Forum
What is the purpose of this alert? |
This alert is to provide you with an overview of the new security bulletin(s) being released on February 08, 2011. Security bulletins are released monthly to resolve critical problem vulnerabilities.
New Security Bulletins
Microsoft is releasing the following 12 new security bulletins for newly discovered vulnerabilities:
Bulletin ID | Bulletin Title | Max Severity Rating | Vulnerability Impact | Restart Requirement | Affected Software |
Cumulative Security Update for Internet Explorer (2482017) | CRITICAL | Remote Code Execution | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. | |
Vulnerability in Internet Information Services (IIS) FTP Service Could Allow Remote Code Execution (2489256) | IMPORTANT | Remote Code Execution | May require restart | Microsoft Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. | |
Vulnerability in Active Directory Could Allow Denial of Service (2478953) | IMPORTANT | Denial of Service | Requires restart | Microsoft Windows Server 2003 | |
Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185) | CRITICAL | Remote Code Execution | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. | |
Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2485376) | CRITICAL | Remote Code Execution | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. | |
Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879) | IMPORTANT | Remote Code Execution | May require restart | Microsoft Visio 2002, Visio 2003, and Visio 2007. |
Vulnerability in JScript and VBScript Scripting Engines Could Allow Information Disclosure (2475792) | IMPORTANT | Information Disclosure | May require restart | Microsoft Windows 7 and Windows Server 2008 R2. | |
Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2476687) | IMPORTANT | Elevation of Privilege | Requires restart | Microsoft Windows XP and Windows Server 2003. | |
Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) | IMPORTANT | Elevation of Privilege | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. |
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628) | IMPORTANT | Elevation of Privilege | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. | |
Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930) | IMPORTANT | Elevation of Privilege | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows 7, and Windows Server 2008 R2. |
Vulnerability in Local Security Authority Subsystem Service Could Allow Local Elevation of Privilege (2478960) | IMPORTANT | Elevation of Privilege | Requires restart | Microsoft Windows XP and Windows Server 2003. |
Summaries for new bulletin(s) may be found at http://www.microsoft.com/technet/security/bulletin/MS11-feb.mspx .
Microsoft Windows Malicious Software Removal Tool
Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU), and the Download Center. Information on the Microsoft Windows Malicious Software Removal Tool is available at http://support.microsoft.com/?kbid=890830 .
High Priority Non-Security Updates
High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU), or Windows Server Update Services (WSUS) will be detailed in the KB article found at http://support.microsoft.com/?id=894199 .
Public Bulletin Webcast
Microsoft will host a webcast to address customer questions on these bulletins:
Title: Information about Microsoft February Security Bulletins (Level 200)
Date: Wednesday, February 09, 2011, 11:00 A.M. Pacific Time (U.S. and Canada)
URL: https://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032455047
New Security Bulletin Technical Details
In the following tables of affected and non-affected software, software editions that are not listed are past their support lifecycle. To determine the support lifecycle for your product and edition, visit the Microsoft Support Lifecycle website at http://support.microsoft.com/lifecycle/ .
Bulletin Identifier | Microsoft Security Bulletin MS11-003 |
Bulletin Title | Cumulative Security Update for Internet Explorer (2482017) |
Executive Summary | This security update resolves two privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer or if a user opens a legitimate HTML file that loads a specially crafted library file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user.
The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory, handles Cascading Style Sheets, and loads external libraries. This security update also addresses the vulnerability first described in Microsoft Security Advisory 2488013. |
Severity Ratings and Affected Software | This security update is rated CRITICAL for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and MODERATE for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers. |
Attack Vectors | · A maliciously crafted webpage. · A maliciously crafted HTML email. |
Mitigating Factors | · Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. · Users would have to be persuaded to visit a malicious website. · Exploitation only gains the same user rights as the logged-on account. · By default, all versions of Outlook, Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites zone. · By default, IE on Windows 2003 and Windows Server 2008 runs in a restricted mode. · SMB is commonly disabled on the perimeter firewall for CVE-2011-0038. · Exploitation only gains the same user rights as the logged-on account for CVE-2011-0038. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-090 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-003.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-004 |
Bulletin Title | Vulnerability in Internet Information Services (IIS) FTP Service Could Allow Remote Code Execution (2489256) |
Executive Summary | This security update resolves a publicly disclosed vulnerability in Microsoft Internet Information Services (IIS) FTP Service. The vulnerability could allow remote code execution if an FTP server receives a specially crafted FTP command.
The security update addresses the vulnerability by modifying the way that the IIS FTP Service handles specially crafted FTP commands. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for Microsoft FTP Service 7.0 for IIS 7.0 and Microsoft FTP Service 7.5 for IIS 7.0 when installed on all supported editions of Windows Vista and Windows Server 2008, and for Microsoft FTP Service 7.5 for Internet Information Services 7.5 on all supported editions of Windows 7 and Windows Server 2008 R2. |
Attack Vectors | · Maliciously crafted FTP commands. |
Mitigating Factors | · FTP Service is not installed by default. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | None |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-004.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-005 |
Bulletin Title | Vulnerability in Active Directory Could Allow Denial of Service (2478953) |
Executive Summary | This security update resolves a publicly disclosed vulnerability in Active Directory. The vulnerability could allow denial of service if an attacker sent a specially crafted packet to an affected Active Directory server.
The security update addresses the vulnerability by correcting the way that the Active Directory server handles service principal name (SPN) update requests. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for Active Directory on all supported editions of Windows Server 2003. |
Attack Vectors | · Maliciously crafted network packets. |
Mitigating Factors | · The attacker must have valid local administrator privileges on the domain-joined computer in order to exploit this vulnerability. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-068 and MS10-101. |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-005.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-006 |
Bulletin Title | Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185) |
Executive Summary | This security update resolves a publicly disclosed vulnerability in the Windows Shell graphics processor. The vulnerability could allow remote code execution if a user views a specially crafted thumbnail image. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
The security update addresses the vulnerability by correcting the manner in which the Windows Shell graphics processor parses thumbnail images. |
Severity Ratings and Affected Software | This security update is rated CRITICAL for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. NOTE: All supported editions of Windows 7 and Windows Server 2008 R2 are NOT AFFECTED by the vulnerability. |
Attack Vectors | · A maliciously crafted thumbnail image. · A maliciously crafted file share or WebDAV location. |
Mitigating Factors | · Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. · Cannot be exploited automatically through email. · Exploitation only gains the same user rights as the logged-on account. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-046 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-006.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-007 |
Bulletin Title | Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2485376) |
Executive Summary | This security update resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow remote code execution if a user views content rendered in a specially crafted CFF font.
The security update addresses the vulnerability by correcting the manner in which the Windows OpenType Compact Font Format (CFF) driver validates the parameter values of specially crafted OpenType fonts. |
Severity Ratings and Affected Software | This security update is rated CRITICAL for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This security update is also rated IMPORTANT for all supported editions of Windows XP and Windows Server 2003. |
Attack Vectors | · A maliciously crafted OpenType font. · A maliciously crafted webpage. · A maliciously crafted application. |
Mitigating Factors | · Users would have to be persuaded to visit a malicious website. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-091 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-007.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-008 |
Bulletin Title | Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879) |
Executive Summary | This security update resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited either of these vulnerabilities could gain the same user rights as the logged-on user.
The security update addresses the vulnerabilities by correcting the way that Microsoft Visio handles corrupted structures and objects in memory when parsing specially crafted Visio files. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for Microsoft Visio 2002 Service Pack 2, Microsoft Visio 2003 Service Pack 3, and Microsoft Visio 2007 Service Pack 2. |
Attack Vectors | · A maliciously crafted Visio file. |
Mitigating Factors | · Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. · Exploitation only gains the same user rights as the logged-on account. · Cannot be exploited automatically through email, because a user must open an attachment that is sent in an email message. · Users would have to be persuaded to visit a malicious website. |
Restart Requirement | This update may require a restart. |
Bulletins Replaced by This Update | MS10-028 and MS10-036. |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-008.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-009 |
Bulletin Title | Vulnerability in JScript and VBScript Scripting Engines Could Allow Information Disclosure (2475792) |
Executive Summary | This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines. The vulnerability could allow information disclosure if a user visited a specially crafted website.
The security update addresses the vulnerability by correcting the manner in which the JScript and VBScript scripting engines process scripts in webpages. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for all supported editions of Windows 7 and MODERATE for all supported editions of Windows Server 2008 R2. |
Attack Vectors | · A maliciously crafted webpage. |
Mitigating Factors | · Users would have to be persuaded to visit a malicious website. · By default, all versions of Outlook, Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites zone. · By default, IE on Windows 2003 and Windows Server 2008 runs in a restricted mode. |
Restart Requirement | This update may require a restart. |
Bulletins Replaced by This Update | MS10-022 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-009.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-010 |
Bulletin Title | Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2476687) |
Executive Summary | This security update resolves a privately reported vulnerability in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Windows XP and Windows Server 2003. The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and starts a specially crafted application that continues running after the attacker logs off in order to obtain the logon credentials of subsequent users.
The security update addresses the vulnerability by correcting the manner in which user processes are terminated upon logoff. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for all supported editions of Windows XP and Windows Server 2003. |
Attack Vectors | · A maliciously crafted application. · A maliciously crafted script. |
Mitigating Factors | · An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. · The vulnerability could not be exploited remotely or by anonymous users. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-011 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-010.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-011 |
Bulletin Title | Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) |
Executive Summary | This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application.
The security update addresses the vulnerabilities by ensuring that the Windows kernel properly validates user-supplied data before allocating memory. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for all supported versions of Microsoft Windows. |
Attack Vectors | · A maliciously crafted application. · A maliciously crafted script. |
Mitigating Factors | · An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. · The vulnerabilities could not be exploited remotely or by anonymous users. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-047 and MS10-021. |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-011.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-012 |
Bulletin Title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628) |
Executive Summary | This security update resolves five privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application.
The security update addresses the vulnerabilities by correcting the way the Windows kernel-mode drivers validate input passed from user-mode. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for all supported versions of Microsoft Windows. |
Attack Vectors | · A maliciously crafted application. · A maliciously crafted script. |
Mitigating Factors | · An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. · The vulnerabilities could not be exploited remotely or by anonymous users. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-098 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-012.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-013 |
Bulletin Title | Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930) |
Executive Summary | This security update resolves one privately reported vulnerability and one publicly-disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if a local, authenticated attacker installs a malicious service on a domain-joined computer.
This update addresses the vulnerabilities by preventing the use of weak hashing algorithms in both Windows Kerberos and Windows KDC and by preventing the client from downgrading the encryption standard to DES for Kerberos communication between client and server. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for all supported editions of Windows XP, Windows Server 2003, Windows 7, and Windows Server 2008 R2. |
Attack Vectors | · A maliciously crafted application. |
Mitigating Factors | · This vulnerability is not exploitable on domains where the domain controllers are running Windows Server 2008 or Windows Server 2008 R2. · An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS10-014 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-013.mspx |
Bulletin Identifier | Microsoft Security Bulletin MS11-014 |
Bulletin Title | Vulnerability in Local Security Authority Subsystem Service Could Allow Local Elevation of Privilege (2478960) |
Executive Summary | This security update resolves a privately reported vulnerability in the Local Security Authority Subsystem Service (LSASS) in Windows XP and Windows Server 2003. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application.
The security update addresses the vulnerability by correcting the manner in which LSASS handles specific values used in the authentication process. |
Severity Ratings and Affected Software | This security update is rated IMPORTANT for all supported editions of Windows XP and Windows Server 2003. |
Attack Vectors | · A maliciously crafted application. · A maliciously crafted script. |
Mitigating Factors | · An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. · The vulnerability could not be exploited remotely or by anonymous users. |
Restart Requirement | This update requires a restart. |
Bulletins Replaced by This Update | MS08-002 |
Full Details | http://www.microsoft.com/technet/security/bulletin/MS11-014.mspx |
Regarding Information Consistency
We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft’s security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft’s web-based security content, the information in Microsoft’s web-based security content is authoritative.
If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.
Thank you,
Microsoft CSS Security Team
Danışman - ITSTACK Bilgi Sistemleri
****************************************************************
Probleminiz Çözüldüğünde Sonucu Burada Paylaşırsanız.
Sizde Aynı Problemi Yaşayanlar İçin Yardım Etmiş Olursunuz.
Eğer sorununuz çözüldü ise lütfen "çözüldü" olarak işaretlerseniz diğer üyeler için çok büyük kolaylık sağlayacaktır.
*****************************************************************