Overview of the July 2009 Microsoft patches and their status.
# | Affected | Contra Indications | Known Exploits | Microsoft rating | ISC rating(*) | |
---|---|---|---|---|---|---|
clients | servers | |||||
MS09-028 | Multiple vulnerabilities exist in DirectX and allow for arbitrary code execution with the rights of the logged on user. Replaces MS08-033 and MS09-011. |
|||||
DirectShow CVE-2009-1537 CVE-2009-1538 CVE-2009-1539 |
KB 971633 |
Active exploitation of CVE-2009-1537 Addresses SA971778 |
Severity:Critical Exploitability:1,1,1 |
PATCH NOW |
Important | |
MS09-029 | Multiple input validation vulnerabilities allow for arbitrary code execution with the rights of the logged on user. Replaces MS06-002. |
|||||
.eot (Embedded OpenType) CVE-2009-0231 CVE-2009-0232 |
KB 961371 | No known exploits | Severity:Critical Exploitability:1,1 |
Critical | Important | |
MS09-030 | An input validation error allows arbitrary code to be executed with the rights of the logged on user. | |||||
Publisher CVE-2009-0566 |
KB 969516 | No known exploits | Severity:Important Exploitability:1 |
Critical | Important | |
MS09-031 | When using Radius OTP authentication, a user can bypass authentication leading to privilege escalation and access to resources. | |||||
ISA server 2006 CVE-2009-1135 |
KB 970953 | No known exploits | Severity:Important Exploitability:1 |
N/A | Critical (**) |
|
MS09-032 | Cumulative killbit update, adds killbits for the recently discussed video ActiveX control. Note there are recently discovered killbits one should set that are not included in this update. Replaces MS08-032. |
|||||
ActiveX killbits CVE-2008-0015 |
KB 973346 | Workaround for active exploitation included SA972890 |
Severity:Critical Exploitability:1 |
PATCH NOW |
Important | |
MS09-033 | A privilege escalation problem exists in the handling of privileged instructions on the guest OS. | |||||
Virtual PC, Virtual server CVE-2009-1542 |
KB 969856 | No known exploits | Severity:Important Exploitability:3 |
Important | Important (***) |
(**): Assuming a worst case scenario
(***): If you use virtual server to create a shared environment and have users accessing virtual machines while not allowing them to manage the system, make that critical.
--
Swa Frantzen -- Section 66