spacer
  • SANS Site Network
    • Current Site
    • spacer Internet Storm Center
    • Choose a different site Help
    • spacer Training
    • spacer Certification
    • spacer Cyber Security Graduate School
    • spacer Security Awareness Training
    • spacer Computer Forensics
    • spacer Penetration Testing
    • spacer IT Audit
    • spacer Software Security
Threat Level: spacer
  • Storm Center
    • Diary Page
    • Diary Archive
    • ISC Podcasts
    • Daily Stormcast!
    • Security News
    • ISC Handlers
    • ISC Events
    • ISC on Twitter
    • ISC Poll
    • ISC Search
  • Tools
    • Tools List
    • Feeds (XML/RSS)
    • Infocon Status
    • Link to ISC
    • Video/Audio
    • Presentations/Papers
    • Links
    • Download Our Sensor!
  • Data/Reports
    • Summary Page
    • ISC/DShield API
    • HTTP Headers
    • 404Project
    • Suspicious Domains
    • Report Fake Calls
    • Submit Logs
    • Using DShield Data
    • Webhoneypot
  • My ISC
    • ISC Login
    • SANS Portal »
  • Contact
    • About ISC
    • Contact Form
    • Security Contact
    • Submit Site Bug
    • Submit Logs
    • Privacy Policy

ISC Diary

Refresh Latest Diaries

Handler on Duty:
Guy Bruneau
Contact Us
  • previous

Microsoft Patch Tuesday Pre-Release

Published: 2012-09-10,
Last Updated: 2012-09-10 11:09:16 UTC
by Johannes Ullrich (Version: 1)

0 comment(s)

We only expect two bulletins from Microsoft tomorrow [1]. Both bulletins are rated important. The first one affects Microsoft Visual Studio Team Foundation Server 2010 Service Pack 1, and the second one affects Microsoft Systems Management Server 2003 Service Pack 3  as well as Microsoft System Center Configuration Manager 2007 Service Pack 2. 

While these are popular software packages, they are far less popular then some of the usual suspects (Office, Windows, Internet Explorer). In part, the low number of bulletins appears to be intentional, to not distract from the more complex issue which will affect Windows users starting with the October update set: Windows will no longer allow SSL certificates with RSA keys that are less then 1024 bits in length. The update is already available to allow for testing, but in October, it will be pushed as a patch.

The reason Microsoft is so careful with this update is that it will not just effect certificates issues by Microsoft and other well known certificate authorities, but it will also affect internal certificates. For example if you are using an internal certificate authority, and created certificates with insufficient key sizes to sign e-mail messages via S/MIME, these certificates will no longer work after you applied the update [3].

As a first step, you should install the patch on a test system, and watch for any problems. You should also carefully inventory your certificates, in particular if you are using non-standard (internal) certificate authorities. As you are recreating new certificates, DO NOT create 1024 bit RSA keys. Windows will still accept them, but 1024 bits is an absolute minimum size, and not necessarily sufficient. 2048 or 4096 bits is the size you should try to use. 

 

 

[1] technet.microsoft.com/en-us/security/bulletin/ms12-sep
[2] technet.microsoft.com/en-us/security/advisory/2661254
[3] support.microsoft.com/kb/2661254

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

Keywords: hacking internet isc phishing sans security threat virus vulnerability worm
0 comment(s)
Top of page
advertisement
spacer

ISC StormCast for Monday, September 10th 2012 isc.sans.edu/podcastdetail.html?id=2788

  • previous

Comments

Please choose a specific diary above to comment

spacer Diary Archives

Top of page
site/port/ip search:

Get ISC Swag!!


Advertisement

Security News Feeds

InternetStormCenter
  • Microsoft Patch Tuesday Pre-Release, (Mon, Sep 10th)
SANS Newsbites
  • FBI Says Laptop Not Breached; Apple Says it Did Not Provide UDID List to FBI (September 4 & 5, 2012)
SANS @Risk
  • (1) HIGH: Google Chrome Sandbox Escapes

Diary Archives

Microsoft Patch Tuesday Pre-Release - by: Johannes Ullrich (2012-09-10)

Phishing/Spam Pretending to be from BBB - by: Guy Bruneau (2012-09-09)

Webmin Input Validation Vulnerabilities - by: Guy Bruneau (2012-09-08)

View Diary Archives

Search Diaries:

spacer

View our Privacy Policy

Contact Us

Phone: (757) SANS-ISC (726-7472) - Voice Mail Only
Web Contact: handlers@isc.sans.edu
Report Bugs: Sourceforge Project
Debug Info: Browser Debug Info

"The experiences gained in the SANS Technology Institute program have helped me advance in IBM, taking a more public facing role."
- Jerome Radcliffe, SANS Technology Institute Student

"SANS is a 'giving back to the community factory.' SANS encourages and fosters growing security awareness and growing the security community."
- Rob VandenBrink, Alumni of SANS Technology Institute

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.