Forum

ALERT - February 20...
 
Bildirimler
Hepsini Temizle

ALERT - February 2011 Microsoft Security Bulletin Release

1 Yazılar
1 Üyeler
0 Reactions
364 Görüntüleme
Hakan Uzuner
(@hakanuzuner)
Gönderiler: 33370
Illustrious Member Yönetici
Konu başlatıcı
 






What is the purpose of this alert?



This alert is to provide you with an overview of the new security bulletin(s) being released on February 08, 2011. Security bulletins are released monthly to resolve critical problem vulnerabilities.


                                                                                        


New Security Bulletins


Microsoft is releasing the following 12 new security bulletins for newly discovered vulnerabilities:


 






















































Bulletin ID


Bulletin Title


Max Severity Rating


Vulnerability Impact


Restart Requirement


Affected Software


MS11-003


Cumulative Security Update for Internet Explorer (2482017)


CRITICAL


Remote Code Execution


Requires restart


Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.


MS11-004


Vulnerability in Internet Information Services (IIS) FTP Service Could Allow Remote Code Execution (2489256)


IMPORTANT


Remote Code Execution


May require restart


Microsoft Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.


MS11-005


Vulnerability in Active Directory Could Allow Denial of Service (2478953)


IMPORTANT


Denial of Service


Requires restart


Microsoft Windows Server 2003


MS11-006


Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185)


CRITICAL


Remote Code Execution


Requires restart


Microsoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.


MS11-007


Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2485376)


CRITICAL


Remote Code Execution


Requires restart


Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.


MS11-008


Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879)


IMPORTANT


Remote Code Execution


May require restart


Microsoft Visio 2002, Visio 2003, and Visio 2007.


 

























MS11-009


Vulnerability in JScript and VBScript Scripting Engines Could Allow Information Disclosure (2475792)


IMPORTANT


Information Disclosure


May require restart


Microsoft Windows 7 and Windows Server 2008 R2.


MS11-010


Vulnerability in Windows  Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2476687)


IMPORTANT


Elevation of Privilege


Requires restart


Microsoft Windows XP and Windows Server 2003.


MS11-011


Vulnerabilities in Windows  Kernel Could Allow Elevation of Privilege (2393802)


IMPORTANT


Elevation of Privilege


Requires restart


Microsoft Windows XPWindows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.


 


















MS11-012


Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628)


IMPORTANT


Elevation of Privilege


Requires restart


Microsoft Windows XPWindows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.


MS11-013


Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930)


IMPORTANT


Elevation of Privilege


Requires restart


Microsoft Windows XP, Windows Server 2003Windows 7, and Windows Server 2008 R2.


 











MS11-014


Vulnerability in Local Security Authority Subsystem Service Could Allow Local Elevation of Privilege (2478960)


IMPORTANT


Elevation of Privilege


Requires restart


Microsoft Windows XP and Windows Server 2003.


 


Summaries for new bulletin(s) may be found at http://www.microsoft.com/technet/security/bulletin/MS11-feb.mspx .


 


Microsoft Windows Malicious Software Removal Tool


Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU), and the Download Center. Information on the Microsoft Windows Malicious Software Removal Tool is available at http://support.microsoft.com/?kbid=890830 .


 


High Priority Non-Security Updates


High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU), or Windows Server Update Services (WSUS) will be detailed in the KB article found at http://support.microsoft.com/?id=894199 .


 


Public Bulletin Webcast


 


Microsoft will host a webcast to address customer questions on these bulletins:


Title: Information about Microsoft February Security Bulletins (Level 200)


Date: Wednesday, February 09, 2011, 11:00 A.M. Pacific Time (U.S. and Canada)


URL: https://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032455047


 


New Security Bulletin Technical Details


 


In the following tables of affected and non-affected software, software editions that are not listed are past their support lifecycle. To determine the support lifecycle for your product and edition, visit the Microsoft Support Lifecycle website at http://support.microsoft.com/lifecycle/ .


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-003


Bulletin Title


Cumulative Security Update for Internet Explorer (2482017)


Executive Summary


This security update resolves two privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer or if a user opens a legitimate HTML file that loads a specially crafted library file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user.


 


The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory, handles Cascading Style Sheets, and loads external libraries. This security update also addresses the vulnerability first described in Microsoft Security Advisory 2488013.


Severity Ratings and Affected Software


This security update is rated CRITICAL for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and MODERATE for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers.


Attack Vectors


·         A maliciously crafted webpage.


·         A maliciously crafted HTML email.


Mitigating Factors


·         Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


·         Users would have to be persuaded to visit a malicious website.


·         Exploitation only gains the same user rights as the logged-on account.


·         By default, all versions of Outlook, Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites zone.


·         By default, IE on Windows 2003 and Windows Server 2008 runs in a restricted mode.


·         SMB is commonly disabled on the perimeter firewall for CVE-2011-0038.


·         Exploitation only gains the same user rights as the logged-on account for CVE-2011-0038.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-090


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-003.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-004


Bulletin Title


Vulnerability in Internet Information Services (IIS) FTP Service Could Allow Remote Code Execution (2489256)


Executive Summary


This security update resolves a publicly disclosed vulnerability in Microsoft Internet Information Services (IIS) FTP Service. The vulnerability could allow remote code execution if an FTP server receives a specially crafted FTP command.


 


The security update addresses the vulnerability by modifying the way that the IIS FTP Service handles specially crafted FTP commands.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for Microsoft FTP Service 7.0 for IIS 7.0 and Microsoft FTP Service 7.5 for IIS 7.0 when installed on all supported editions of Windows Vista and Windows Server 2008, and for Microsoft FTP Service 7.5 for Internet Information Services 7.5 on all supported editions of Windows 7 and Windows Server 2008 R2.


Attack Vectors


·         Maliciously crafted FTP commands.


Mitigating Factors


·         FTP Service is not installed by default.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


None


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-004.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-005


Bulletin Title


Vulnerability in Active Directory Could Allow Denial of Service (2478953)


Executive Summary


This security update resolves a publicly disclosed vulnerability in Active Directory. The vulnerability could allow denial of service if an attacker sent a specially crafted packet to an affected Active Directory server.


 


The security update addresses the vulnerability by correcting the way that the Active Directory server handles service principal name (SPN) update requests.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for Active Directory on all supported editions of Windows Server 2003.


Attack Vectors


·         Maliciously crafted network packets.


Mitigating Factors


·         The attacker must have valid local administrator privileges on the domain-joined computer in order to exploit this vulnerability.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-068 and MS10-101.


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-005.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-006


Bulletin Title


Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185)


Executive Summary


This security update resolves a publicly disclosed vulnerability in the Windows Shell graphics processor. The vulnerability could allow remote code execution if a user views a specially crafted thumbnail image. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.


 


The security update addresses the vulnerability by correcting the manner in which the Windows Shell graphics processor parses thumbnail images.


Severity Ratings and Affected Software


This security update is rated CRITICAL for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.


NOTE:  All supported editions of Windows 7 and Windows Server 2008 R2 are NOT AFFECTED by the vulnerability.


Attack Vectors


·         A maliciously crafted thumbnail image.


·         A maliciously crafted file share or WebDAV location.


Mitigating Factors


·         Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


·         Cannot be exploited automatically through email.


·         Exploitation only gains the same user rights as the logged-on account.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-046


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-006.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-007


Bulletin Title


Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2485376)


Executive Summary


This security update resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow remote code execution if a user views content rendered in a specially crafted CFF font.


 


The security update addresses the vulnerability by correcting the manner in which the Windows OpenType Compact Font Format (CFF) driver validates the parameter values of specially crafted OpenType fonts.


Severity Ratings and Affected Software


This security update is rated CRITICAL for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This security update is also rated IMPORTANT for all supported editions of Windows XP and Windows Server 2003.


Attack Vectors


·         A maliciously crafted OpenType font.


·         A maliciously crafted webpage.


·         A maliciously crafted application.


Mitigating Factors


·         Users would have to be persuaded to visit a malicious website.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-091


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-007.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-008


Bulletin Title


Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879)


Executive Summary


This security update resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited either of these vulnerabilities could gain the same user rights as the logged-on user.


 


The security update addresses the vulnerabilities by correcting the way that Microsoft Visio handles corrupted structures and objects in memory when parsing specially crafted Visio files.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for Microsoft Visio 2002 Service Pack 2, Microsoft Visio 2003 Service Pack 3, and Microsoft Visio 2007 Service Pack 2.


Attack Vectors


·         A maliciously crafted Visio file.


Mitigating Factors


·         Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


·         Exploitation only gains the same user rights as the logged-on account.


·         Cannot be exploited automatically through email, because a user must open an attachment that is sent in an email message.


·         Users would have to be persuaded to visit a malicious website.


Restart Requirement


This update may require a restart.


Bulletins Replaced by This Update


MS10-028 and MS10-036.


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-008.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-009


Bulletin Title


Vulnerability in JScript and VBScript Scripting Engines Could Allow Information Disclosure (2475792)


Executive Summary


This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines. The vulnerability could allow information disclosure if a user visited a specially crafted website.


 


The security update addresses the vulnerability by correcting the manner in which the JScript and VBScript scripting engines process scripts in webpages.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for all supported editions of Windows 7 and MODERATE for all supported editions of Windows Server 2008 R2.


Attack Vectors


·         A maliciously crafted webpage.


Mitigating Factors


·         Users would have to be persuaded to visit a malicious website.


·         By default, all versions of Outlook, Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites zone.


·         By default, IE on Windows 2003 and Windows Server 2008 runs in a restricted mode.


Restart Requirement


This update may require a restart.


Bulletins Replaced by This Update


MS10-022


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-009.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-010


Bulletin Title


Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2476687)


Executive Summary


This security update resolves a privately reported vulnerability in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Windows XP and Windows Server 2003. The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and starts a specially crafted application that continues running after the attacker logs off in order to obtain the logon credentials of subsequent users.


 


The security update addresses the vulnerability by correcting the manner in which user processes are terminated upon logoff.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for all supported editions of Windows XP and Windows Server 2003.


Attack Vectors


·         A maliciously crafted application.


·         A maliciously crafted script.


Mitigating Factors


·         An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.


·         The vulnerability could not be exploited remotely or by anonymous users.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-011


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-010.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-011


Bulletin Title


Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802)


Executive Summary


This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application.


 


The security update addresses the vulnerabilities by ensuring that the Windows kernel properly validates user-supplied data before allocating memory.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for all supported versions of Microsoft Windows.


Attack Vectors


·         A maliciously crafted application.


·         A maliciously crafted script.


Mitigating Factors


·         An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.


·         The vulnerabilities could not be exploited remotely or by anonymous users.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-047 and MS10-021.


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-011.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-012


Bulletin Title


Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628)


Executive Summary


This security update resolves five privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application.


 


The security update addresses the vulnerabilities by correcting the way the Windows kernel-mode drivers validate input passed from user-mode.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for all supported versions of Microsoft Windows.


Attack Vectors


·         A maliciously crafted application.


·         A maliciously crafted script.


Mitigating Factors


·         An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.


·         The vulnerabilities could not be exploited remotely or by anonymous users.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-098


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-012.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-013


Bulletin Title


Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930)


Executive Summary


This security update resolves one privately reported vulnerability and one publicly-disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if a local, authenticated attacker installs a malicious service on a domain-joined computer.


 


This update addresses the vulnerabilities by preventing the use of weak hashing algorithms in both Windows Kerberos and Windows KDC and by preventing the client from downgrading the encryption standard to DES for Kerberos communication between client and server.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for all supported editions of Windows XP, Windows Server 2003, Windows 7, and Windows Server 2008 R2.


Attack Vectors


·         A maliciously crafted application.


Mitigating Factors


·         This vulnerability is not exploitable on domains where the domain controllers are running Windows Server 2008 or Windows Server 2008 R2.


·         An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS10-014


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-013.mspx


 


 
































Bulletin Identifier


Microsoft Security Bulletin MS11-014


Bulletin Title


Vulnerability in Local Security Authority Subsystem Service Could Allow Local Elevation of Privilege (2478960)


Executive Summary


This security update resolves a privately reported vulnerability in the Local Security Authority Subsystem Service (LSASS) in Windows XP and Windows Server 2003. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application.


 


The security update addresses the vulnerability by correcting the manner in which LSASS handles specific values used in the authentication process.


Severity Ratings and Affected Software


This security update is rated IMPORTANT for all supported editions of Windows XP and Windows Server 2003.


Attack Vectors


·         A maliciously crafted application.


·         A maliciously crafted script.


Mitigating Factors


·         An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.


·         The vulnerability could not be exploited remotely or by anonymous users.


Restart Requirement


This update requires a restart.


Bulletins Replaced by This Update


MS08-002


Full Details


http://www.microsoft.com/technet/security/bulletin/MS11-014.mspx


 


Regarding Information Consistency


 


We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft’s security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft’s web-based security content, the information in Microsoft’s web-based security content is authoritative.


 


If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.


 


Thank you,


 


Microsoft CSS Security Team


 

Danışman - ITSTACK Bilgi Sistemleri
****************************************************************
Probleminiz Çözüldüğünde Sonucu Burada Paylaşırsanız.
Sizde Aynı Problemi Yaşayanlar İçin Yardım Etmiş Olursunuz.
Eğer sorununuz çözüldü ise lütfen "çözüldü" olarak işaretlerseniz diğer üyeler için çok büyük kolaylık sağlayacaktır.
*****************************************************************

 
Gönderildi : 09/02/2011 12:18

Paylaş: