Agreed.

So your take is like mine that KB3018238 is a bug fix, and is not required to 
patch the vulnerability?

gt

> Date: Sun, 23 Nov 2014 08:11:44 -0800
> From: sbrad...@pacbell.net
> To: ntsysadm@lists.myitforum.com
> Subject: Re: [NTSysADM] MS14-066 Round Two
> 
> P.S.
> 
> Microsoft should not be ADDING new cipher deployments in a security 
> patch. That should have been included as an optional update. Don't be 
> thowing too much into a patch. This isn't the time to be adding new 
> stuff when you clearly are not testing as well as you used to.
> 
> Sorry this isn't bitching, but Microsoft needs to up their game here. 
> They are the ones not doing their job.
> 
> Susan Bradley
> http://blogs.msmvps.com/bradley
> http://www.runasradio.com/default.aspx?showNum=390
> 
> On 11/23/2014 7:57 AM, John Matteson wrote:
> >
> > *Well, as I understand it, the emergency patch MS-14-68 is to fix an 
> > issue that will allow an attacker to get elevated privileges.*
> >
> > **
> >
> > *This is the text from the bulletin:*
> >
> > **
> >
> > *Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)**
> > *
> > This security update resolves a privately reported vulnerability in 
> > Microsoft Windows Kerberos KDC that could allow an attacker to elevate 
> > unprivileged domain user account privileges to those of the domain 
> > administrator account. An attacker could use these elevated privileges 
> > to compromise any computer in the domain, including domain 
> > controllers. An attacker must have valid domain credentials to exploit 
> > this vulnerability. The affected component is available remotely to 
> > users who have standard user accounts with domain credentials; this is 
> > not the case for users with local account credentials only. When this 
> > security bulletin was issued, Microsoft was aware of limited, targeted 
> > attacks that attempt to exploit this vulnerability.
> >
> > *Management can piss and moan all they want to, but do they really 
> > want to leave their servers, including domain controllers, open to an 
> > attack with a known in the wild exploit?*
> >
> > **
> >
> > *Doesn’t sound to me like this is Microsoft crying wolf, but a tech 
> > bitching about having to do his job.*
> >
> > **
> >
> > *From:*listsad...@lists.myitforum.com 
> > [mailto:listsad...@lists.myitforum.com] *On Behalf Of *geoff taylor
> > *Sent:* Sunday, November 23, 2014 10:17 AM
> > *To:* ntsysadm@lists.myitforum.com
> > *Subject:* [NTSysADM] MS14-066 Round Two
> >
> > I am trying to determine if v 2.0 of MS14-066 is necessary to stem the 
> > vulnerability for Win2K8R2 and Win2012. We just got the first version 
> > with KB2992611 installed and now MS says that to have the install 
> > completed I must also install KB3018238. Fair enough. MS screwed up 
> > and now I need to patch the patch.
> >
> > But here is my issue. It is not clearly stated whether the 
> > vulnerability was already resolved and
> > KB3018238 is just to fix the TLS cyphers. (That is my interpretation).
> >
> > Upper management does not react well to URGENT patches that take down 
> > servers across the environment. To do it twice in one week, not cool 
> > MS. Are you listening? If I am not experiencing the cypher issue, I'll 
> > add the second patch, but on my regular schedule. Give me the 
> > information to make an informed decision.
> >
> > Sorry have to run...I hear a faint call of "Wolf" from the hill.
> >
> >
> > gt
> >
> 
> 
> 
                                          

Reply via email to