Patch Tuesday for June 2014 - 7 bulletins, 3 RCEs, 2 critical, and 1 funky sort of hole

Filed Under: Data loss, Featured, Internet Explorer, Malware, Microsoft, Vulnerability, Windows

The elevator pitch for this month's Microsoft Patch Tuesday is as follows:

  • Seven bulletins.
  • Three remote code execution (RCE) holes, of which two are deemed Critical.
  • Patches apply to Windows, Internet Explorer (IE), Office, Live Meeting and Lync.
  • All supported versions of IE get patches.
  • All Windows versions, including Server Core and RT, get at least one Critical RCE patch.
  • All patched systems need a reboot.

Even more briefly: you'll need to patch and reboot every Windows system on your network.

OK, except for your Windows XP computers.

But why not reboot them all in solidarity, anyway?

Some of them might not come back up, and then you'll have an excuse to tell your boss that you can't put off updating them any more.

An unusual patch

One of the patches, number seven, is a security hole of a type you don't see announced very often in Microsoft bulletins: Tampering.

You're probably used to seeing vulnerability tags like RCE (remote code execution), EoP (elevation of privilege, where a regular user can get unauthorised administrative or system powers), DoS (denial of service, where an outsider can crash software that you rely on), and Information Disclosure (where data that should stay private can be accessed without authorisation).

If you've listened to our Understanding Vulnerabilities podcast, you'll know that RCE bugs usually get the most attention, because they offer a break-and-enter path to attackers who are outside your network.

(Audio player above not working? Listen on Soundcloud.)

But the other sorts of vulnerability can be combined with RCE into a much more dangerous cocktail.

For example, a Disclosure bug might allow crooks to steal authentication data that makes it much easier for them to pull off an RCE; a cunningly timed DoS might knock out intrusion detection software that would otherwise trigger an alert; and an EoP might add system administrator powers to a user-level compromise.

→ Here's an analogy: a Disclosure bug tells a crook where you live and when you won't be home; the RCE lets him pick your front door lock and get inside; the DoS means he knows how to turn off your burglar alarm; and the EoP gets him into your safe as well, once he's in the house.

Tampering explained

Tampering is another sort of security hole that may help crooks, either by allowing them to initiate their attack more easily, or by making things worse for you once they have broken in.

Very loosely, tampering means that you can make a security-related change that should raise an alarm, but doesn't.

For example, you might be able to add malware to someone else's digitally signed software and have the system still accept it as trusted.

You might be able to make your own digital certificate, for example for a fake web page, but pass it off as someone else's.

Or you might be able to tamper with a protected configuration file, thus altering the settings and behaviour of software such as a web server, without being noticed.

One well-known example of a tampering exploit is last year's MasterKey malware for Android, which bypassed Google's Android Package (APK) cryptographic verifier, making the malware look legitimate.

This didn't just allow the malware to get the blessing of Google's compulsory install-time security check, but also allowed the crooks to put the blame on a innocent vendor, whose digitally signed package they started with.

Another famous tampering exploit is the announcement by security researchers in 2008 that they had succeeded in creating a fake Certification Authority web certificate by finding a collision in the MD5 hashing algorithm.

Their home-made certificate appeared to have been signed by one of the top-level "root authorities" that almost every browser trusts by default, and would have allowed them to sign apparently-trusted certificates for any website they liked.

→ Don't use MD5 in any new project. We knew it was cryptographically flawed before 2008, but the abovementioned certificate crack made it quite clear that it was dangerously unsafe in real life, not just in the lab.

We can't yet say exactly what form this latest Windows tampering vulnerability takes, but it affects Windows 7; 8 and 8.1; Server 2008 R2 (not Itanium, and not Server Core); and all supported flavours of Server 2012, including Server Core.

Watch this space: we'll tell you more after we've spoken officially to Microsoft on Patch Tuesday itself.

Theoretical zero-day fixed

The final item of interest about the June 2014 Patch Tuesday is that the update to IE fixes a security hole known as CVE-2014-1770.

Technically, this became a zero-day in IE 8 when it was disclosed by HP's Zero Day Initiative during May 2014, after Microsoft hadn't managed to come up with a fix for six months. (More precisely, after 180 days.)

The discoverer of the bug, who sold it to HP for an undisclosed sum, was careful to point out that all that was published last month was an advisory, not a proof of concept; indeed, he said that "it won’t be easy reproduce the vulnerability based on the advisory alone."

Even after you have uncovered a vulnerability, there is almost always a lot of work (and sometimes it proves as good as impossible) to weaponise the vulnerability by actually coming up with a way to exploit it.

According to Microsoft, writing on its Security Response Center blog, no in-the-wild exploit using CVE-2014-1770 was ever seen, and thankfully the issue becomes moot on 10 June 2014, when the latest IE patches come out.

The bottom line

As we said at the outset: you'll need to patch and reboot every Windows system on your network this month.

Except XP, but that's another can of worms altogether.

Have a happy Tuesday!

, , , , , , , , ,

You might like

10 Responses to Patch Tuesday for June 2014 - 7 bulletins, 3 RCEs, 2 critical, and 1 funky sort of hole

  1. Anonymous · 484 days ago

    I don't understand, if you dont reboot will your comp still work.and what if you comps not on. Or your internet is down.I know I must sound dumb but the tech stuff goes over my head.

    • Paul Ducklin · 484 days ago

      Step 0. If you have Windows XP, you should upgrade to Windows 7 or 8.1. Windows XP is out of support, so won't get any more patches. That means it will become ever-dangerously easier to hack as the months roll by.

      Step 1. If you have never configured Windows Update, go to Control Panel|Windows Update|Important Updates and choose your setting. You have "Check for updates and let me decide when to download them"; "Download updates but wait for me to say when to install them"; or "Install them automatically.") Important updates are ones that are needed to improve security, not just to add features or fix minor bugs.

      Step 2. Make a habit of going to the Control Panel|Windows Update screen every now and then, for example a week after each Patch Tuesday, to ensure that there aren't any updates you missed. That screen shows you when your computer last checked for updates; when updates were last installed; and whether any updates are outstanding.

      You will need to be online to be able to download the updates. If your internet connection is down you will not get the updates until it comes back up.

      After you have applied the updates (or after Windows has done it for you), you will need to reboot. Until you do, some of the updates will not be active and the patched security holes will remain until you do reboot. Windows will advise you when it is time to reboot. It won't force you to reboot in the middle of other work.

      On Windows 8.1, you can also use the following sequence from the Start Screen:

      1. Mouse to bottom left (sorry) right corner
      2. Click on the "Settings" cog
      3. Then use:
        • Change PC Settings
        • Update and Recovery
        • Windows Update
        • Choose how updates get installed

      It sounds intimidating but it is actually fairly straightforward...try it and see.

      • JR · 484 days ago

        The fact that there are STILL major security flaws in IE 6,7,8, so on, is reason enough for MS to continue supporting these versions on XP. Get it fixed!

        • Anonymous · 483 days ago

          They've supported that platform for almost 13 years. It's time to move on or at least use a different browser.

  2. jimcsecurity · 484 days ago

    Thanks very much for the explanation of tampering in the above blog post. Keep up the great work.

    You are also very right to point out that MD5 should no longer be used. Its use was also deprecated by a recent Microsoft update in February.

    • Paul Ducklin · 484 days ago

      Actually, IIRC what Microsoft did in February was more than merely "deprecation" (which implies that you officially disapprove of something but will accept it with reluctance).

      Microsoft actually stopped accepting certificates with MD5 hashes altogether..."Thou shalt not pass."

      Hats off to 'em for doing it.

      • jimcsecurity · 484 days ago

        Hi Paul, you are quite right. Thanks for clearing that up. Apologies for the confusion caused by my choice of words.

        I agree its great to see MD5 certificates are no longer accepted.

        • Paul Ducklin · 484 days ago

          I didn't mean to criticise your choice of word...merely to add a bit more praise for Microsoft's change :-)

  3. teejuu · 484 days ago

    I think you meant bottom right,

    • Paul Ducklin · 484 days ago

      I did!

      And I was so careful - I even held out my right hand (I never get that wrong - it's the one I don't write with) to check which side it was.

      Then I typed "left."

      Fixed, thanks.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Paul won the inaugural AusCERT Director's Award for Individual Excellence in Computer Security in 2009. Follow him on Twitter: @duckblog