than 1%.

Given the nature of the changes and updates included in each of these patches, most systems will require a reboot to successfully implement any and all of the patches and updates released in this April Patch Tuesday release cycle.

Sample Results


Here is a sample of the results for one application and a summary of the Patch Tuesday results for one of our ChangeBASE Sample databases.

MS12-024: Vulnerability in Windows Could Allow Remote Code Execution


Here is a sample Summary report for a sample database where the Quest ChangeBASE Patch Impact team has run the latest Microsoft Updates against a test application portfolio:


Testing Summary


MS12-023
Cumulative Security Update for Internet Explorer (2675157)
MS12-024
Vulnerability in Windows Could Allow Remote Code Execution (2653956)
MS12-025
Vulnerability in .NET Framework Could Allow Remote Code
MS12-026
Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Information Disclosure (2663860)
MS12-027
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)
MS12-028
Vulnerability in Microsoft Office Could Allow Remote Code Execution (2639185)

Quest ChangeBASE RAG Report Summary


Security Update Detailed Summary


MS12-023
Cumulative Security Update for Internet Explorer (2675157)
Description
This security update resolves five privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
n/a
Impact
Critical - Remote Code Execution

MS12-024
Vulnerability in Windows Could Allow Remote Code Execution (2653956)
Description
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system.
Payload
Imagehlp.dll, Wintrust.dll
Impact
Critical - Remote Code Execution

MS12-025
Vulnerability in .NET Framework Could Allow Remote Code
Description
This security update resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website.
Payload
n/a
Impact
Critical - Remote Code Execution

MS12-026
Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Information Disclosure (2663860)
Description
This security update resolves two privately reported vulnerabilities in Microsoft Forefront Unified Access Gateway (UAG). The more severe of the vulnerabilities could allow information disclosure if an attacker sends a specially crafted query to the UAG server.
Payload
Adfs.internalsite.inc, Adfs.redirecttoorigurl.asp, Adfs.utils.inc, Agent_lin_helper.jar, Agent_mac_helper.jar, Agent_win_helper.jar, Certifiedendpointenrollment.utils.inc, Configmgrcore.dll, Internalsite.inc, Internalsite.utils.inc, Internalsitesharepoint.inc, Microsoftclient.jar, Monitor.applicationlist.asp, Monitor.applicationmonitor.asp, Monitor.applicationmonitorlinerefresh.asp, Monitor.applicationstatisticsresults.asp, Monitor.applicationuserstatistics.asp, Monitor.damonitorcurrentstatus.asp, Monitor.default.asp, Monitor.eventreport.asp, Monitor.eventviewer.asp, Monitor.eventviewerrefresh.asp, Monitor.exceltable.asp, Monitor.farmmonitor.asp, Monitor.global.asa, Monitor.inc.general.inc, Monitor.inc.selectsessiontrunks.inc, Monitor.inc.utils.inc, Monitor.naptseventreport.asp, Monitor.nlbmonitor.asp, Monitor.sessionlist.asp, Monitor.sessionmonitor.asp, Monitor.sessionmonitordatabuilder.asp, Monitor.sessionparameters.asp, Monitor.sessionstatisticsresults.asp, Monitor.statisticsgraphdata.asp, Monitor.userlist.asp, Monitor.usermonitor.asp, Monitor.usermonitordatabuilder.asp, Monitor.usersessionstatistics.asp, Monitor.userstatistics.asp, Monitor.userstatisticsresults.asp, Oesislocal.jar, Otp.internalsite.inc, Otp.utils.inc, Otp.whlclientinst.inc, Redirect.asp, Redirecttoorigurl.asp, Uninstalluagupdate.cmd, Whlfiltauthorization.dll, Whlfilter.dll
Impact
Important - Information Disclosure

MS12-027
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)
Description
This security update resolves a privately disclosed vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability.
Payload
n/a
Impact
Critical - Remote Code Execution

MS12-028
Vulnerability in Microsoft Office Could Allow Remote Code Execution (2639185)
Description
This security update resolves a privately reported vulnerability in Microsoft Office and Microsoft Works. The vulnerability could allow remote code execution if a user opens a specially crafted Works file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Payload
n/a
Impact
Important - Remote Code Execution

*All results are based on a ChangeBASE Application Compatibility Lab’s test portfolio of over 1,000 applications. 


No comments:

Post a Comment